Search alternatives:
cheers » cheer (Expand Search), checkers (Expand Search)
cheaters » heaters (Expand Search), centers (Expand Search), cheaper (Expand Search)
chapters » chapter (Expand Search)
hackers » trackers (Expand Search)
checker » checked (Expand Search)
cheers » cheer (Expand Search), checkers (Expand Search)
cheaters » heaters (Expand Search), centers (Expand Search), cheaper (Expand Search)
chapters » chapter (Expand Search)
hackers » trackers (Expand Search)
checker » checked (Expand Search)
-
101
Information cascades and the collapse of cooperation
Published 2021“…For newcomers it is beneficial to interact with cooperators but detrimental to interact with cheaters. However, cheaters and cooperators usually cannot be identified unambiguously and newcomers’ decisions are often based on a combination of private and public information. …”
Get full text
Journal Article -
102
Brownian dynamics simulation of soft matter with hydrodynamics: methods for constrained systems and shear processing of 2D materials
Published 2024“…In Chapter 6, we discuss potential future directions for the sheet model applied in Chapters 4 and 5. …”
Get full text
Thesis -
103
Practical fuzzing on open-source projects
Published 2022“…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
Get full text
Final Year Project (FYP) -
104
Laser driver (ACC - auto current control) for driving laser diode in LED and laser modes
Published 2008“…The circuit implemented is such that is portable and able to cater for few applications such as visual inspection of a laser diode and fiber checker.…”
Get full text
Thesis -
105
Smart-contract privacy preservation mechanism
Published 2023“…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
Get full text
Article -
106
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
107
Bacterial type VI secretion system helps prevent cheating in microbial communities
Published 2024“…Although microbial “societies” do not have such rules codified, they nonetheless implement molecular strategies to restrict foes and cheaters within their respective populations and communities.…”
Get full text
Journal Article -
108
System of floating solar farm with vertical curtain and different anchoring configuration
Published 2022“…Three parameters of the set-up were tested: surface penetration of vertical sheet, length of horizontal sheet and separation distance between the two sheets. …”
Get full text
Final Year Project (FYP) -
109
Surface wave interaction with a vertical viscoelastic barrier
Published 2022“…In this study, the surface wave interaction with a thin vertical submerged viscoelastic sheet as a wave barrier is investigated analytically without pre-assumption of the sheet dynamic behavior. …”
Get full text
Journal Article -
110
-
111
Memory Checking Requires Logarithmic Overhead
Published 2025“…We study the complexity of memory checkers with computational security and prove the first general tight lower bound. …”
Get full text
Article -
112
South and East Asian cinemas across borders: critical trends in transnational cinema
Published 2023“…At a time of resurgent nationalisms and increasing fortifications of (actual and symbolic) borders, the chapters in this book explore cinematic work that challenge these boundaries and promote a reflection on the social, cultural, political and economic value of international exchanges and collaborations within the context of Asia. …”
Book -
113
Enhancing security in generic e-Commerce systems
Published 2010“…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
Get full text
Final Year Project (FYP) -
114
The cultural industries of India
Published 2024“…This book will be an essential read for scholars and researchers of creative and cultural studies, economics, history, development studies and media studies in India. The chapters in this book were originally published as a special issue of Cultural Trends.…”
Book -
115
Trends in Innovation and Entrepreneurship Research : Ecosystems, Digital Technologies and Responses to Shocks /
Published [202“…The chapters in the book focus on recent developments in the field of technological innovation and entrepreneurship. …”
Get full text
software, multimedia -
116
Essays on the measurement of leverage and risk of banking institutions
Published 2015“…Furthermore, we argue that the source of systemic risk lies with the endogenous risk of the banking balance sheet. We discuss the challenges in managing and measuring endogenous and systemic risk. …”
Get full text
Thesis -
117
Membrane-induced tau amyloid fibrils
Published 2024“…The intrinsically disordered protein tau aggregates into β-sheet amyloid fibrils that spread in human brains afflicted with Alzheimer’s disease and other neurodegenerative diseases. …”
Get full text
Article -
118
Investigations into high resolution imaging of the aqueous outflow system and cornea
Published 2018“…This thesis in this context aims to investigate the potential of Bessel beam and light sheet fluorescence microscopy for ocular disease diagnosis. …”
Get full text
Thesis-Doctor of Philosophy -
119
Stability analysis for heat transfer flow in micropolar hybrid nanofluids
Published 2023“…In general, non-unique solutions exist for the phenomenon of shrinking sheets.…”
Get full text
Article -
120
GPU-accelerated real-time motion planning for safe human-robot collaboration
Published 2024“…We experimentally demonstrate that our method can navigate a 6-DoF robot earlier than a geometric-primitives-based distance checker in a dynamic, collaborative environment. …”
Get full text
Thesis-Doctor of Philosophy