Showing 101 - 120 results of 6,995 for search '(peer OR ((((cheers OR cheaters) OR sheet) OR chapters) OR (hackers OR checker)))', query time: 0.17s Refine Results
  1. 101

    Information cascades and the collapse of cooperation by Yang, Guoli, Csikász-Nagy, Attila, Waites, William, Xiao, Gaoxi, Cavaliere, Matteo

    Published 2021
    “…For newcomers it is beneficial to interact with cooperators but detrimental to interact with cheaters. However, cheaters and cooperators usually cannot be identified unambiguously and newcomers’ decisions are often based on a combination of private and public information. …”
    Get full text
    Journal Article
  2. 102

    Brownian dynamics simulation of soft matter with hydrodynamics: methods for constrained systems and shear processing of 2D materials by Funkenbusch, William Tian

    Published 2024
    “…In Chapter 6, we discuss potential future directions for the sheet model applied in Chapters 4 and 5. …”
    Get full text
    Thesis
  3. 103

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  4. 104

    Laser driver (ACC - auto current control) for driving laser diode in LED and laser modes by Tay, Eng Boon.

    Published 2008
    “…The circuit implemented is such that is portable and able to cater for few applications such as visual inspection of a laser diode and fiber checker.…”
    Get full text
    Thesis
  5. 105

    Smart-contract privacy preservation mechanism by Siraj, Muhammed, Ninggal, Mohd. Izuan Hafez, Udzir, Nur Izura, Abdullah, Muhammad Daniel Hafiz, Asmawi, Aziah

    Published 2023
    “…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
    Get full text
    Article
  6. 106

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  7. 107

    Bacterial type VI secretion system helps prevent cheating in microbial communities by Filloux, Alain

    Published 2024
    “…Although microbial “societies” do not have such rules codified, they nonetheless implement molecular strategies to restrict foes and cheaters within their respective populations and communities.…”
    Get full text
    Journal Article
  8. 108

    System of floating solar farm with vertical curtain and different anchoring configuration by Chern, Adam

    Published 2022
    “…Three parameters of the set-up were tested: surface penetration of vertical sheet, length of horizontal sheet and separation distance between the two sheets. …”
    Get full text
    Final Year Project (FYP)
  9. 109

    Surface wave interaction with a vertical viscoelastic barrier by Bi, Cheng, Wu, Mao See, Law, Adrian Wing-Keung

    Published 2022
    “…In this study, the surface wave interaction with a thin vertical submerged viscoelastic sheet as a wave barrier is investigated analytically without pre-assumption of the sheet dynamic behavior. …”
    Get full text
    Journal Article
  10. 110
  11. 111

    Memory Checking Requires Logarithmic Overhead by Boyle, Elette, Komargodski, Ilan, Vafa, Neekon

    Published 2025
    “…We study the complexity of memory checkers with computational security and prove the first general tight lower bound. …”
    Get full text
    Article
  12. 112

    South and East Asian cinemas across borders: critical trends in transnational cinema by Clini, Clelia, Yangling, Yang, Dasgupta, Rohit K.

    Published 2023
    “…At a time of resurgent nationalisms and increasing fortifications of (actual and symbolic) borders, the chapters in this book explore cinematic work that challenge these boundaries and promote a reflection on the social, cultural, political and economic value of international exchanges and collaborations within the context of Asia. …”
    Book
  13. 113

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  14. 114

    The cultural industries of India by Dasgupta, Rohit K., Clini, Clelia

    Published 2024
    “…This book will be an essential read for scholars and researchers of creative and cultural studies, economics, history, development studies and media studies in India. The chapters in this book were originally published as a special issue of Cultural Trends.…”
    Book
  15. 115

    Trends in Innovation and Entrepreneurship Research : Ecosystems, Digital Technologies and Responses to Shocks / by Brem, Alexander, editor 552956, Jin, Chen, 1968-, editor 498471, World Scientific (Online service) 655444

    Published [202
    “…The chapters in the book focus on recent developments in the field of technological innovation and entrepreneurship. …”
    Get full text
    software, multimedia
  16. 116

    Essays on the measurement of leverage and risk of banking institutions by Yong, Vincent Gan Beng

    Published 2015
    “…Furthermore, we argue that the source of systemic risk lies with the endogenous risk of the banking balance sheet. We discuss the challenges in managing and measuring endogenous and systemic risk. …”
    Get full text
    Thesis
  17. 117

    Membrane-induced tau amyloid fibrils by El Mammeri, Nadia, Gampp, Olivia, Duan, Pu, Hong, Mei

    Published 2024
    “…The intrinsically disordered protein tau aggregates into β-sheet amyloid fibrils that spread in human brains afflicted with Alzheimer’s disease and other neurodegenerative diseases. …”
    Get full text
    Article
  18. 118

    Investigations into high resolution imaging of the aqueous outflow system and cornea by Hong, Jesmond Xun Jie

    Published 2018
    “…This thesis in this context aims to investigate the potential of Bessel beam and light sheet fluorescence microscopy for ocular disease diagnosis. …”
    Get full text
    Thesis-Doctor of Philosophy
  19. 119
  20. 120

    GPU-accelerated real-time motion planning for safe human-robot collaboration by Fujii, Shohei

    Published 2024
    “…We experimentally demonstrate that our method can navigate a 6-DoF robot earlier than a geometric-primitives-based distance checker in a dynamic, collaborative environment. …”
    Get full text
    Thesis-Doctor of Philosophy