Trust and Trustworthy Computing
Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings
Article
Resurgence is an increase in the rate of a previously suppressed behavior that occurs when an alternative source of reinforcement is made worse in some way. The Resurgence as Choice model offers a quantitative...
Article
Individuals seeking board certified behavior analyst (BCBA) certification and other behavior-analytic professionals (e.g., registered behavior technician) are required by the Behavior Analyst Certification Boa...
Chapter
Behavioral momentum theory (BMT) is a complex conceptual system that integrates empirically derived functional relations among variables into a single explanation of how reinforcement can strengthen a response...
Chapter
When disseminating research in the form of a manuscript, researchers showcase their outcomes in the Results section. Data are the foundation of any healthy scientific discipline, and scientific progress depend...
Article
In the target article, Slocum et al. (2022) suggested that nonconcurrent multiple baseline designs can provide internal validity comparable to concurrent multiple baseline designs. We provide further support for ...
Chapter and Conference Paper
Mismorphisms—instances where predicates take on different truth values across different interpretations of reality (notably, different actors’ perceptions of reality and the actual reality)—are the source of w...
Chapter and Conference Paper
Human understanding of protocols is central to protocol security. The security of a protocol rests on its designers, its implementors, and, in some cases, its users correctly conceptualizing how it should wor...
Article
A sensitive optical detector is presented based on a deeply depleted graphene-insulator-semiconducting (D2GIS) junction, which offers the possibility of simultaneously leveraging the advantages of both charge int...
Article
The purpose of this study was to determine whether there is an association between the critical shoulder angle (CSA) and rotator cuff tears (RCT) as well as osteoarthritis (OA), and to compare the reproducibil...
Article
The list of ADCs in the clinic continues to grow, bolstered by the success of first two marketed ADCs: ADCETRIS® and Kadcyla®. Currently, there are 40 ADCs in various phases of clinical development. However, o...
Article
Atomic layer deposition (ALD) was used to coat cellulose nanocrystal (CNC) aerogel scaffolds with a thin conformal layer of Al2O3. Electron probe microanalysis indicates that the penetration of Al2O3 into the aer...
Reference Work Entry In depth
Reference Work Entry In depth
Reference Work Entry In depth
Reference Work Entry In depth
Reference Work Entry In depth
Reference Work Entry In depth
Chapter and Conference Paper
Authenticating human users using public key cryptography provides a number of useful security properties, such as being able to authenticate to remote party without giving away a secret. However, in many scena...
Book and Conference Proceedings
Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings
Chapter and Conference Paper
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This information can suffice for a trust de...