Showing 461 - 480 results of 7,833 for search 'Sharky~', query time: 4.24s Refine Results
  1. 461
  2. 462

    Research on IFC- and FDS-Based Information Sharing for Building Fire Safety Analysis by Jianyong Shi, Jicao Dao, Liu Jiang, Zeyu Pan

    Published 2019-01-01
    “…And, both geometrical building information and sematic information can be shared by this approach through the transformation of coordinate systems, outer database, and IFC file extension. …”
    Get full text
    Article
  3. 463

    Understanding the puzzling resilience of the land share ownership in Russia: the input of Ostrom’s approach by Pascal Grouiez

    Published 2014-02-01
    “…This compromise leads to the preservation of both large-scale agricultural production units and “land-share ownership” in Orel.…”
    Get full text
    Article
  4. 464

    Secure Two-Party Decision Tree Classification Based on Function Secret Sharing by Kun Liu, Chunming Tang

    Published 2023-01-01
    “…The critical techniques employed include homomorphic encryption, function secret sharing (FSS), and a custom secure comparison protocol. …”
    Get full text
    Article
  5. 465

    Analysis of the Relationship between Dockless Bicycle-Sharing and the Metro: Connection, Competition, and Complementation by Yuru Wu, Weifeng Li, Qing Yu, Jian Li

    Published 2022-01-01
    “…Dockless bicycle-sharing (DLBS) is one of the novel transportation modes emerging in recent years. …”
    Get full text
    Article
  6. 466

    Sharp Weighted Bounds for Multilinear Fractional Type Operators Associated with Bergman Projection by Juan Zhang, Senhua Lan, Qingying Xue

    Published 2018-01-01
    “…We first introduce the multiple weights which are suitable for the study of Bergman type operators. Then, we give the sharp weighted estimates for multilinear fractional Bergman operators and fractional maximal function.…”
    Get full text
    Article
  7. 467
  8. 468

    PATS: Let Parties Have a Say in Threshold Group Key Sharing by Adnan Kılıç, Cansu Betin Onur, Ertan Onur

    Published 2024-01-01
    “…We present a password-authenticated (2, 3)-threshold group key share (PATS) mechanism. Although PATS resembles threshold secret sharing schemes, it has a different structure. …”
    Get full text
    Article
  9. 469
  10. 470

    Cross-chain medical data sharing scheme based on elliptic curve signcryption by YU Huifang, LI Lei

    Published 2024-12-01
    “…Due to high isolation of blockchain from external environments, medical data in inside blockchain of medical institutions can only be shared within institution itself. To address the requester identity authentication and shared data security in cross-chain medical data sharing, a cross- chain medical data sharing scheme based on elliptic curve signcryption was devised in this article. …”
    Get full text
    Article
  11. 471

    Spin angular momentum at the sharp focus of a cylindrical vector vortex beam by V.V. Kotlyar, S.S. Stafeev, A.M. Telegin

    Published 2023-12-01
    “…Sharp focusing of a light field with double (phase and polarization) singularity is studied. …”
    Get full text
    Article
  12. 472

    Assessing Accessibility of Dockless Sharing-Bike Networks by the Social Network Analysis Method by Pei Liu, Junlan Chen, Heyang Sun, Xiucheng Guo, Yan Wang, Zhenjun Zhu

    Published 2021-01-01
    “…Dockless sharing bikes play an increasingly significant role in transit transfer, especially for the first/last mile. …”
    Get full text
    Article
  13. 473
  14. 474
  15. 475

    A Systematic Review of the Coopetition Relationship between Bike-Sharing and Public Transit by Jianhong Ye, Jiahao Bai, WenYang Hao

    Published 2024-01-01
    “…The sharing economy, mobile Internet, and smartphones have been widely utilized in recent years to promote the development of bike-sharing services. …”
    Get full text
    Article
  16. 476

    Local Good-λ Estimate for the Sharp Maximal Function and Weighted Morrey Space by Yasuo Komori-Furuya

    Published 2015-01-01
    “…We give a characterization of weighted Morrey space by using Fefferman and Stein’s sharp maximal function. For this purpose, we consider a local good-λ inequality.…”
    Get full text
    Article
  17. 477

    Green Supply Chain Decisions and Revenue-Sharing Contracts under Manufacturers’ Overconfidence by Hui Zhou, Lu Liu, Weifan Jiang, Shengsheng Li

    Published 2022-01-01
    “…For the adverse effects brought by overconfidence, we further investigate whether revenue-sharing contracts can coordinate green supply chains. …”
    Get full text
    Article
  18. 478

    Unmasking privacy apprehension: A bibliometric review of mobile sharing economy applications by Thuy-Dzung T. Pham, Fang-Yi Lo, Kun-Huang Huarng

    Published 2025-01-01
    “…The emergence of mobile applications (apps) that utilize sharing economy concepts has revolutionized multiple industries, including transportation, accommodation, healthcare, and other sectors. …”
    Get full text
    Article
  19. 479
  20. 480