Results 121 to 130 of about 1,782,571 (254)
How to prevent type-flaw attacks on security protocols under algebraic properties
Type-flaw attacks upon security protocols wherein agents are led to misinterpret message types have been reported frequently in the literature. Preventing them is crucial for protocol security and verification. Heather et al.
Lafourcade, Pascal, Malladi, Sreekanth
core
ABSTRACT The analysis of certain properties of the underlying graph of a public transport network generates insights about the network's structure. Hereby, the choice of the graph representation depends on a trade‐off between complexity reduction and information preservation to adequately model a public transport network.
Michael Palk +2 more
wiley +1 more source
Gesturing While Writing: An Alternate Perspective on Mimetic Prosody
Critical Quarterly, EarlyView.
Paul Magee
wiley +1 more source
This study examined the association between attention‐deficit/hyperactivity disorder (ADHD) traits and gray matter volume (GMV) in 534 healthy young adults. Higher Hyperactivity/Restlessness scores were associated with greater GMV in the right dorsolateral prefrontal cortex (DLPFC), a region implicated in executive control and behavioral regulation. No
Haruka Asaoka +4 more
wiley +1 more source
Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers
The interest in quantum computing has grown rapidly in recent years, and with it grows the importance of securing quantum circuits. A novel type of threat to quantum circuits that dedicated attackers could launch are power trace attacks. To address this
Ferhat Erata +3 more
doaj +1 more source
Ocean Wave Modulation of Offshore Wind Turbine Loads and Wake
ABSTRACT This study examines how wave‐induced modulation affects the operational performance and structural dynamics of fixed‐bottom offshore wind turbines operating under a neutral atmospheric boundary layer profile. To capture these effects accurately while maintaining computational efficiency, unsteady RANS modelling techniques are employed.
Guillén Campaña‐Alonso +2 more
wiley +1 more source
Abstract ChatGPT and related technologies have revived an old issue in information science (IS) concerning information retrieval (IR) versus document retrieval. Since 1950, the term IR has primarily been used as a misnomer for document retrieval. This problematic terminology reflects a desire to go beyond documents and provide, in response to user ...
Birger Hjørland
wiley +1 more source
A coupled hydrologic and hydraulic modelling framework relying on representative hillslope models and scaled using hydraulic routing schemes is proposed to simulate Hortonian overland flow at intermediate scales. Using a reconstructed historic summer storm in southwest Germany (1994), we show how hillslope scale nature‐based flood prevention measures ...
Ashish Manoj J. +4 more
wiley +1 more source
Change Point Analysis for Functional Data Using Empirical Characteristic Functionals
ABSTRACT We develop a new method to detect change points in the distribution of functional data based on integrated CUSUM processes of empirical characteristic functionals. Asymptotic results are presented under conditions allowing for low‐order moments and serial dependence in the data establishing the limiting null‐distribution of the proposed test ...
Lajos Horváth +2 more
wiley +1 more source
ABSTRACT We consider the problem of sequential (online) estimation of a single change point in a piecewise linear regression model under a Gaussian setup. We demonstrate that certain CUSUM‐type statistics attain the minimax optimal rates for localizing the change point.
Annika Hüselitz, Housen Li, Axel Munk
wiley +1 more source

