Results 61 to 70 of about 65,035 (289)
Key-Recovery Attacks on Full Kravatte
This paper presents a cryptanalysis of full Kravatte, an instantiation of the Farfalle construction of a pseudorandom function (PRF) with variable input and output length.
Colin Chaigneau +6 more
doaj +1 more source
An Algebra of Hierarchical Graphs [PDF]
We define an algebraic theory of hierarchical graphs, whose axioms characterise graph isomorphism: two terms are equated exactly when they represent the same graph.
A. Boronat +16 more
core +4 more sources
Abstract Electrification of distillation offers a promising route to reducing scope‐1 emissions from one of the chemical industry's most energy‐intensive unit operations. However, conventional adiabatic columns are dynamically inflexible: Long, energy‐intensive start‐ups make shutdown and restart impractical under variable electricity prices and ...
Samuel Mercer, Michael Baldea
wiley +1 more source
Overcoming the Nyquist Limit in Molecular Hyperspectral Imaging by Reinforcement Learning
Explorative spectral acquisition guide automatically selects informative spectral bands to optimize downstream tasks, outperforming full‐spectrum acquisition. The selected hyperspectral data are used for tasks such as unmixing and segmentation. BandOptiNet encodes selection states and outputs optimal bands to guide spectral acquisition. Recent advances
Xiaobin Tang +4 more
wiley +1 more source
Potentials for Pressure Gain Combustion in Advanced Gas Turbine Cycles
Pressure gain combustion evokes great interest as it promises to increase significantly gas turbine efficiency and reduce emissions. This also applies to advanced thermodynamic cycles with heat exchangers for intercooling and recuperation.
Nicolai Neumann, Dieter Peitsch
doaj +1 more source
Towards the Formal Specification and Verification of Maple Programs
In this paper, we present our ongoing work and initial results on the formal specification and verification of MiniMaple (a substantial subset of Maple with slight extensions) programs.
D.A. Schmidt +5 more
core +1 more source
Debugging Process Algebra Specifications [PDF]
Designing and developing distributed and concurrent applications has always been a tedious and error-prone task. In this context, formal techniques and tools are of great help in order to specify such concurrent systems and detect bugs in the corresponding models.
Salaün, Gwen, Ye, Lina
openaire +1 more source
Abstract This paper derives a firm‐level threshold, the Herfindahl Neutral Point, from the standard concentration index used in merger review. At this threshold, a marginal expansion leaves the index unchanged. Firms below the threshold reduce concentration when they expand; firms above it increase concentration.
Andrew J. Keller, Krishna P. Paudel
wiley +1 more source
Risk‐aware safe reinforcement learning for control of stochastic linear systems
Abstract This paper presents a risk‐aware safe reinforcement learning (RL) control design for stochastic discrete‐time linear systems. Rather than using a safety certifier to myopically intervene with the RL controller, a risk‐informed safe controller is also learned besides the RL controller, and the RL and safe controllers are combined together ...
Babak Esmaeili +2 more
wiley +1 more source
Automated Generation of Geometric Theorems from Images of Diagrams [PDF]
We propose an approach to generate geometric theorems from electronic images of diagrams automatically. The approach makes use of techniques of Hough transform to recognize geometric objects and their labels and of numeric verification to mine basic ...
Chen, Xiaoyu, Song, Dan, Wang, Dongming
core +1 more source

