Results 21 to 30 of about 1,362,424 (329)

Erratum

open access: yesJournal of Business Economics and Management, 2017
"Erratum." Journal of Business Economics and Management, 18(1), p ...
Sonia Baños-Caballero   +2 more
doaj   +1 more source

Fano schemes of determinants and permanents [PDF]

open access: yes, 2015
Let $D_{m,n}^r$ and $P_{m,n}^r$ denote the subschemes of $\mathbb{P}^{mn-1}$ given by the $r\times r$ determinants (respectively the $r\times r$ permanents) of an $m\times n$ matrix of indeterminates.
Chan, Melody, Ilten, Nathan
core   +1 more source

PUMA: Secure inference of LLaMA-7B in five minutes

open access: yesSecurity and Safety
Transformer models (e.g., Bert and GPT) have shown their dominance in machine learning tasks. Many cloud companies have begun to provide services based on Transformer models, examples include translation and text-speech conversion.
Dong Ye   +10 more
doaj   +1 more source

XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The CKKS scheme is traditionally recognized for approximate homomorphic encryption of real numbers, but BLEACH (Drucker et al., JoC 2024) extends its capabilities to handle exact computations on binary or small integer numbers. Despite this advancement,
Chao Niu   +6 more
doaj   +1 more source

Pterygium Pathology: A Prospective Case-Control Study on Tear Film Cytokine Levels

open access: yesMediators of Inflammation, 2019
Pterygium is a common eye disease, linked to an increased exposure to UV radiation and dry environments. The associated pathology culminates in visual impairment and, in some rare cases, blindness.
Sara I. Van Acker   +10 more
doaj   +1 more source

Ideals generated by submaximal minors [PDF]

open access: yes, 2008
The goal of this paper is to study irreducible families W(b;a) of codimension 4, arithmetically Gorenstein schemes X of P^n defined by the submaximal minors of a t x t matrix A with entries homogeneous forms of degree a_j-b_i.
Kleppe, Jan O., Miro-Roig, Rosa M.
core   +2 more sources

World Cultural Heritage Discourse

open access: yesУправленческое консультирование, 2022
This review of articles follows the methodology of H. Snyder (2019) and based on a study that was a collection, analysis and comparison of relevant publications in the field of UNESCO cultural heritage studies over the past five years by quantitative ...
A. M. Sosnovskaya
doaj   +1 more source

On twists of modules over non-commutative Iwasawa algebras [PDF]

open access: yes, 2015
It is well known that, for any finitely generated torsion module M over the Iwasawa algebra Z_p [[{\Gamma} ]], where {\Gamma} is isomorphic to Z_p, there exists a continuous p-adic character {\rho} of {\Gamma} such that, for every open subgroup U of ...
Jha, Somnath   +2 more
core   +3 more sources

SoK: FHE-Friendly Symmetric Ciphers and Transciphering

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Fully Homomorphic Encryption (FHE) enables computation on encrypted data without decryption, demonstrating significant potential for privacy-preserving applications.
Chao Niu   +6 more
doaj   +1 more source

AVA: An automated and AI-driven intelligent visual analytics framework

open access: yesVisual Informatics
With the incredible growth of the scale and complexity of datasets, creating proper visualizations for users becomes more and more challenging in large datasets.
Jiazhe Wang   +13 more
doaj   +1 more source

Home - About - Disclaimer - Privacy