Results 21 to 30 of about 1,301,826 (296)
Modelling of self-driven particles: foraging ants and pedestrians [PDF]
Models for the behavior of ants and pedestrians are studied in an unified way in this paper. Each ant follows pheromone put by preceding ants, hence creating a trail on the ground, while pedestrians also try to follow others in a crowd for efficient and ...
Chowdhury, Debashish +4 more
core +2 more sources
PUMA: Secure inference of LLaMA-7B in five minutes
Transformer models (e.g., Bert and GPT) have shown their dominance in machine learning tasks. Many cloud companies have begun to provide services based on Transformer models, examples include translation and text-speech conversion.
Dong Ye +10 more
doaj +1 more source
XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering
The CKKS scheme is traditionally recognized for approximate homomorphic encryption of real numbers, but BLEACH (Drucker et al., JoC 2024) extends its capabilities to handle exact computations on binary or small integer numbers. Despite this advancement,
Chao Niu +6 more
doaj +1 more source
"Erratum." Journal of Business Economics and Management, 18(1), p ...
Sonia Baños-Caballero +2 more
doaj +1 more source
World Cultural Heritage Discourse
This review of articles follows the methodology of H. Snyder (2019) and based on a study that was a collection, analysis and comparison of relevant publications in the field of UNESCO cultural heritage studies over the past five years by quantitative ...
A. M. Sosnovskaya
doaj +1 more source
Pterygium Pathology: A Prospective Case-Control Study on Tear Film Cytokine Levels
Pterygium is a common eye disease, linked to an increased exposure to UV radiation and dry environments. The associated pathology culminates in visual impairment and, in some rare cases, blindness.
Sara I. Van Acker +10 more
doaj +1 more source
SoK: FHE-Friendly Symmetric Ciphers and Transciphering
Fully Homomorphic Encryption (FHE) enables computation on encrypted data without decryption, demonstrating significant potential for privacy-preserving applications.
Chao Niu +6 more
doaj +1 more source
AVA: An automated and AI-driven intelligent visual analytics framework
With the incredible growth of the scale and complexity of datasets, creating proper visualizations for users becomes more and more challenging in large datasets.
Jiazhe Wang +13 more
doaj +1 more source
Skeletons of Prym varieties and Brill--Noether theory
We show that the non-Archimedean skeleton of the Prym variety associated to an unramified double cover of an algebraic curve is naturally isomorphic (as a principally polarized tropical abelian variety) to the tropical Prym variety of the associated ...
Len, Yoav, Ulirsch, Martin
core +1 more source
Wildlife animals in human care can develop pathological processes that rarely occur in their natural habitats, including neoplastic disorders. This report presents the post-mortem pathological findings of a white-tailed deer (Odocoileus virginianus) from
Santiago Duque-Arias +4 more
doaj +1 more source

