Results 41 to 50 of about 1,488 (120)

Cryptanalysis on Two Kinds of Number Theoretic Pseudo‐Random Generators Using Coppersmith Method

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Pseudo‐random number generator (PRNG) is a type of algorithm that generates a sequence of random numbers using a mathematical formula, which is widely used in computer science, such as simulation, modeling applications, data encryption, et cetera. The efficiency and security of PRNG are closely related to its output bits at each iteration.
Ran Zhang   +4 more
wiley   +1 more source

Identifying forms of after‐hours information communication technology use and their role in psychological detachment: An episodic approach

open access: yesHuman Resource Management, Volume 63, Issue 6, Page 919-937, November/December 2024.
Abstract Employees increasingly conduct work outside of traditional work hours via information communication technologies (ICTs). There is a need to understand how after‐hours ICT use relates to well‐being, given that such connectivity has become unavoidable.
Adela Chen   +2 more
wiley   +1 more source

UEG Week 2022 Moderated Posters

open access: yes, 2022
United European Gastroenterology Journal, Volume 10, Issue S8, Page 185-472, October 2022.
wiley   +1 more source

A Unified approach to concurrent and parallel algorithms on balanced data structures [PDF]

open access: yes, 1997
Concurrent and parallel algorithms are different. However, in the case of dictionaries, both kinds of algorithms share many common points. We present a unified approach emphasizing these points.
Gabarró Vallès, Joaquim   +1 more
core   +2 more sources

Co-enrollment in multiple HIV prevention trials — Experiences from the CAPRISA 004 Tenofovir gel trial [PDF]

open access: yes, 2011
Background: In settings where multiple HIV prevention trials are conducted in close proximity, trial participants may attempt to enroll in more than one trial simultaneously. Co-enrollment impacts on participant's safety and validity of trial results. We
Abdool Karim, Quarraisha   +9 more
core   +2 more sources

Index of Authors and Co‐Authors

open access: yes, 2022
United European Gastroenterology Journal, Volume 10, Issue S8, Page 1093-1126, October 2022.
wiley   +1 more source

A new reading of the genealogy of the princes Fominsky-Travin: a story of wedding hexes [PDF]

open access: yes, 2016
The article was submitted on 30.06.2016.Исследуется легенда о разводе московского великого князя Симеона Ивановича Гордого вследствие свадебной порчи.
Khoruzhenko, O., Хоруженко, О.
core   +1 more source

Examining the training design and training transfer of a boundary management training: A randomized controlled intervention study

open access: yesJournal of Occupational and Organizational Psychology, Volume 97, Issue 3, Page 864-888, September 2024.
Abstract In our mobile working world, boundaries between work and non‐work domains are more and more blurred, which can impair professionals' recovery and well‐being. Consequently, managing work–non‐work boundaries represents an important challenge for professionals.
Kathrin Reinke, Sandra Ohly
wiley   +1 more source

Youth and Digital Media: From Credibility to Information Quality [PDF]

open access: yes, 2012
Building upon a process-and context-oriented information quality framework, this paper seeks to map and explore what we know about the ways in which young users of age 18 and under search for information online, how they evaluate information, and how ...
Ashley Lee   +3 more
core  

Business model innovation and third-party alliance on the survival of new firms [PDF]

open access: yes, 2014
In this study, we address the question of how the degree of business model innovation affects the survival of new firms. We present a newly constructed data set of 129 new firms that launched electronic trading platforms in the US bond market between ...
Velu, Chander
core   +2 more sources

Home - About - Disclaimer - Privacy