Results 11 to 20 of about 94,746 (270)

Efficient UC Commitment Extension with Homomorphism for Free (and Applications) [PDF]

open access: yes, 2019
Homomorphic universally composable (UC) commitments allow for the sender to reveal the result of additions and multiplications of values contained in commitments without revealing the values themselves while assuring the receiver of the correctness of ...
A Fiat   +19 more
core   +2 more sources

Abnormal brain structure in youth who commit homicide

open access: yesNeuroImage: Clinical, 2014
Background: Violence that leads to homicide results in an extreme financial and emotional burden on society. Juveniles who commit homicide are often tried in adult court and typically spend the majority of their lives in prison.
L.M. Cope   +8 more
doaj   +1 more source

ReCiter: An open source, identity-driven, authorship prediction algorithm optimized for academic institutions.

open access: yesPLoS ONE, 2021
Academic institutions need to maintain publication lists for thousands of faculty and other scholars. Automated tools are essential to minimize the need for direct feedback from the scholars themselves who are practically unable to commit necessary ...
Paul J Albert   +9 more
doaj   +1 more source

Prediction Of Suicide Causes In India Using Machine Learning

open access: yesJISR on Computing, 2017
Worldwide, suicide rate is considered one of the most significant issue. With each passing year, the number of suicide is getting increased phenomenally and because of this reason, this research is carried out to predict the causes of suicide in India ...
Imran Amin, Sobia Syed
doaj   +1 more source

User Review-Based Change File Localization for Mobile Applications [PDF]

open access: yes, 2020
In the current mobile app development, novel and emerging DevOps practices (e.g., Continuous Delivery, Integration, and user feedback analysis) and tools are becoming more widespread.
Chen, Taolue   +5 more
core   +3 more sources

Weakening the Isolation Assumption of Tamper-proof Hardware Tokens [PDF]

open access: yes, 2015
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup assumption for building UC-secure two-party computation protocols, thus providing broad security guarantees and allowing the use of such protocols as buildings blocks in ...
Dowsley, Rafael   +2 more
core   +2 more sources

Il lavoro digitale su piattaforma

open access: yesLabour & Law Issues, 2015
This article deals with the work carried through digital platforms of crowdsourcing.The web is now vector of production processes widespread and fragmented among network users: companies break up the activities and assign them to a digital infrastructure
Annamaria Donini
doaj   +1 more source

Reconfigurable Lattice Agreement and Applications [PDF]

open access: yes, 2019
Reconfiguration is one of the central mechanisms in distributed systems. Due to failures and connectivity disruptions, the very set of service replicas (or servers) and their roles in the computation may have to be reconfigured over time.
Kuznetsov, Petr   +2 more
core   +5 more sources

The meaning of death: evolution and ecology of apoptosis in protozoan parasites.

open access: yesPLoS Pathogens, 2011
The discovery that an apoptosis-like, programmed cell death (PCD) occurs in a broad range of protozoan parasites offers novel therapeutic tools to treat some of the most serious infectious diseases of humans, companion animals, wildlife, and livestock ...
Sarah E Reece   +3 more
doaj   +1 more source

The Effects of Sanctions and Oil Revenues on Exchange Rate Pass-Through [PDF]

open access: yesپژوهشهای اقتصادی, 2022
Introduction: Exchange rate pass-through (ERPT) is one of the most important indicators for monetary policymakers that shows the impact of exchange rate volatility on price indices (such as CPI, PPI, etc.).
Mohammadjavad Khosrosereshki   +1 more
doaj  

Home - About - Disclaimer - Privacy