Results 111 to 120 of about 815,217 (293)
Repetition of Computer Security Warnings Results in Differential Repetition Suppression Effects as Revealed With Functional MRI. [PDF]
Kirwan CB+5 more
europepmc +1 more source
Secure Network Function Computation for Linear Functions, Part II: Target-Function Security [PDF]
In this Part II of a two-part paper, we put forward secure network function computation, where in a directed acyclic network, a sink node is required to compute a target function of which the inputs are generated as source messages at multiple source nodes, while a wiretapper, who can access any one but not more than one wiretap set in a given ...
arxiv
This study introduces a scalable and colored low‐emissivity (low‐e) paint achieved by spraying an ultrathin n‐doped poly(benzodifurandione) (n‐PBDF) coating onto various colored substrates. The low‐e paint enhances thermal regulation by reducing mid‐infrared thermal emissivity to 0.19, thereby stabilizing indoor temperatures across diverse climates ...
Xiaojie Liu+13 more
wiley +1 more source
The developed all‐organic solar cells achieve a power conversion efficiency of 8.7%, more than double the previous record. In addition, bioplastic substrates are used to produce environmentally friendly solar cells with an efficiency of 8.6%. These results are achieved by developing high‐performance organic electrodes without acid doping or high ...
Keiju Hashida+12 more
wiley +1 more source
Greater awareness of security in aftermath of computer worm [PDF]
Seth Shulman, Joseph Palca
openalex +1 more source
This paper introduces a flexible neural probe with integrated micro‐OLEDs on a flexible substrate for the first time, featuring 8 micro‐OLEDs and recording electrodes for optogenetics. It uses advanced encapsulation and an IAI anode for durability, emitting 470 nm light for ChR2 activation, enabling high‐resolution, minimally invasive stimulation ...
Somin Lee+8 more
wiley +1 more source
ReMamba: a hybrid CNN-Mamba aggregation network for visible-infrared person re-identification
Visible-Infrared Person Re-identification (VI-ReID) has been consistently challenged by the significant intra-class variations and cross-modality differences between different cameras.
Haokun Geng+6 more
doaj +1 more source
Efficient Simulation of Quantum Secure Multiparty Computation [PDF]
One of the key characteristics of secure quantum communication is quantum secure multiparty computation. In this paper, we propose a quantum secure multiparty summation (QSMS) protocol that can be applied to many complex quantum operations. It is based on the $(t, n)$ threshold approach.
arxiv