Results 131 to 140 of about 1,901,421 (313)
Agents' Behavior and Interest Rate Model Optimization in DeFi Lending
ABSTRACT Contrasting sharply with traditional money, bond, and bond futures markets, where interest rates emerge organically from participant interactions, DeFi lending platforms employ rule‐based interest rates that are algorithmically set. Thus, the selection of an effective interest rate model (IRM) is paramount for the success of a lending protocol.
Charles Bertucci +4 more
wiley +1 more source
ABSTRACT We present the construction and validation of a scale for measuring cryptocurrency knowledge. As users continue to adopt digital currencies and government agencies introduce more regulatory legislation, researchers need to understand the general public's degree of literacy in this area.
Michael Jones +2 more
wiley +1 more source
Portable PGAS‐Based GPU‐Accelerated Branch‐And‐Bound Algorithms at Scale
ABSTRACT The Branch‐and‐Bound (B&B) technique plays a key role in solving many combinatorial optimization problems, enabling efficient problem‐solving and decision‐making in a wide range of applications. It incrementally constructs a tree by building candidates to the solutions and abandoning a candidate as soon as it determines that it cannot lead to ...
Guillaume Helbecque +4 more
wiley +1 more source
Abstract Purpose To enhance the accessibility of advanced pulse sequences, or parts thereof, through the open‐source Pulseq framework. This work extends the Pulseq framework to Philips MRI systems and incorporates dynamic parallel‐transmit (pTx) capabilities within the constraints of the existing Pulseq format.
Thomas H. M. Roos +10 more
wiley +1 more source
Quantum private query: A new kind of practical quantum cryptographic protocol
F. Gao, S. Qin, Wei Huang, Q. Wen
semanticscholar +1 more source
ABSTRACT Introduction The popularization of blockchain‐based applications made evident a critical challenge, namely the inherent isolation of these decentralized systems, akin to the disconnected and technologically diverse local area networks of the 1970s. This lack of interoperability limits the potential for widespread adoption and innovation in the
Christian Delgado‐von‐Eitzen +3 more
wiley +1 more source
The Internet of Things (IoT) is a broad area that encompasses various use cases. Numerous use cases include various IoT devices, which necessitate various cryptographic methods to provide distinct security requirements.
Isil Cetintav, Mehmet Tahir Sandikkaya
doaj +1 more source
2PP of photopolymers containing QDs is an advanced fabrication strategy for creating innovative devices at various scales. The development of reliable protocols for the homogeneous integration of QDs into photopolymers, along with precise control over the optical phenomena occurring during 2PP, enables the realization of structures ranging from 4D ...
Tiziana Ritacco +4 more
wiley +1 more source
A Simple and Efficient Approach to Verifying Cryptographic Protocols [PDF]
Yongxing Sun, Xinmei Wang
openalex +1 more source
Illuminating Advances in Materials: Optical Physical Unclonable Functions for Security Applications
This review highlights Optical Physical Unclonable Functions (OPUFs) as secure, light‐driven authentication tools. It surveys material platforms including optical fibers, low‐dimensional materials, luminophores, plasmonic nanoparticles and rare earth OPUFs systems.
Syeda Ramsha Ali +4 more
wiley +1 more source

