Results 211 to 220 of about 35,441 (244)
Some of the next articles are maybe not open access.

Twinkle: Threshold Signatures from DDH with Full Adaptive Security

IACR Cryptology ePrint Archive, 2023
Renas Bacho   +4 more
semanticscholar   +1 more source

Early Screening of DDH using SVM Classification

2019 SoutheastCon, 2019
Treatment of Developmental Dysplasia of Hip (DDH) becomes less convoluted if it is detected early. In this paper, an acoustic non-invasive data is used for detection of DDH. We investigate early detection of DDH using machine learning technique through support vector machine (SVM) technique.
MD Erfanul Alam   +4 more
openaire   +1 more source

DDH-YOLOv5: improved YOLOv5 based on Double IoU-aware Decoupled Head for object detection

Journal of Real-Time Image Processing, 2022
Hui Wang   +3 more
semanticscholar   +1 more source

SNARGs for P from Sub-exponential DDH and QR

IACR Cryptology ePrint Archive, 2022
James Hulett   +3 more
semanticscholar   +1 more source

Hidden Pairings and Trapdoor DDH Groups

2006
This paper suggests a new building block for cryptographic protocols and gives two instantiations of it. The concept is to generate two descriptions of the same group: a public description that allows a user to perform group operations, and a private description that allows a user to also compute a bilinear pairing on the group.
Alexander W. Dent, Steven D. Galbraith
openaire   +1 more source

Non-Interactive Zero Knowledge from Sub-exponential DDH

IACR Cryptology ePrint Archive, 2021
Abhishek Jain, Zhengzhong Jin
semanticscholar   +1 more source

Open Reduction of DDH (Medial Approach)

2013
The patient was brought to the operating room and positioned supine on the table. After general anesthetic, prepping and draping of the involved lower extremity and the flank were performed in the usual fashion. IV antibiotics were administered.
openaire   +1 more source

Diagnosing DDH

Don't Forget The Bubbles, 2018
openaire   +1 more source

Developmental Dysplasia of the Hip (DDH)

2023
Kanhaiyalal Agrawal   +4 more
openaire   +2 more sources

Breaking the Circuit Size Barrier for Secure Computation Under DDH

Annual International Cryptology Conference, 2016
Elette Boyle, N. Gilboa, Y. Ishai
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy