Results 91 to 100 of about 2,163,207 (263)
Sca2Gri: Scalable Gridified Scatterplots
Abstract Scatterplots are widely used in exploratory data analysis. Representing data points as glyphs is often crucial for in‐depth investigation, but this can lead to significant overlap and visual clutter. Recent post‐processing techniques address this issue, but their computational and/or visual scalability is generally limited to thousands of ...
S. Frey
wiley +1 more source
Under normoxic conditions, the SUMOylated fraction of TFAP2A cannot interact with the Ku70/Ku80 complex, nor it can bind to chromatin. The unSUMOylated fraction pre‐occupies the chromatin of a subset of hypoxia‐induced genes together with the Ku70/Ku80 complex for basal euchromatin formation. Under hypoxic conditions, the SUMOylation equilibrium shifts
Amalia Kanoura+8 more
wiley +1 more source
Hashing for statistics over k-partitions [PDF]
In this paper we analyze a hash function for $k$-partitioning a set into bins, obtaining strong concentration bounds for standard algorithms combining statistics from each bin. This generic method was originally introduced by Flajolet and Martin~[FOCS'83] in order to save a factor $\Omega(k)$ of time per element over $k$ independent samples when ...
arxiv
Implicit Promises and the Timing of Defined‐Benefit Pension Plan Freezes
ABSTRACT Firms time defined‐benefit (DB) plan freezes after CEO turnovers to protect CEO retirement benefits from cost cuts affecting the wider workforce. We document a significant increase in voluntary CEO turnovers just before the freeze, without notable post‐freeze changes.
Zacharias Petrou, Adamos Vlittis
wiley +1 more source
Against Human Content Moderation: Algorithms without Trauma
ABSTRACT This paper explores the morality of human content moderation. It focuses on content moderation of Child Sexual Abuse Material (CSAM) as it takes place in commercial digital platforms, broadly understood. I select CSAM for examination because there is a widespread and uncontroversial consensus around the need to remove it, which furnishes the ...
Juan Espíndola
wiley +1 more source
Analysis of Hashrate-Based Double Spending [PDF]
Bitcoin is the world's first decentralized digital currency. Its main technical innovation is the use of a blockchain and hash-based proof of work to synchronize transactions and prevent double-spending the currency. While the qualitative nature of this system is well understood, there is widespread confusion about its quantitative aspects and how they
arxiv
A Security Analysis of Double-Block-Length Hash Functions with the Rate 1 [PDF]
Shoichi Hirose
openalex +1 more source
Abstract Process information collected from educational games can illuminate how students approach interactive tasks, complementing assessment outcomes routinely examined in evaluation studies. However, the two sources of information are historically analyzed and interpreted separately, and diagnostic process information is often underused.
Tianying Feng, Li Cai
wiley +1 more source
Quantum Period Finding is Compression Robust [PDF]
We study quantum period finding algorithms such as Simon and Shor (and its variants Eker{\aa}-H{\aa}stad and Mosca-Ekert). For a periodic function $f$ these algorithms produce -- via some quantum embedding of $f$ -- a quantum superposition $\sum_x |x\rangle|f(x)\rangle$, which requires a certain amount of output qubits that represent $|f(x)\rangle$. We
arxiv
Intentionality and Attentionality Dynamics in an Institutional Change Process
Abstract In this article, we explore how actors' intentionality emerges, develops, and co‐evolves with institutional change. Although intentions are essential in shaping institutional change agents' motivations and actions, our understanding of their dynamics is limited and biased by the assumption that intentions are usually identifiable prior to ...
Sofiane Baba, Taïeb Hafsi, Omar Hemissi
wiley +1 more source