Results 61 to 70 of about 2,157,663 (242)
Time Efficient Hash Key Generation for Blockchain Enabled Framework
Blockchain, in general, helps organizations to improve the transparency and governance by removing its shortfalls and building better control overall. Blockchain network, public or private, is a competent technology when used in order with an optimized ...
Shyam Kumar Sinha, Debarka Mukhopadhyay
doaj +1 more source
Analog quantum error correction with encoding a qubit into an oscillator [PDF]
To implement fault-tolerant quantum computation with continuous variables, Gottesman-Kitaev-Preskill (GKP) qubits have been recognized as an important technological element. However, the analog outcome of GKP qubits, which includes beneficial information
Fukui, Kosuke +2 more
core +2 more sources
RiffleScrambler - a memory-hard password storing function
We introduce RiffleScrambler: a new family of directed acyclic graphs and a corresponding data-independent memory hard function with password independent memory access. We prove its memory hardness in the random oracle model. RiffleScrambler is similar
D Aldous +6 more
core +1 more source
Simple Tabulation, Fast Expanders, Double Tabulation, and High Independence
Simple tabulation dates back to Zobrist in 1970. Keys are viewed as c characters from some alphabet A. We initialize c tables h_0, ..., h_{c-1} mapping characters to random hash values.
Thorup, Mikkel
core +1 more source
Pulmonary hypertension (PH) is a progressive condition with high morbidity and mortality, largely owing to right ventricular (RV) failure resulting from maladaptive remodeling. Our study provides strong evidence in support of a critical, detrimental role for AXL as a previously unrecognized determinant driving RV fibrotic pathology in PH.
Li‐Wei Wu +17 more
wiley +1 more source
FLARE, a multimodal AI framework, combines pathology slides, radiology scans, and clinical reports to predict colorectal cancer outcomes, even when some tests are missing. Evaluated retrospectively in 1679 patients from four medical centers, it consistently achieved the best prognostic accuracy and clearly separated high‐ and low‐risk groups.
Linhao Qu +6 more
wiley +1 more source
A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant.
Balatsoukas-Stimming, Alexios +3 more
core +1 more source
Source File Set Search for Clone-and-Own Reuse Analysis [PDF]
Clone-and-own approach is a natural way of source code reuse for software developers. To assess how known bugs and security vulnerabilities of a cloned component affect an application, developers and security analysts need to identify an original version
Inoue, Katsuro +3 more
core +2 more sources
HiFiCCL, as the first assembly framework specifically designed for low‐coverage high‐fidelity reads, improves the assembly quality of existing assemblers and also enhances downstream applications such as large structural variant (SV) detection (>10 000 bp), synteny analysis, pangenome graph construction, and graph‐based individual‐specific germline SVs
Zhongjun Jiang +9 more
wiley +1 more source
Entanglement purification of unknown quantum states [PDF]
A concern has been expressed that ``the Jaynes principle can produce fake entanglement'' [R. Horodecki et al., Phys. Rev. A {\bf 59}, 1799 (1999)]. In this paper we discuss the general problem of distilling maximally entangled states from $N$ copies of a
A. K. Rajagopal +29 more
core +2 more sources

