Results 61 to 70 of about 2,157,663 (242)

Time Efficient Hash Key Generation for Blockchain Enabled Framework

open access: yesIEEE Access
Blockchain, in general, helps organizations to improve the transparency and governance by removing its shortfalls and building better control overall. Blockchain network, public or private, is a competent technology when used in order with an optimized ...
Shyam Kumar Sinha, Debarka Mukhopadhyay
doaj   +1 more source

Analog quantum error correction with encoding a qubit into an oscillator [PDF]

open access: yes, 2017
To implement fault-tolerant quantum computation with continuous variables, Gottesman-Kitaev-Preskill (GKP) qubits have been recognized as an important technological element. However, the analog outcome of GKP qubits, which includes beneficial information
Fukui, Kosuke   +2 more
core   +2 more sources

RiffleScrambler - a memory-hard password storing function

open access: yes, 2018
We introduce RiffleScrambler: a new family of directed acyclic graphs and a corresponding data-independent memory hard function with password independent memory access. We prove its memory hardness in the random oracle model. RiffleScrambler is similar
D Aldous   +6 more
core   +1 more source

Simple Tabulation, Fast Expanders, Double Tabulation, and High Independence

open access: yes, 2013
Simple tabulation dates back to Zobrist in 1970. Keys are viewed as c characters from some alphabet A. We initialize c tables h_0, ..., h_{c-1} mapping characters to random hash values.
Thorup, Mikkel
core   +1 more source

Inactivation of AXL in Cardiac Fibroblasts Alleviates Right Ventricular Remodeling in Pulmonary Hypertension

open access: yesAdvanced Science, EarlyView.
Pulmonary hypertension (PH) is a progressive condition with high morbidity and mortality, largely owing to right ventricular (RV) failure resulting from maladaptive remodeling. Our study provides strong evidence in support of a critical, detrimental role for AXL as a previously unrecognized determinant driving RV fibrotic pathology in PH.
Li‐Wei Wu   +17 more
wiley   +1 more source

Foundation Model‐Enabled Multimodal Deep Learning for Prognostic Prediction in Colorectal Cancer with Incomplete Modalities: A Multi‐Institutional Retrospective Study

open access: yesAdvanced Science, EarlyView.
FLARE, a multimodal AI framework, combines pathology slides, radiology scans, and clinical reports to predict colorectal cancer outcomes, even when some tests are missing. Evaluated retrospectively in 1679 patients from four medical centers, it consistently achieved the best prognostic accuracy and clearly separated high‐ and low‐risk groups.
Linhao Qu   +6 more
wiley   +1 more source

A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies

open access: yes, 2019
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant.
Balatsoukas-Stimming, Alexios   +3 more
core   +1 more source

Source File Set Search for Clone-and-Own Reuse Analysis [PDF]

open access: yes, 2017
Clone-and-own approach is a natural way of source code reuse for software developers. To assess how known bugs and security vulnerabilities of a cloned component affect an application, developers and security analysts need to identify an original version
Inoue, Katsuro   +3 more
core   +2 more sources

Reference‐Guided Chromosome‐by‐Chromosome de novo Assembly at Scale Using Low‐Coverage High‐Fidelity Long‐Reads with HiFiCCL

open access: yesAdvanced Science, EarlyView.
HiFiCCL, as the first assembly framework specifically designed for low‐coverage high‐fidelity reads, improves the assembly quality of existing assemblers and also enhances downstream applications such as large structural variant (SV) detection (>10 000 bp), synteny analysis, pangenome graph construction, and graph‐based individual‐specific germline SVs
Zhongjun Jiang   +9 more
wiley   +1 more source

Entanglement purification of unknown quantum states [PDF]

open access: yes, 2000
A concern has been expressed that ``the Jaynes principle can produce fake entanglement'' [R. Horodecki et al., Phys. Rev. A {\bf 59}, 1799 (1999)]. In this paper we discuss the general problem of distilling maximally entangled states from $N$ copies of a
A. K. Rajagopal   +29 more
core   +2 more sources

Home - About - Disclaimer - Privacy