Results 81 to 90 of about 2,157,663 (242)

Attacks on double block length hash functions [PDF]

open access: yes, 1994
Attacks on double block length hash functions using a block cipher are considered in this paper. We present a general free-start attack, in which the attacker is free to choose the initial value, and a real attack on a large class of hash functions. Recent results on the complexities of attacks on double block hash functions are summarized.
Xuejia Lai, Lars R. Knudsen
openaire   +1 more source

Enhancing Neural Stem Cell Proliferation Using Polyurethane/CNT Scaffolds Functionalized With Liposomal Hesperidin for Neural Tissue Engineering

open access: yesNano Select, EarlyView.
A multifunctional electrospun scaffold combining polyurethane, carbon nanotubes, and liposomal hesperidin supports neural stem cell survival, adhesion, and expansion. This platform enhances conductivity, mechanical strength, and hydrophilicity while mimicking the native neural environment.
Arman Abroumand Gholami   +8 more
wiley   +1 more source

All‐sky assimilation impacts of the Tomorrow.io microwave sounder constellation on global weather forecasts

open access: yesQuarterly Journal of the Royal Meteorological Society, EarlyView.
Key Findings: An assimilation methodology is established for the Tomorrow.io microwave sounder (TMS) flying on CubeSats in sun‐synchronous and inclined orbits, and in all cloud scenes. The TMS has a significant impact on weather forecast lead times up to 3 days in the Tropics in a research‐quality numerical weather prediction setting, and yields water ...
Jonathan J. Guerrette   +3 more
wiley   +1 more source

An Ecosystem to Develop Multi‐Agent Systems in Real‐World IoT Applications

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Software agents and multi‐agent systems are critical components in the development of distributed autonomous systems, as they exhibit a wide range of “intelligence,” from reactive behaviors to advanced reasoning and planning. Integrating these capabilities into multi‐agent systems enables distributed artificial intelligence, a programming ...
Davide Carnemolla   +3 more
wiley   +1 more source

Cache-Oblivious Peeling of Random Hypergraphs

open access: yes, 2013
The computation of a peeling order in a randomly generated hypergraph is the most time-consuming step in a number of constructions, such as perfect hashing schemes, random $r$-SAT solvers, error-correcting codes, and approximate set encodings.
Belazzougui, Djamal   +4 more
core   +1 more source

Converting Binary Floating‐Point Numbers to Shortest Decimal Strings: An Experimental Review

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background When sharing or logging numerical data, we must convert binary floating‐point numbers into their decimal string representations. For example, the number π might become 3.1415927. Engineers have perfected many algorithms for producing such accurate, short strings.
Jaël Champagne Gareau, Daniel Lemire
wiley   +1 more source

Tumour‐informed workflow to use ctDNA as a biomarker for risk of recurrence in head and neck cancer patients post‐treatment

open access: yesVIEW, EarlyView.
Our study presents a tumour‐informed circulating tumour DNA (ctDNA) workflow designed to enhance the detection of recurrence in head and neck cancer patients, addressing key challenges such as low ctDNA tumour fractions and tumour heterogeneity. Abstract Circulating tumour DNA (ctDNA) is a promising minimally invasive biomarker for monitoring treatment
Xiaomin Huang   +8 more
wiley   +1 more source

A Bridge Transformer Network With Deep Graph Convolution for Hyperspectral Image Classification

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Transformers have been widely applied to hyperspectral image classification, leveraging their self‐attention mechanism for powerful global modelling. However, two key challenges remain as follows: excessive memory and computational costs from calculating correlations between all tokens (especially as image size or spectral bands increase) and ...
Yuquan Gan   +5 more
wiley   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Single Cell Analysis Reveals Dynamic Changes of Distinct Cell Populations in Human Nickel Allergy

open access: yesAllergy, EarlyView.
We investigated cell types mediating the early and late inflammatory responses in human Ni2+‐allergy by scRNA‐Seq. Early responsiveness was mainly mediated by TLR4+TAGLN− endothelial cells indirectly activating TLR4−KRT16+ keratinocytes, and CCR7+DCN+ DCs. Late responsiveness was crucially driven by infiltration of KLF2+ central memory T cells and TLR4+
Marc Schmidt   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy