Results 11 to 20 of about 10,668 (123)
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
ABSTRACT Frontline service workers are crucial to service delivery and have been a long‐standing focus of research, with scholars and practitioners alike maintaining an interest in their effective management. As technology increasingly transforms this context, the way in which managers in service organizations communicate with frontline workers has ...
Alexandra Budjanovcanin, Wei‐Ning Yang
wiley +1 more source
GPERF : a perfect hash function generator [PDF]
gperf is a widely available perfect hash function generator written in C++. It automates a common system software operation: keyword recognition. gperf translates an n element user-specified keyword list keyfile into source code containing a k element ...
Schmidt, Douglas C., Suda, Tatsuya
core
Twofold Video Hashing with Automatic Synchronization
Video hashing finds a wide array of applications in content authentication, robust retrieval and anti-piracy search. While much of the existing research has focused on extracting robust and secure content descriptors, a significant open challenge still ...
Li, Mu, Monga, Vishal
core +1 more source
Blockchain and Digital Technologies in the Telecommunications Industry
ABSTRACT This article examines how fourth industrial revolution (4IR) technologies, specifically blockchain and digital twin technologies, can be utilized to address the energy supply challenge and enhance the management of distributed telecom infrastructure assets in a research context.
Charles Okeyia +3 more
wiley +1 more source
A Bridge Transformer Network With Deep Graph Convolution for Hyperspectral Image Classification
ABSTRACT Transformers have been widely applied to hyperspectral image classification, leveraging their self‐attention mechanism for powerful global modelling. However, two key challenges remain as follows: excessive memory and computational costs from calculating correlations between all tokens (especially as image size or spectral bands increase) and ...
Yuquan Gan +5 more
wiley +1 more source
Implicit Promises and the Timing of Defined‐Benefit Pension Plan Freezes
ABSTRACT Firms time defined‐benefit (DB) plan freezes after CEO turnovers to protect CEO retirement benefits from cost cuts affecting the wider workforce. We document a significant increase in voluntary CEO turnovers just before the freeze, without notable post‐freeze changes.
Zacharias Petrou, Adamos Vlittis
wiley +1 more source
Fast Locality-Sensitive Hashing Frameworks for Approximate Near Neighbor Search
The Indyk-Motwani Locality-Sensitive Hashing (LSH) framework (STOC 1998) is a general technique for constructing a data structure to answer approximate near neighbor queries by using a distribution $\mathcal{H}$ over locality-sensitive hash functions ...
A Andoni +12 more
core +1 more source
Abstract The Anti‐Coercion Instrument (ACI), the most powerful tool in the EU's geoeconomic arsenal, has its origins in the first Trump US presidency and has recently been brandished again as a potential response to Trump's coercive tariffs. Its centrality to the EU's ‘geoeconomic turn’ and the twists and turns of its legislative history have been ...
Jaša Veselinovič
wiley +1 more source
High-dimensional approximate nearest neighbor: k-d Generalized Randomized Forests [PDF]
We propose a new data-structure, the generalized randomized kd forest, or kgeraf, for approximate nearest neighbor searching in high dimensions. In particular, we introduce new randomization techniques to specify a set of independently constructed trees ...
Avrithis, Yannis +2 more
core +1 more source

