Results 11 to 20 of about 10,668 (123)

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, EarlyView.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

It's Not Just What You Say, but How You Say It: The Effects of Enterprise Social Media on Service Management, Through the Lens of Signaling Theory

open access: yesHuman Resource Management, EarlyView.
ABSTRACT Frontline service workers are crucial to service delivery and have been a long‐standing focus of research, with scholars and practitioners alike maintaining an interest in their effective management. As technology increasingly transforms this context, the way in which managers in service organizations communicate with frontline workers has ...
Alexandra Budjanovcanin, Wei‐Ning Yang
wiley   +1 more source

GPERF : a perfect hash function generator [PDF]

open access: yes, 1992
gperf is a widely available perfect hash function generator written in C++. It automates a common system software operation: keyword recognition. gperf translates an n element user-specified keyword list keyfile into source code containing a k element ...
Schmidt, Douglas C., Suda, Tatsuya
core  

Twofold Video Hashing with Automatic Synchronization

open access: yes, 2014
Video hashing finds a wide array of applications in content authentication, robust retrieval and anti-piracy search. While much of the existing research has focused on extracting robust and secure content descriptors, a significant open challenge still ...
Li, Mu, Monga, Vishal
core   +1 more source

Blockchain and Digital Technologies in the Telecommunications Industry

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT This article examines how fourth industrial revolution (4IR) technologies, specifically blockchain and digital twin technologies, can be utilized to address the energy supply challenge and enhance the management of distributed telecom infrastructure assets in a research context.
Charles Okeyia   +3 more
wiley   +1 more source

A Bridge Transformer Network With Deep Graph Convolution for Hyperspectral Image Classification

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Transformers have been widely applied to hyperspectral image classification, leveraging their self‐attention mechanism for powerful global modelling. However, two key challenges remain as follows: excessive memory and computational costs from calculating correlations between all tokens (especially as image size or spectral bands increase) and ...
Yuquan Gan   +5 more
wiley   +1 more source

Implicit Promises and the Timing of Defined‐Benefit Pension Plan Freezes

open access: yesFinancial Management, EarlyView.
ABSTRACT Firms time defined‐benefit (DB) plan freezes after CEO turnovers to protect CEO retirement benefits from cost cuts affecting the wider workforce. We document a significant increase in voluntary CEO turnovers just before the freeze, without notable post‐freeze changes.
Zacharias Petrou, Adamos Vlittis
wiley   +1 more source

Fast Locality-Sensitive Hashing Frameworks for Approximate Near Neighbor Search

open access: yes, 2018
The Indyk-Motwani Locality-Sensitive Hashing (LSH) framework (STOC 1998) is a general technique for constructing a data structure to answer approximate near neighbor queries by using a distribution $\mathcal{H}$ over locality-sensitive hash functions ...
A Andoni   +12 more
core   +1 more source

The Making of the EU's Geoeconomic ‘Bazooka’: The Anti‐Coercion Instrument and the Role of Think Tanks in European Union Foreign Policy

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
Abstract The Anti‐Coercion Instrument (ACI), the most powerful tool in the EU's geoeconomic arsenal, has its origins in the first Trump US presidency and has recently been brandished again as a potential response to Trump's coercive tariffs. Its centrality to the EU's ‘geoeconomic turn’ and the twists and turns of its legislative history have been ...
Jaša Veselinovič
wiley   +1 more source

High-dimensional approximate nearest neighbor: k-d Generalized Randomized Forests [PDF]

open access: yes, 2016
We propose a new data-structure, the generalized randomized kd forest, or kgeraf, for approximate nearest neighbor searching in high dimensions. In particular, we introduce new randomization techniques to specify a set of independently constructed trees ...
Avrithis, Yannis   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy