Results 41 to 50 of about 32,656 (190)
Security of Quantum Key Distribution
The security issues facing quantum key distribution (QKD) are explained, herein focusing on those issues that are cryptographic and information theoretic in nature and not those based on physics. The problem of security criteria is addressed.
Yuen, Horace
core +1 more source
COBASE: A new copula‐based shuffling method for ensemble weather forecast postprocessing
We propose COBASE, a novel copula‐based postprocessing methododology that combines the strengths of multivariate parametric correction with non‐parametric rank‐based approaches. We consider two case studies for multi‐site temperature in Austria and multi‐site temperature and dew‐point temperature in the Netherlands.
Maurits Flos +4 more
wiley +1 more source
Secure Coherent-state Quantum Key Distribution Protocols with Efficient Reconciliation
We study the equivalence between a realistic quantum key distribution protocol using coherent states and homodyne detection and a formal entanglement purification protocol.
F. Grosshans +8 more
core +1 more source
ABSTRACT Additive Manufacturing (AM) has been identified as a potential catalyst for a paradigm shift within the construction industry, due to its capacity to enhance sustainability, reduce waste, and augment design flexibility. This study presents a systematic literature review (SLR) that explores the application of Life Cycle Assessment (LCA) in ...
Antonio Mastropasqua +3 more
wiley +1 more source
Syndrome-Coupled Rate-Compatible Error-Correcting Codes
Rate-compatible error-correcting codes (ECCs), which consist of a set of extended codes, are of practical interest in both wireless communications and data storage.
Haratsch, Erich F. +4 more
core +1 more source
Two Bit Overlap: A Class of Double Error Correction One Step Majority Logic Decodable Codes
Error Correction Codes (ECCs) are commonly used to protect memories against soft errors with an impact on memory area and delay. For large memories, the area overhead is mostly due to the additional cells needed to store the parity check bits.
P. Reviriego +3 more
semanticscholar +1 more source
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch +4 more
wiley +1 more source
Narratives Contextualizing Numeric Disclosures: Insights From Earnings Calls
ABSTRACT We investigate how narrative disclosures during earnings conference calls (ECCs) provide context for quantitative numeric disclosures in quarterly earnings releases, enhancing their informativeness. Drawing on a large sample of 34,918 quarterly ECCs from 1621 US‐listed firms from 2007 to 2020, we extract interpretable textual attributes—such ...
Imelda Taraj, Ranik Raaen Wahlstrøm
wiley +1 more source
Fault Secure Encoder and Decoder for NanoMemory Applications [PDF]
Memory cells have been protected from soft errors for more than a decade; due to the increase in soft error rate in logic circuits, the encoder and decoder circuitry around the memory blocks have become susceptible to soft errors as well and must also be
DeHon, André, Naeimi, Helia
core
Abstract In the domain of battery research, the processing of high‐resolution microscopy images is a challenging task, as it involves dealing with complex images and requires a prior understanding of the components involved. The utilisation of deep learning methodologies for image analysis has attracted considerable interest in recent years, with ...
Ganesh Raghavendran +7 more
wiley +1 more source

