Results 111 to 120 of about 10,475,631 (365)
Hash Embeddings for Efficient Word Representations
We present hash embeddings, an efficient method for representing words in a continuous vector form. A hash embedding may be seen as an interpolation between a standard word embedding and a word embedding created using a random hash function (the hashing ...
Hansen, Jonas Meinertz+2 more
core
Investigation of the competing reactions during post‐cure of a DGEBF/GA vitrimer and their impact upon dynamic behaviour. ABSTRACT This paper reports on the structure– property and re‐processability relationships for an epoxy anhydride vitrimer network based upon diglycidyl ether of bisphenol F (DGEBF) and glutaric anhydride after cure and post‐cure ...
Jeffrey Masten‐Davies+5 more
wiley +1 more source
Verification of Implementations of Cryptographic Hash Functions
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang+5 more
doaj +1 more source
Cannabis has been used by humans for millennia, resulting in diverse landraces and uses. Its complex legal status and economic importance make sampling wild‐growing populations difficult, limiting past studies to modern cultivars with low genetic diversity. Our research provides crucial insights into the genetic diversity of wild‐growing and cultivated
Manica Balant+19 more
wiley +1 more source
An efficient and secure technique for image steganography using a hash function. [PDF]
Nezami ZI+5 more
europepmc +1 more source
ABSTRACT Assuring environmental sustainability is essential for the continuity of the ecosystem. Every sector of the economy has some degree of impact on environmental sustainability. The United Nations (UN)’ Sustainable Development Goals (SDGs) have placed these objectives within a broader global framework, offering a global plan aimed at ensuring ...
Ali Çelik, Metehan Özırmak
wiley +1 more source
A Monte Carlo study of Cichelli hash-function solvability [PDF]
Raoul Bell, B. N. I. Floyd
openalex +1 more source
PPP-Completeness with Connections to Cryptography [PDF]
Polynomial Pigeonhole Principle (PPP) is an important subclass of TFNP with profound connections to the complexity of the fundamental cryptographic primitives: collision-resistant hash functions and one-way permutations.
Sotiraki, Katerina+2 more
core +1 more source
Beyond Supply and Demand: The Moral Economy of Price Formation in Slab City
ABSTRACT This article investigates the unique economic practices of Slab City, California, an off‐grid community that rejects mainstream US values. Despite operating within the broader US economic system, Slab City residents have developed alternative forms of exchange, using cigarettes and cannabis alongside US dollars.
Bailey C. Hauswurz
wiley +1 more source
The influence of random number generation in dissipative particle dynamics simulations using a cryptographic hash function. [PDF]
Okada K, Brumby PE, Yasuoka K.
europepmc +1 more source