Results 191 to 200 of about 10,638,853 (320)
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding [PDF]
Donghoon Chang +3 more
openalex +1 more source
Intentionality and Attentionality Dynamics in an Institutional Change Process
Abstract In this article, we explore how actors' intentionality emerges, develops, and co‐evolves with institutional change. Although intentions are essential in shaping institutional change agents' motivations and actions, our understanding of their dynamics is limited and biased by the assumption that intentions are usually identifiable prior to ...
Sofiane Baba, Taïeb Hafsi, Omar Hemissi
wiley +1 more source
A hybrid hash framework for post quantum secure zero knowledge identification. [PDF]
Bhadane S +3 more
europepmc +1 more source
Abstract Cultural entrepreneurship research emphasizes entrepreneurs’ use of cultural resources to influence audience evaluations through resonance. However, the process by which such cultural resonance is achieved remains underexplored, particularly as an intermediary outcome.
Xiumei Li +3 more
wiley +1 more source
ABSTRACT Children with Prader–Willi syndrome are at increased risk of both obstructive and central sleep apnoea. In addition, these children have impaired autonomic control, which may be exacerbated by sleep apnoea. The aim of this study was to compare autonomic control using heart rate variability and nocturnal dipping of heart rate in children with ...
Okkes R. Patoglu +6 more
wiley +1 more source
Signal-Enhanced Cross-Coupled Map Lattice andApplication in Spatiotemporal Chaotic Hash Functions [PDF]
Yuxuan Li, Lin Dai
openalex +1 more source
Black bears as apex predators. American black bears can (1) produce top‐down effects on ungulates equal to or exceeding those of typical apex predators and (2) modify the spatiotemporal behaviour of other carnivores, including pumas and coyotes. We argue that the term ‘apex predator’ is highly context dependent and not a species‐wide status.
John M. Nettles +10 more
wiley +1 more source
Kademlia hash snow ablation resource optimized stride scheduling for mobile computing services in healthcare sector. [PDF]
Sivakumar NR.
europepmc +1 more source
Design and Implementation of Hybrid Cryptosystem using AES and Hash Function
Iosr Journals +2 more
openalex +1 more source
ABSTRACT Fairyflies (Hymenoptera: Chalcidoidea: Mymaridae) are a diverse but taxonomically understudied group of parasitoid wasps that attack the eggs of other insects. Being among the very smallest of all insects, they are often ignored in biodiversity surveys despite being one of the most abundant microhymenoptera in many habitats.
Catherine Hébert, Colin Favret
wiley +1 more source

