A link between increased temperature and avian body condition in a logged tropical forest
Abstract The combined effects of anthropogenic disturbances, such as logging and climate change, remain poorly understood; yet, they are the main threats to tropical biodiversity. Most tropical African countries lack long‐term climate data, so climate impacts on biodiversity cannot be assessed.
Moreen Uwimbabazi +7 more
wiley +1 more source
Blockchain of Signature Material Combining Cryptographic Hash Function and DNA Steganography [PDF]
Yixin Zhang
openalex +1 more source
Implicit Promises and the Timing of Defined‐Benefit Pension Plan Freezes
ABSTRACT Firms time defined‐benefit (DB) plan freezes after CEO turnovers to protect CEO retirement benefits from cost cuts affecting the wider workforce. We document a significant increase in voluntary CEO turnovers just before the freeze, without notable post‐freeze changes.
Zacharias Petrou, Adamos Vlittis
wiley +1 more source
Correction: Antibodies and cryptographic hash functions: quantifying the specificity paradox. [PDF]
Petrella RJ.
europepmc +1 more source
An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda +2 more
wiley +1 more source
Antibodies and cryptographic hash functions: quantifying the specificity paradox. [PDF]
Petrella RJ.
europepmc +1 more source
Cryptocurrency Bubbles and Costly Mining
ABSTRACT This paper develops a model of a cryptocurrency by incorporating mining into the otherwise standard search‐theoretic monetary framework. As usual, multiple equilibria exist. To obtain a sharp prediction on whether a cryptocurrency' s value will last in the future, I propose a notion of equilibrium refinement based on the feature that mining ...
Kohei Iwasaki
wiley +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
A 2D Cryptographic Hash Function Incorporating Homomorphic Encryption for Secure Digital Signatures [PDF]
Akshay Wali +2 more
openalex +1 more source

