Results 141 to 150 of about 13,015 (291)

Science‐informed policy decisions lead to the creation of a protected area for a wide‐ranging species at risk

open access: yesConservation Science and Practice, Volume 4, Issue 12, December 2022., 2022
We describe a decision support framework for the identification of protected areas. Our approach employs criteria pertaining to size, geographic location, habitat suitability, functional connectivity, and the feasibility of different scenarios considering multiple socioeconomic and geophysical constraints.
Mathieu Leblond   +4 more
wiley   +1 more source

Cryptanalysis of some chaos-based keyed hash functions

open access: yesTongxin xuebao, 2011
By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for ...
ZHENG Shi-hui1   +3 more
doaj   +2 more sources

Fast AES-Based Universal Hash Functions and MACs

open access: yesIACR Transactions on Symmetric Cryptology
Ultra-fast AES round-based software cryptographic authentication/encryption primitives have recently seen important developments, fuelled by the authenticated encryption competition CAESAR and the prospect of future high-profile applications such as ...
Augustin Bariant   +5 more
doaj   +1 more source

SIB: Sorted‐Integers‐Based Index for Compact and Fast Caching in Top‐Down Logic Rule Mining Targeting KB Compression

open access: yesSoftware: Practice and Experience, EarlyView.
Background Mining logic rules from structured knowledge bases is the basis of knowledge engineering. Due to the NP‐hardness of the rule mining problem, logic rules cannot be efficiently induced from knowledge bases, especially large‐scale ones.
Ruoyu Wang   +3 more
wiley   +1 more source

Skyscraper: Fast Hashing on Big Primes

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and higher) primes. Such hash functions are notably slow,
Clémence Bouvier   +6 more
doaj   +1 more source

Conductive Hydrogel‐Based Neural Interfaces: From Fabrication Methods, Properties, to Applications

open access: yesSmall Structures, EarlyView.
This review summarizes the fabrication methods, properties, and applications of conductive hydrogels in neural interfaces. Finally, the prevailing challenges and outlines of future directions in the field of conductive hydrogels for neural interfaces are provided, emphasizing the need for interdisciplinary research to address issues such as long‐term ...
Xin‐Yu Xue   +10 more
wiley   +1 more source

A Hybrid Caching Scheme with Dynamic Forwarding Strategy in Information‐Centric Network

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, EarlyView.
In this era of huge data traffic, the information‐centric network (ICN) is a switching strategy from conventional host‐centric communication to a new data‐centric one. In‐network caching an integral part of ICN can reduce the shortcomings of today's location‐based internet paradigm. As ICN has limited caching capability, the decision of optimal routing
Ashim Dey   +4 more
wiley   +1 more source

Are cryptocurrencies homogeneous?

open access: yesEuropean Financial Management, Volume 29, Issue 1, Page 150-195, January 2023., 2023
Abstract This article investigates if cryptocurrencies returns' are similarly affected by a selection of demand‐ and supply‐side determinants. Homogeneity among cryptocurrencies is tested via a least absolute shrinkage and selection operator (LASSO) model where determinants of Bitcoin returns are applied to a sample of 12 cryptocurrencies. The analysis
Elias Bengtsson, Frida Gustafsson
wiley   +1 more source

Home - About - Disclaimer - Privacy