Results 41 to 50 of about 169,343 (316)

Purpose‐Adaptable Reinforced 3D Hyaluronic‐Acid Based Platform to Study Pathomechanisms of the Central Nervous System

open access: yesAdvanced Healthcare Materials, EarlyView.
Platform system to create biofabricated 3D spinal cord tissue models: Combining high resolution PCL fiber placement, a customized, hyaluronic acid‐based hydrogel, two cell types (spinal cord neurons and astrocytes) together with three distinct laminin isoforms allow the formation of functional cell–cell network interactions.
Nicoletta Murenu   +12 more
wiley   +1 more source

Improved Session Table Architecture for Denial of Stateful Firewall Attacks

open access: yesIEEE Access, 2018
Stateful firewalls keep track of the state of network connections. The performance of stateful firewalls depends mainly on the processing of session tables and the mechanism used for packet filtering.
Zouheir Trabelsi   +3 more
doaj   +1 more source

Iceberg Hashing: Optimizing Many Hash-Table Criteria at Once

open access: yesJournal of the ACM, 2023
Despite being one of the oldest data structures in computer science, hash tables continue to be the focus of a great deal of both theoretical and empirical research. A central reason for this is that many of the fundamental properties that one desires from a hash table are difficult to achieve simultaneously; thus many variants offering different trade-
Michael A. Bender   +4 more
openaire   +4 more sources

An Indictment of Bright Line Tests for Honest Services Mail Fraud [PDF]

open access: yes, 2004
Sparse matrix-matrix multiplication (SpGEMM) is a computational primitive that is widely used in areas ranging from traditional numerical applications to recent big data analysis and machine learning.
Azad, A   +3 more
core   +3 more sources

Quantum Decoherence of Nitrogen‐Vacancy Spin Ensembles in a Nitrogen Spin Bath in Diamond Under Dynamical Decoupling

open access: yesAdvanced Optical Materials, EarlyView.
Combining high‐order cluster‐correlation expansion with experiment, it is revealed that P1‐driven NV decoherence under dynamical decoupling deviates from semi‐classical scaling laws. The coherence‐time exponent depends on pulse number and bath conditions, demonstrating the necessity of a full quantum bath description.
Huijin Park   +8 more
wiley   +1 more source

Towards a Highly Available Model for Processing Service Requests Based on Distributed Hash Tables

open access: yesMathematics, 2022
This work aims to identify techniques leading to a highly available request processing service by using the natural decentralization and the dispersion power of the hash function involved in a Distributed Hash Table (DHT).
Voichiţa Iancu, Nicolae Ţăpuş
doaj   +1 more source

Tight Thresholds for Cuckoo Hashing via XORSAT

open access: yes, 2010
We settle the question of tight thresholds for offline cuckoo hashing. The problem can be stated as follows: we have n keys to be hashed into m buckets each capable of holding a single key.
Dietzfelbinger, Martin   +5 more
core   +2 more sources

Neuroprotective Effects of Time‐Restricted Feeding Combined With Different Protein Sources in MPTP‐Induced Parkinson's Disease Mice Model and Its Modulatory Impact on Gut Microbiota Metabolism

open access: yesAdvanced Science, EarlyView.
Time‐restricted feeding (TRF) exerts protein‐dependent neuroprotective effects in an MPTP‐induced Parkinson's disease model. In casein‐fed mice, TRF improves gut barrier integrity and reduces neuroinflammation, possibly via modulation of Allobaculum and BCAAs.
Ting Li   +12 more
wiley   +1 more source

Finding succinct ordered minimal perfect hashing functions [PDF]

open access: yes, 1992
An ordered minimal perfect hash table is one in which no collisions occur among a predefined set of keys, no space is unused, and the data are placed in the table in order. A new method for creating ordered minimal perfect hashing functions is presented.
Hirschberg, Daniel S., Seiden, Steven S.
core  

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy