Results 111 to 120 of about 94,016 (314)

AN ARCHITECTURAL MODEL FOR CONTENT MANAGEMENT IN E-COMMERCE APPLICATIONS USING INTELLIGENT AGENTS

open access: yesHavacılık ve Uzay Teknolojileri Dergisi, 2011
In e-Commerce applications, the size of the architecture is huge and there are too many member shops and too many customers that bring along management difficulties.
Akhan Akbulut, Güray Yılmaz
doaj  

Linear Hashing Is Awesome [PDF]

open access: yes2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), 2016
We consider the hash function $h(x) = ((ax+b) \bmod p) \bmod n$ where $a,b$ are chosen uniformly at random from $\{0,1,\ldots,p-1\}$. We prove that when we use $h(x)$ in hashing with chaining to insert $n$ elements into a table of size $n$ the expected length of the longest chain is $\tilde{O}\!\left(n^{1/3}\right)$.
openaire   +5 more sources

Blockchain and Digital Technologies in the Telecommunications Industry

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT This article examines how fourth industrial revolution (4IR) technologies, specifically blockchain and digital twin technologies, can be utilized to address the energy supply challenge and enhance the management of distributed telecom infrastructure assets in a research context.
Charles Okeyia   +3 more
wiley   +1 more source

Heisenberg Group-Based Digital Signatures for Secure Communications

open access: yesIEEE Access
This paper proposes a new digital signature algorithm that employs the Heisenberg group over a prime field and exploits its structure to provide strong cryptographic properties. The developed scheme involves the Heisenberg group within a commutator-based
Najla Althuniyan   +4 more
doaj   +1 more source

Tumour‐informed workflow to use ctDNA as a biomarker for risk of recurrence in head and neck cancer patients post‐treatment

open access: yesVIEW, EarlyView.
Our study presents a tumour‐informed circulating tumour DNA (ctDNA) workflow designed to enhance the detection of recurrence in head and neck cancer patients, addressing key challenges such as low ctDNA tumour fractions and tumour heterogeneity. Abstract Circulating tumour DNA (ctDNA) is a promising minimally invasive biomarker for monitoring treatment
Xiaomin Huang   +8 more
wiley   +1 more source

Angular Deep Supervised Hashing for Image Retrieval

open access: yesIEEE Access, 2019
Deep learning based image hashing methods learn hash codes by using powerful feature extractors and nonlinear transformations to achieve highly efficient image retrieval. For most end-to-end deep hashing methods, the supervised learning process relies on
Chang Zhou   +8 more
doaj   +1 more source

Hash-and-Sign with Weak Hashing Made Secure [PDF]

open access: yes, 2007
Digital signatures are often proven to be secure in the random oracle model while hash functions deviate more and more from this idealization. Liskov proposed to model a weak hash function by a random oracle together with another oracle allowing to break some properties of the hash function, e.g. a preimage oracle.
Serge Vaudenay, Sylvain Pasini
openaire   +2 more sources

Home - About - Disclaimer - Privacy