Results 51 to 60 of about 1,010 (133)
A Divide and Conquer Algorithm of Bayesian Density Estimation
ABSTRACT Datasets for statistical analysis become extremely large even when stored on one single machine with some difficulty. Even when the data can be stored in one machine, the computational cost would still be intimidating. We propose a divide and conquer solution to density estimation using Bayesian mixture modelling, including the infinite ...
Ya Su
wiley +1 more source
Analysis of a heterogeneous kinetic model for traffic flow
In this work we extend a recent kinetic traffic model to the case of more than one class of vehicles, each of which is characterized by few different microscopic features.
Puppo, Gabriella +3 more
core +1 more source
Indifferentiability of the Sponge Hash Family: New Attacks and the Optimal Construction
The sponge construction is subject to an indifferentiability security bound of c/2 bits, where c denotes the capacity. For a given b-bit permutation, the sponge construction allows sacrificing the rate r = b − c to achieve the theoretically optimal ...
Hongli Li +3 more
doaj +1 more source
Reset Indifferentiability and Its Consequences [PDF]
The equivalence of the random-oracle model and the idealcipher model has been studied in a long series of results. Holenstein, Kunzler, and Tessaro STOC, 2011 have recently completed the picture positively, assuming that, roughly speaking, equivalence is indifferentiability from each other.
Paul Baecher +2 more
openaire +1 more source
The columella‐complex in reptile middle ears involves the footplate, columella shaft, and extracolumella. The latter is partly of quadrate developmental origin, whereas the footplate derives from the mesodermal otic capsule, the shaft and another part of the extracolumella from the hyoid arch.
Ingmar Werneburg, Mario Bronzati
wiley +1 more source
Labor Mobility and Dynamic Core−Periphery Patterns : A Two−Region Case [PDF]
Paul Krugman (1991) proposed a geographic model in which a country consisting of two regions can endogenously become differentiated into an industrialized "core" and an agricultural "periphery".
Yokoo, Masanori
core +1 more source
Post-quantum security of hash functions [PDF]
The research covered in this thesis is dedicated to provable post-quantum security of hash functions. Post-quantum security provides security guarantees against quantum attackers.
Czajkowski, J.M.
core +2 more sources
Generic Attacks on Double Block Length Sponge Hashing
The sponge construction is one of the main modes of operation for hash functions. Using a permutation of width b = r + c, the sponge construction with rate r and capacity c is indifferentiable up to Ω(2c/2) permutation calls.
Gaëtan Leurent, César Mathéus
doaj +1 more source
ABSTRACT Orogenic wedges juxtapose tectonic units that originated far from each other, and tracing these back to their origin is often difficult. We have studied two contrasting serpentinite–sediment associations of the Alpine‐Apennine orogenic wedge of eastern Elba Island with the help of a detrital zircon study of the sediments and a geochemical ...
Joachim Jacobs +4 more
wiley +1 more source
Revisiting Shared Data Protection Against Key Exposure
This paper puts a new light on secure data storage inside distributed systems. Specifically, it revisits computational secret sharing in a situation where the encryption key is exposed to an attacker.
Bertoni Guido +7 more
core +1 more source

