Results 51 to 60 of about 1,010 (133)

A Divide and Conquer Algorithm of Bayesian Density Estimation

open access: yesAustralian &New Zealand Journal of Statistics, Volume 67, Issue 2, Page 250-264, June 2025.
ABSTRACT Datasets for statistical analysis become extremely large even when stored on one single machine with some difficulty. Even when the data can be stored in one machine, the computational cost would still be intimidating. We propose a divide and conquer solution to density estimation using Bayesian mixture modelling, including the infinite ...
Ya Su
wiley   +1 more source

Analysis of a heterogeneous kinetic model for traffic flow

open access: yes, 2016
In this work we extend a recent kinetic traffic model to the case of more than one class of vehicles, each of which is characterized by few different microscopic features.
Puppo, Gabriella   +3 more
core   +1 more source

Indifferentiability of the Sponge Hash Family: New Attacks and the Optimal Construction

open access: yesIACR Transactions on Symmetric Cryptology
The sponge construction is subject to an indifferentiability security bound of c/2 bits, where c denotes the capacity. For a given b-bit permutation, the sponge construction allows sacrificing the rate r = b − c to achieve the theoretically optimal ...
Hongli Li   +3 more
doaj   +1 more source

Reset Indifferentiability and Its Consequences [PDF]

open access: yes, 2013
The equivalence of the random-oracle model and the idealcipher model has been studied in a long series of results. Holenstein, Kunzler, and Tessaro STOC, 2011 have recently completed the picture positively, assuming that, roughly speaking, equivalence is indifferentiability from each other.
Paul Baecher   +2 more
openaire   +1 more source

Trifold origin of the reptilian ear ossicle and its relation to the evolutionary modification of the temporal skull region

open access: yesJournal of Anatomy, Volume 246, Issue 3, Page 402-414, March 2025.
The columella‐complex in reptile middle ears involves the footplate, columella shaft, and extracolumella. The latter is partly of quadrate developmental origin, whereas the footplate derives from the mesodermal otic capsule, the shaft and another part of the extracolumella from the hyoid arch.
Ingmar Werneburg, Mario Bronzati
wiley   +1 more source

Labor Mobility and Dynamic Core−Periphery Patterns : A Two−Region Case [PDF]

open access: yes, 2001
Paul Krugman (1991) proposed a geographic model in which a country consisting of two regions can endogenously become differentiated into an industrialized "core" and an agricultural "periphery".
Yokoo, Masanori
core   +1 more source

Post-quantum security of hash functions [PDF]

open access: yes, 2022
The research covered in this thesis is dedicated to provable post-quantum security of hash functions. Post-quantum security provides security guarantees against quantum attackers.
Czajkowski, J.M.
core   +2 more sources

Generic Attacks on Double Block Length Sponge Hashing

open access: yesIACR Transactions on Symmetric Cryptology
The sponge construction is one of the main modes of operation for hash functions. Using a permutation of width b = r + c, the sponge construction with rate r and capacity c is indifferentiable up to Ω(2c/2) permutation calls.
Gaëtan Leurent, César Mathéus
doaj   +1 more source

Serpentinite–Sediment Associations: Provenance Controlled by Competing Extensional–Contractional Tectonic Processes During the Evolution of the Northern Apennines (Eastern Elba Island, Tuscany)

open access: yesBasin Research, Volume 37, Issue 1, January–February 2025.
ABSTRACT Orogenic wedges juxtapose tectonic units that originated far from each other, and tracing these back to their origin is often difficult. We have studied two contrasting serpentinite–sediment associations of the Alpine‐Apennine orogenic wedge of eastern Elba Island with the help of a detrital zircon study of the sediments and a geochemical ...
Joachim Jacobs   +4 more
wiley   +1 more source

Revisiting Shared Data Protection Against Key Exposure

open access: yes, 2020
This paper puts a new light on secure data storage inside distributed systems. Specifically, it revisits computational secret sharing in a situation where the encryption key is exposed to an attacker.
Bertoni Guido   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy