Results 21 to 30 of about 2,456,516 (297)
Improvement in survivorship: The key for population recovery? [PDF]
In northern Patagonia, commercial harvesting of South American sea lions, Otaria flavescens, from 1920 to 1960, decimated its population abundance. Population recovery was not immediate after hunting ceased in 1962.
Crespo, Enrique Alberto +2 more
core +1 more source
A physical model for calculating cementing quality based on the XGboost algorithm
A physical model can be used to judge cementing quality to help drilling engineering. This article reports a physical model based on the XGboost algorithm to solve the cementing quality prediction problem of oil and gas wells. Through the physical model,
Xie Yuchen +4 more
doaj +1 more source
A Generic Sample Splitting Approach for Refined Community Recovery in Stochastic Block Models [PDF]
We propose and analyze a generic method for community recovery in stochastic block models and degree corrected block models. This approach can exactly recover the hidden communities with high probability when the expected node degrees are of order $\log ...
Lei, Jing, Zhu, Lingxue
core +1 more source
Practical key recovery attacks on FlexAEAD
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dunkelman, Orr +5 more
openaire +1 more source
Impact of water content on minimum miscibility pressure during CO2 flooding in high water-cut reservoirs [PDF]
This study focused on the X block stratum oil, specifically addressing the application of CO2 displacement technology in enhancing oil recovery under high water content conditions.
Zhao Fajun +6 more
doaj +1 more source
The security of operation and maintenance phase in systems that share long-life cycles like weapon systems is of great importance. Even if the system passes the security evaluation at the development stage before release, it can be adversely affected by ...
Sungyong Cha +2 more
doaj +1 more source
Subverting Telegram’s End-to-End Encryption
Telegram is a popular secure messaging service with third biggest user base as of 2021. In this paper, we analyze the security of Telegram’s end-to-end encryption (E2EE) protocol in presence of mass-surveillance.
Benoît Cogliati +2 more
doaj +1 more source
The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption [PDF]
A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new ...
Abelson, Hal +10 more
core +4 more sources
Service level agreement framework for differentiated survivability in GMPLS-based IP-over-optical networks [PDF]
In the next generation optical internet, GMPLS based IP-over-optical networks, ISPs will be required to support a wide variety of applications each having their own requirements. These requirements are contracted by means of the SLA. This paper describes
Al-Barrak, S. +5 more
core +1 more source
A Simplified Approach to Recovery Conditions for Low Rank Matrices [PDF]
Recovering sparse vectors and low-rank matrices from noisy linear measurements has been the focus of much recent research. Various reconstruction algorithms have been studied, including $\ell_1$ and nuclear norm minimization as well as $\ell_p ...
Fazel, Maryam +3 more
core +2 more sources

