Results 21 to 30 of about 2,456,516 (297)

Improvement in survivorship: The key for population recovery? [PDF]

open access: yes, 2016
In northern Patagonia, commercial harvesting of South American sea lions, Otaria flavescens, from 1920 to 1960, decimated its population abundance. Population recovery was not immediate after hunting ceased in 1962.
Crespo, Enrique Alberto   +2 more
core   +1 more source

A physical model for calculating cementing quality based on the XGboost algorithm

open access: yesOpen Physics, 2022
A physical model can be used to judge cementing quality to help drilling engineering. This article reports a physical model based on the XGboost algorithm to solve the cementing quality prediction problem of oil and gas wells. Through the physical model,
Xie Yuchen   +4 more
doaj   +1 more source

A Generic Sample Splitting Approach for Refined Community Recovery in Stochastic Block Models [PDF]

open access: yes, 2014
We propose and analyze a generic method for community recovery in stochastic block models and degree corrected block models. This approach can exactly recover the hidden communities with high probability when the expected node degrees are of order $\log ...
Lei, Jing, Zhu, Lingxue
core   +1 more source

Practical key recovery attacks on FlexAEAD

open access: yesDesigns, Codes and Cryptography, 2022
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dunkelman, Orr   +5 more
openaire   +1 more source

Impact of water content on minimum miscibility pressure during CO2 flooding in high water-cut reservoirs [PDF]

open access: yesE3S Web of Conferences
This study focused on the X block stratum oil, specifically addressing the application of CO2 displacement technology in enhancing oil recovery under high water content conditions.
Zhao Fajun   +6 more
doaj   +1 more source

Blockchain Based Sensitive Data Management by Using Key Escrow Encryption System From the Perspective of Supply Chain

open access: yesIEEE Access, 2020
The security of operation and maintenance phase in systems that share long-life cycles like weapon systems is of great importance. Even if the system passes the security evaluation at the development stage before release, it can be adversely affected by ...
Sungyong Cha   +2 more
doaj   +1 more source

Subverting Telegram’s End-to-End Encryption

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Telegram is a popular secure messaging service with third biggest user base as of 2021. In this paper, we analyze the security of Telegram’s end-to-end encryption (E2EE) protocol in presence of mass-surveillance.
Benoît Cogliati   +2 more
doaj   +1 more source

The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption [PDF]

open access: yes, 1997
A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new ...
Abelson, Hal   +10 more
core   +4 more sources

Service level agreement framework for differentiated survivability in GMPLS-based IP-over-optical networks [PDF]

open access: yes, 2007
In the next generation optical internet, GMPLS based IP-over-optical networks, ISPs will be required to support a wide variety of applications each having their own requirements. These requirements are contracted by means of the SLA. This paper describes
Al-Barrak, S.   +5 more
core   +1 more source

A Simplified Approach to Recovery Conditions for Low Rank Matrices [PDF]

open access: yes, 2011
Recovering sparse vectors and low-rank matrices from noisy linear measurements has been the focus of much recent research. Various reconstruction algorithms have been studied, including $\ell_1$ and nuclear norm minimization as well as $\ell_p ...
Fazel, Maryam   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy