Results 31 to 40 of about 1,349,866 (407)
Quantifying Privacy Leakage in Graph Embedding [PDF]
Graph embeddings have been proposed to map graph data to low dimensional space for downstream processing (e.g., node classification or link prediction).
Vasisht Duddu+2 more
semanticscholar +1 more source
Sulfur hexafluoride (SF6) gas leakage in populous urban areas, once occurring, can cause death from suffocation if its concentration largely exceeds 1000ppm and oxygen concentration is low than 19 vol-%.
Chunrui Liu+3 more
doaj +1 more source
We describe a fast technique for performing the computationally heavy part of leakage assessment, in any statistical moment (or other property) of the leakage samples distributions. The proposed technique outperforms by orders of magnitude the approach presented at CHES 2015 by Schneider and Moradi.
Reparaz, Oscar+2 more
openaire +3 more sources
Introduction: Bone cement leakage is the most common, however, it can have potentially disastrous complications during vertebroplasty and balloon kyphoplasty (BK).
Papaioannou Ioannis+2 more
doaj +1 more source
Photonics-based de-chirping and leakage cancellation for frequency-modulated continuous-wave radar system [PDF]
A photonics-based leakage cancellation and echo signal de-chirping approach for frequency-modulated continuous-wave radar systems is proposed based on a dual-drive Mach-Zehnder modulator (DD-MZM), with its performance evaluated by the radar measurement and imaging. The de-chirp reference signal and the leakage cancellation reference signal are combined
arxiv +1 more source
Leakage Benchmarking for Universal Gate Sets [PDF]
Errors are common issues in quantum computing platforms, among which leakage is one of the most challenging to address. This is because leakage, i.e., the loss of information stored in the computational subspace to undesired subspaces in a larger Hilbert space, is more difficult to detect and correct than errors that preserve the computational subspace.
arxiv +1 more source
On Leakage-Resilient Authenticated Encryption with Decryption Leakages
At CCS 2015, Pereira et al. introduced a pragmatic model enabling the study of leakage-resilient symmetric cryptographic primitives based on the minimal use of a leak-free component. This model was recently used to prove the good integrity and confidentiality properties of an authenticated encryption scheme called DTE when the adversary is only given ...
Berti, Francesco+3 more
openaire +5 more sources
Macroprudential Policy with Leakages [PDF]
The outreach of macroprudential policies is likely limited in practice by imperfect regulation enforcement, whether due to shadow banking, regulatory arbitrage, or other regulation circumvention schemes. We study how such concerns affect the design of optimal regulatory policy in a workhorse model in which pecuniary externalities call for ...
Javier Bianchi, Julien Bengui
openaire +2 more sources
Background: This study aimed to evaluate the effect of different percentages of ethanol solvent of an experimental methacrylate-based dentin bonding agent containing polyhedral oligomeric silsesquioxanes (POSS) on the microleakage of resin composite ...
Mahboubeh Mirzakhani+2 more
doaj +1 more source
Leaks cause significant operational problems in water distribution systems (WDSs). The methods for managing leaks are time-consuming and costly. Therefore, the suitability and applicability of water loss management (WLM) methods should be analyzed.
Cansu Bozkurt+2 more
doaj +1 more source