Results 51 to 60 of about 118,403 (212)
Balanced Families of Perfect Hash Functions and Their Applications [PDF]
The construction of perfect hash functions is a well-studied topic. In this paper, this concept is generalized with the following definition. We say that a family of functions from $[n]$ to $[k]$ is a $\delta$-balanced $(n,k)$-family of perfect hash ...
Alon, Noga, Gutner, Shai
core +1 more source
Blockchain and Digital Technologies in the Telecommunications Industry
ABSTRACT This article examines how fourth industrial revolution (4IR) technologies, specifically blockchain and digital twin technologies, can be utilized to address the energy supply challenge and enhance the management of distributed telecom infrastructure assets in a research context.
Charles Okeyia +3 more
wiley +1 more source
Quantum Key Distribution with Blind Polarization Bases [PDF]
We propose a new quantum key distribution scheme that uses the blind polarization basis. In our scheme the sender and the receiver share key information by exchanging qubits with arbitrary polarization angles without basis reconciliation.
Kim, Chil-Min +3 more
core +1 more source
A Bridge Transformer Network With Deep Graph Convolution for Hyperspectral Image Classification
ABSTRACT Transformers have been widely applied to hyperspectral image classification, leveraging their self‐attention mechanism for powerful global modelling. However, two key challenges remain as follows: excessive memory and computational costs from calculating correlations between all tokens (especially as image size or spectral bands increase) and ...
Yuquan Gan +5 more
wiley +1 more source
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo +3 more
wiley +1 more source
Summary Introduction Demand for surgical treatment is growing and patient complexity is increasing. The NHS England standard contract now requires that pre‐operative services risk stratify and optimise patients awaiting surgery. However, current pre‐operative workflows (whether electronic or paper‐based) remain based primarily on resource‐intensive ...
Alwyn Kotzé +7 more
wiley +1 more source
Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ...
Shunfang Hu +5 more
doaj +1 more source
Implicit Promises and the Timing of Defined‐Benefit Pension Plan Freezes
ABSTRACT Firms time defined‐benefit (DB) plan freezes after CEO turnovers to protect CEO retirement benefits from cost cuts affecting the wider workforce. We document a significant increase in voluntary CEO turnovers just before the freeze, without notable post‐freeze changes.
Zacharias Petrou, Adamos Vlittis
wiley +1 more source
Cache-Oblivious Peeling of Random Hypergraphs
The computation of a peeling order in a randomly generated hypergraph is the most time-consuming step in a number of constructions, such as perfect hashing schemes, random $r$-SAT solvers, error-correcting codes, and approximate set encodings.
Belazzougui, Djamal +4 more
core +1 more source
Abstract The Anti‐Coercion Instrument (ACI), the most powerful tool in the EU's geoeconomic arsenal, has its origins in the first Trump US presidency and has recently been brandished again as a potential response to Trump's coercive tariffs. Its centrality to the EU's ‘geoeconomic turn’ and the twists and turns of its legislative history have been ...
Jaša Veselinovič
wiley +1 more source

