Results 71 to 80 of about 118,403 (212)

A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources

open access: yesSoftware: Practice and Experience, Volume 55, Issue 12, Page 1915-1930, December 2025.
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas   +6 more
wiley   +1 more source

A depth–spatial alignment method for multi‐source point clouds on large‐scale construction sites

open access: yesComputer-Aided Civil and Infrastructure Engineering, Volume 40, Issue 29, Page 5719-5746, 9 December 2025.
Abstract Three‐dimensional (3D) site models form the digital foundation for modern construction management. However, creating these models from multi‐source imagery presents two key challenges: accurately georeferencing camera poses during wide‐view acquisition and precisely aligning multiple point clouds that possess non‐uniform accuracy.
Tao Zhong   +5 more
wiley   +1 more source

Scalable and Sustainable Deep Learning via Randomized Hashing

open access: yes, 2016
Current deep learning architectures are growing larger in order to learn from complex datasets. These architectures require giant matrix multiplication operations to train millions of parameters.
Chen Wenlin   +8 more
core   +1 more source

Advanced Microfluidics for Single Cell‐Based Cancer Research

open access: yesAdvanced Science, Volume 12, Issue 41, November 6, 2025.
Cutting‐edge microfluidic platforms are transforming single‐cell cancer research. This review highlights advanced technologies, from droplet microfluidics to tumour‐chips, that enable functional and spatial single‐cell analyses. By integrating biosensing, immune components, and patient‐derived materials, these systems offer new insights into tumour ...
Adriana Carneiro   +10 more
wiley   +1 more source

Key recycling in authentication

open access: yes, 2014
In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad.
Portmann, Christopher
core   +1 more source

Hardware Security for Edge Computing Via CMOS‐Compatible Multi‐Level Flash Memory with Hash‐Based Key Generation

open access: yesAdvanced Electronic Materials, Volume 11, Issue 19, November 18, 2025.
A CMOS‐compatible flash memory structure with multi‐level programming produces reliable and reproducible physically unclonable functions (PUFs) for secure IoT applications. Device‐specific variations in flat‐band voltage enable scalable key generation without standby power.
Kyumin Sim   +6 more
wiley   +1 more source

Continuum armed bandit problem of few variables in high dimensions

open access: yes, 2014
We consider the stochastic and adversarial settings of continuum armed bandits where the arms are indexed by [0,1]^d. The reward functions r:[0,1]^d -> R are assumed to intrinsically depend on at most k coordinate variables implying r(x_1,..,x_d) = g(x_ ...
Gärtner, Bernd, Tyagi, Hemant
core   +1 more source

A Fusion Filtering‐Based Method for Extracting Spectral Trajectories of Non‐Repetitive Transient Weak Signals in Multiple Frequency Bands for Industrial Control Networks

open access: yesEngineering Reports, Volume 7, Issue 11, November 2025.
This study introduces a fusion filtering‐based method to accurately extract spectral trajectories of non‐repetitive transient weak signals in industrial control networks, enhancing signal clarity and reliability across multiple frequency bands. ABSTRACT In response to the problem of difficulty in accurately extracting spectral trajectories of multi ...
Changzhong Gao   +4 more
wiley   +1 more source

Machine Learning Enables Alignment‐Free Distance Calculation and Phylogenetic Placement Using k‐Mer Frequencies

open access: yesMolecular Ecology Resources, Volume 25, Issue 8, November 2025.
ABSTRACT A key application of phylogenetics in ecological studies is identifying unknown sequences with respect to known ones. This goal can be formalised as assigning taxonomic labels or inserting sequences into a reference phylogenetic tree (phylogenetic placement). Much attention has been paid to the phylogenetic placement of short fragments used in
Eleonora Rachtman   +2 more
wiley   +1 more source

MINIMAL AND ALMOST MINIMAL PERFECT HASH FUNCTION SEARCH WITH APPLICATION TO NATURAL LANGUAGE LEXICON DESIGN

open access: yesComputational Linguistics, 2022
NICK CERCONE, MAX KRAUSE, JOHN BOATES
doaj   +1 more source

Home - About - Disclaimer - Privacy