Results 41 to 50 of about 106,354 (248)

AI in chemical engineering: From promise to practice

open access: yesAIChE Journal, EarlyView.
Abstract Artificial intelligence (AI) in chemical engineering has moved from promise to practice: physics‐aware (gray‐box) models are gaining traction, reinforcement learning complements model predictive control (MPC), and generative AI powers documentation, digitization, and safety workflows.
Jia Wei Chew   +4 more
wiley   +1 more source

Attacks on One Designated Verifier Proxy Signature Scheme

open access: yesJournal of Applied Mathematics, 2012
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier.
Baoyuan Kang
doaj   +1 more source

Sparsity oracle inequalities for the Lasso

open access: yes, 2007
This paper studies oracle properties of $\ell_1$-penalized least squares in nonparametric regression setting with random design. We show that the penalized least squares estimator satisfies sparsity oracle inequalities, i.e., bounds in terms of the ...
Bunea, Florentina   +2 more
core   +1 more source

Large Language Model in Materials Science: Roles, Challenges, and Strategic Outlook

open access: yesAdvanced Intelligent Discovery, EarlyView.
Large language models (LLMs) are reshaping materials science. Acting as Oracle, Surrogate, Quant, and Arbiter, they now extract knowledge, predict properties, gauge risk, and steer decisions within a traceable loop. Overcoming data heterogeneity, hallucinations, and poor interpretability demands domain‐adapted models, cross‐modal data standards, and ...
Jinglan Zhang   +4 more
wiley   +1 more source

Oblivious Transfer Based on NTRUEncrypt

open access: yesIEEE Access, 2018
Oblivious transfer (OT) is the most fundamental process in cryptosystems and serves as the basic building block for implementing protocols, such as the secure multi-party computation and the fair electronic contract.
Bo Mi   +4 more
doaj   +1 more source

Advanced Experiment Design Strategies for Drug Development

open access: yesAdvanced Intelligent Discovery, EarlyView.
Wang et al. analyze 592 drug development studies published between 2020 and 2024 that applied design of experiments methodologies. The review surveys both classical and emerging approaches—including Bayesian optimization and active learning—and identifies a critical gap between advanced experimental strategies and their practical adoption in ...
Fanjin Wang   +3 more
wiley   +1 more source

Lower Bounds on Signatures from Symmetric Primitives [PDF]

open access: yes, 2019
We show that every construction of one-time signature schemes from a random oracle achieves black-box security at most $2^{(1+o(1))q}$, where $q$ is the total number of oracle queries asked by the key generation, signing, and verification algorithms ...
Barak, Boaz, Mahmoody, Mohammad
core   +1 more source

Strengths and Weaknesses of Quantum Computing

open access: yes, 1996
Recently a great deal of attention has focused on quantum computation following a sequence of results suggesting that quantum computers are more powerful than classical probabilistic computers. Following Shor's result that factoring and the extraction of
Charles H. Bennett   +4 more
core   +4 more sources

Experimental Demonstration of Radio‐Frequency Hong‐Ou‐Mandel Interference With Emulated Single‐Photon States

open access: yesAdvanced Physics Research, EarlyView.
We report an experimental demonstration of room‐temperature Hong–Ou–Mandel interference at a radio‐wave frequency of 120 MHz using emulated single‐photon states conditionally built from classical phase‐averaged coherent states. Our technique and results open the door to realizing quantum protocols in frequency ranges where standard quantum technologies
A. Sheleg   +9 more
wiley   +1 more source

Quantum Security of a Compact Multi-Signature

open access: yesCryptography
With the rapid advances in quantum computing, quantum security is now an indispensable property for any cryptographic system. In this paper, we study how to prove the security of a complex cryptographic system in the quantum random oracle model. We first
Shaoquan Jiang
doaj   +1 more source

Home - About - Disclaimer - Privacy