Results 81 to 90 of about 105,934 (253)
Enhancing Study Design and Analysis of MR Imaging Markers Through Measurement Error Modeling
ABSTRACT Background Measurement error in imaging reduces statistical power and potentially biases parameter estimation, compromising study reliability. Purpose To introduce a dual data collection design (reliability and main datasets) to quantify measurement error and apply regression calibration to correct error‐prone imaging markers, thereby ...
Xiaofeng Wang +8 more
wiley +1 more source
Von Neumann Entropy Penalization and Low Rank Matrix Estimation [PDF]
A problem of statistical estimation of a Hermitian nonnegatively definite matrix of unit trace (for instance, a density matrix in quantum state tomography) is studied.
Koltchinskii, Vladimir
core +1 more source
Connecting the distribution and diversification of marine plants
Integration of the evolutionary history with distribution of extant species is necessary to explain present‐day diversity, particularly for ‘foundation' species, such as seagrasses, which create habitats of socioecological relevance. Here, we resolved if varying evolutionary history of seagrass families has imprinted the distribution ranges of extant ...
Fernando Tuya +3 more
wiley +1 more source
Finding Minimum‐Cost Explanations for Predictions Made by Tree Ensembles
ABSTRACT The ability to reliably explain why a machine learning model arrives at a particular prediction is crucial when used as decision support by human operators of critical systems. The provided explanations must be provably correct, and preferably without redundant information, called minimal explanations.
John Törnblom +2 more
wiley +1 more source
Provable data possession scheme with authentication
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI +3 more
doaj
On Obfuscation with Random Oracles [PDF]
Assuming trapdoor permutations, we show that there exist function families that cannot be VBB-obfuscated even if both the obfuscator and the obfuscated program have access to a random oracle. Specifically, these families are the robust unobfuscatable families of [Bitansky-Paneth, STOC 13].
Ran Canetti +2 more
openaire +1 more source
Verifiable Random Functions (VRFs) [PDF]
A Verifiable Random Function (VRF) is the public-key version of a keyed cryptographic hash. Only the holder of the private key can compute the hash, but anyone with public key can verify the correctness of the hash.
Goldberg, Sharon +3 more
core
A Resource Efficient Ising Model‐Based Quantum Sudoku Solver
ABSTRACT Background Quantum algorithms exploit superposition and parallelism to address complex combinatorial problems, many of which fall into the non‐polynomial (NP) class. Sudoku, a widely known logic‐based puzzle, is proven to be NP‐complete and thus presents a suitable testbed for exploring quantum optimization approaches.
Wen‐Li Wang +5 more
wiley +1 more source
Random Oracles with(out) Programmability [PDF]
This paper investigates the Random Oracle Model (ROM) feature known as programmability, which allows security reductions in the ROM to dynamically choose the range points of an ideal hash function. This property is interesting for at least two reasons: first, because of its seeming artificiality (no standard model hash function is known to support such
Marc Fischlin +5 more
openaire +1 more source
AUGURAL TERRITORIES: On the Prophetic Organizing of the Mid‐range
Abstract In this article I introduce the concept of augural territories to theorize the urbanism that emerged during pandemic lockdowns. I draw on ethnographic research in Madrid to examine how community‐based responses—including mutual aid networks, food pantries and neighbourhood associations—disrupted the spatial and temporal logics of territorial ...
Alberto Corsín Jiménez
wiley +1 more source

