Results 111 to 120 of about 94,999 (279)

Evolutionary legacies structure the geography of seagrass traits across the world's oceans

open access: yesNew Phytologist, EarlyView.
Summary Traits modulate species' ability to track shifts in climate, yet the extent to which traits have been shaped by the contemporary environment and/or historical processes remains poorly understood. Here, we fill this gap for the world's seagrasses, habitat‐forming species that provide critical ecosystem services.
Nestor E. Bosch   +2 more
wiley   +1 more source

Practical Lattice-Based Multisignature Schemes for Blockchains

open access: yesIEEE Access, 2019
Compact multisignature is vital for shrinking the signature size of decentralized blockchain. All practical compact multisignature schemes have been constructed from the discrete logarithm problem which is potentially vulnerable to quantum computing ...
Changshe Ma, Mei Jiang
doaj   +1 more source

On Statistical Query Sampling and NMR Quantum Computing

open access: yes, 2003
We introduce a ``Statistical Query Sampling'' model, in which the goal of an algorithm is to produce an element in a hidden set $Ssubseteqbit^n$ with reasonable probability.
Blum, Avrim, Yang, Ke
core   +1 more source

University Collaboration and Digitalization in SMEs: The Mediating Role of Managers' Digital Knowledge

open access: yesR&D Management, EarlyView.
ABSTRACT Digital technologies change the nature of product and service development and challenge established firms to adapt to the new digital environment. As small and medium‐sized enterprises (SMEs), in particular, lack the resources necessary to digitally transform their business, they are forced to find new strategies to stay competitive in a ...
Christian Schröder   +3 more
wiley   +1 more source

Variable selection via thresholding

open access: yesScandinavian Journal of Statistics, EarlyView.
Abstract Variable selection comprises an important step in many modern statistical inference procedures. In the regression setting, when estimators cannot shrink irrelevant signals to zero, covariates without relationships to the response often manifest small but nonzero regression coefficients.
Ka Long Keith Ho, Hien Duy Nguyen
wiley   +1 more source

A Machine-Checked Formalization of the Random Oracle Model [PDF]

open access: yes, 2006
Most approaches to the formal analysis of cryptography protocols make the perfect cryptographic assumption, which entails for example that there is no way to obtain knowledge about the plaintext pertaining to a ciphertext without knowing the key. Ideally, one would prefer to abandon the perfect cryptography hypothesis and reason about the computational
Gilles Barthe, Sabrina Tarento
openaire   +1 more source

Faster Convex Optimization: Simulated Annealing with an Efficient Universal Barrier

open access: yes, 2015
This paper explores a surprising equivalence between two seemingly-distinct convex optimization methods. We show that simulated annealing, a well-studied random walk algorithms, is directly equivalent, in a certain sense, to the central path interior ...
Abernethy, Jacob, Hazan, Elad
core  

(Co‐)Reference All the Way Down: A Unified Theory of (Pro) Nominals in Ordinary English

open access: yesTheoria, EarlyView.
ABSTRACT This essay joins two themes, both arising from Kripke's inspiring ideas in the theory of reference. The first theme concerns reference in general. The second examines the notion of co‐reference and the role it plays in a unified theory of pronouns for natural language.
Jessica Pepp, Joseph Almog
wiley   +1 more source

A Novel Identity-Based Signcryption Scheme in the Standard Model

open access: yesInformation, 2017
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a
Yueying Huang, Junjie Yang
doaj   +1 more source

Home - About - Disclaimer - Privacy