Results 121 to 130 of about 94,999 (279)

Security of Digital Signature Schemes in Weakened Random Oracle Models [PDF]

open access: bronze, 2008
Akira Numayama   +2 more
openalex   +1 more source

Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations [PDF]

open access: yes, 2018
Ideas from Fourier analysis have been used in cryptography for the last three decades. Akavia, Goldwasser and Safra unified some of these ideas to give a complete algorithm that finds significant Fourier coefficients of functions on any finite abelian ...
Galbraith, Steven D.   +2 more
core   +1 more source

Language machines: Toward a linguistic anthropology of large language models

open access: yesJournal of Linguistic Anthropology, Volume 36, Issue 1, May 2026.
Abstract Large language models (LLMs) challenge long‐standing assumptions in linguistics and linguistic anthropology by generating human‐like language without relying on rule‐based structures. This introduction to the special issue Language Machines calls for renewed engagement with LLMs as socially embedded language technologies.
Siri Lamoureaux   +2 more
wiley   +1 more source

Advancing Structure Elucidation with a Flexible Multi‐Spectral AI Model

open access: yesAngewandte Chemie, Volume 138, Issue 2, 9 January 2026.
The MultiModalSpectralTransformer (MMST) is an automated tool that helps identify molecular structures by combining different spectroscopic methods, including 2D and 1D NMR, IR, and MS, within a unified AI framework. Trained on 4 million simulated compounds, MMST achieves 72% top‐1 accuracy in molecular identification and adapts to new chemical spaces ...
Martin Priessner   +6 more
wiley   +2 more sources

A Secure Authentication Protocol Supporting Efficient Handover for UAV

open access: yesMathematics
Unmanned Aerial Vehicles (UAVs) are increasingly pivotal in operations such as flood rescue, wildfire surveillance, and covert military endeavors, with their integration into the Internet of Things (IoT) networks broadening the scope of services they ...
Kang Wen   +5 more
doaj   +1 more source

Human tests for machine models: What lies “Beyond the Imitation Game”?

open access: yesJournal of Linguistic Anthropology, Volume 36, Issue 1, May 2026.
Abstract Benchmarking large language models (LLMs) is a key practice for evaluating their capabilities and risks. This paper considers the development of “BIG Bench,” a crowdsourced benchmark designed to test LLMs “Beyond the Imitation Game.” Drawing on linguistic anthropological and ethnographic analysis of the project's GitHub repository, we examine ...
Noya Kohavi, Anna Weichselbraun
wiley   +1 more source

The costs of Suaahara II, a complex scaled‐up multisectoral nutrition programme in Nepal

open access: yesMaternal &Child Nutrition, Volume 22, Issue 1, March 2026.
Suaahara II, a scaled up multisectoral nutrition programme in Nepal, cost US$132 per programme participant (mother in the 1000‐day period). Opportunity costs of volunteer and participant time are high, accounting for 47% of total costs. Complex multisectoral programmes require significant resources to ensure coordination and support at national and ...
Esther M. Choo   +8 more
wiley   +1 more source

A Roadmap for Studying the Impact of Pharmacist Board Certification on Patient Outcomes: Feasibility, Applicability, and Methodological Considerations

open access: yesJACCP: JOURNAL OF THE AMERICAN COLLEGE OF CLINICAL PHARMACY, Volume 9, Issue 2, February 2026.
ABSTRACT The American College of Clinical Pharmacy (ACCP) advocates for board certification of clinical pharmacists in one of the recognized specialties as a fundamental qualification and requirement for providing and supervising trainees in the provision of direct patient care.
Robert J. DiDomenico   +10 more
wiley   +1 more source

Pseudorandomness in the (Inverseless) Haar Random Oracle Model

open access: yes
We study the (in)feasibility of quantum pseudorandom notions in a quantum analog of the random oracle model, where all the parties, including the adversary, have oracle access to the same Haar random unitary. In this model, we show the following: - (Unbounded-query secure) pseudorandom unitaries (PRU) exist.
Ananth, Prabhanjan   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy