Results 71 to 80 of about 94,999 (279)
Non-malleable codes for space-bounded tampering [PDF]
Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010—are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t.
A Faonio +30 more
core +2 more sources
Bayesian clustering of multivariate extremes
Abstract The asymptotic dependence structure between multivariate extreme values is fully characterized by their projections on the unit simplex. Under mild conditions, the only constraint on the resulting distributions is that their marginal means must be equal, which results in a nonparametric model that can be difficult to use in applications ...
Sonia Alouini, Anthony C. Davison
wiley +1 more source
Non-uniformity and Quantum Advice in the Quantum Random Oracle Model [PDF]
Qipeng Liu
openalex +1 more source
Temperature generally drives latitudinal patterns in the strength of trophic interactions, including consumption rates. However, local community and other environmental conditions might also affect consumption, disrupting latitudinal gradients, which results in complex large‐scale patterns.
Catalina A. Musrri +6 more
wiley +1 more source
Correlative species distribution models (SDMs) are quantitative tools in biogeography and macroecology. Building upon the ecological niche concept, they correlate environmental covariates to species presence to model habitat suitability and predict species distributions.
Moritz Klaassen +3 more
wiley +1 more source
Time-Lock Puzzles in the Random Oracle Model [PDF]
A time-lock puzzle is a mechanism for sending messages "to the future". The sender publishes a puzzle whose solution is the message to be sent, thus hiding it until enough time has elapsed for the puzzle to be solved. For time-lock puzzles to be useful, generating a puzzle should take less time than solving it. Since adversaries may have access to many
Mohammad Mahmoody +2 more
openaire +1 more source
Distribution-Aware Sampling and Weighted Model Counting for SAT [PDF]
Given a CNF formula and a weight for each assignment of values to variables, two natural problems are weighted model counting and distribution-aware sampling of satisfying assignments. Both problems have a wide variety of important applications.
Chakraborty, Supratik +4 more
core +4 more sources
The wind energy potential of Khaf was evaluated for 2025 using 15 years of wind data combined with advanced forecasting models, SARIMAX and Prophet. This integrated framework enables precise estimation of wind power density and optimal turbine selection, paving the way for the efficient and sustainable development of wind farms in the region.
Mohammad Amin Valizadeh +3 more
wiley +1 more source
Random Oracle Model Of Information Hiding System
{"references": ["Francois Cayre, Caroline Fontaine, and Teddy Furon, \"Watermarking\nsecurity: theory and practice,\" IEEE Transactions on Signal Processing,\nvol. 53, pp. 3976-3987, Oct. 2005.", "C. Cachin, \"An information-theoretic model for steganography,\" in\nInformation Hiding: Second International Workshop, vol.
Jiang, Nan, Wang, Jian
openaire +1 more source
Between Consistency and Adaptation: How Middle Managers Shape Compensation System Implementation
ABSTRACT The success of a human resource management (HRM) system or subsystem, such as a compensation system, hinges on its implementation—yet the microfoundations of this process remain underexplored. To address this gap, we conducted two studies. Study 1 surveyed middle managers and employees in six organizations to examine their attributions of ...
Aino Tenhiälä +3 more
wiley +1 more source

