Results 301 to 310 of about 153,790 (328)
Some of the next articles are maybe not open access.
FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256
Microprocessors and microsystems, 2013I. Algredo-Badillo +3 more
semanticscholar +1 more source
Dissecting racial bias in an algorithm used to manage the health of populations
Science, 2019Ziad Obermeyer, Sendhil Mullainathan
exaly
A fault attack on a hardware-based implementation of the secure hash algorithm SHA-512
International Conference on Reconfigurable Computing and FPGAs, 2013Abdulhadi Shoufan
semanticscholar +1 more source
The Whale Optimization Algorithm
Advances in Engineering Software, 2016Seyedali Mirjalili, Andrew J Lewis
exaly
Slime mould algorithm: A new method for stochastic optimization
Future Generation Computer Systems, 2020Hui-Ling Chen +2 more
exaly
Mastering the game of Go with deep neural networks and tree search
Nature, 2016David Silver, Aja Huang, Arthur Guez
exaly
Evolution of CLL treatment — from chemoimmunotherapy to targeted and individualized therapy
Nature Reviews Clinical Oncology, 2018Jan A Burger, Susan M O'brien
exaly

