Results 31 to 40 of about 68,896 (312)
Efficient Private Circuits with Precomputation
At CHES 2022, Wang et al. described a new paradigm for masked implementations using private circuits, where most intermediates can be precomputed before the input shares are accessed, significantly accelerating the online execution of masked functions ...
Weijia Wang +3 more
doaj +1 more source
Robust Recovery of Subspace Structures by Low-Rank Representation [PDF]
In this work we address the subspace recovery problem. Given a set of data samples (vectors) approximately drawn from a union of multiple subspaces, our goal is to segment the samples into their respective subspaces and correct the possible errors as ...
Lin, Zhouchen +5 more
core +1 more source
Mind Your Path: On (Key) Dependencies in Differential Characteristics
Cryptanalysts have been looking for differential characteristics in ciphers for decades and it remains unclear how the subkey values and more generally the Markov assumption impacts exactly their probability estimation.
Thomas Peyrin, Quan Quan Tan
doaj +1 more source
AbstractThe zinc finger transcription factor Slug (Snai2) serves a wide variety of functions in the epidermis, with roles in skin development, hair growth, wound healing, skin cancer, and sunburn. Slug is expressed in basal keratinocytes and hair follicles where it is important in maintaining epidermal homeostasis.
Stephanie H, Shirley +3 more
openaire +2 more sources
Variational Bayesian Inference in High-Dimensional Linear Mixed Models
In high-dimensional regression models, the Bayesian lasso with the Gaussian spike and slab priors is widely adopted to select variables and estimate unknown parameters. However, it involves large matrix computations in a standard Gibbs sampler.
Jieyi Yi, Niansheng Tang
doaj +1 more source
Property Rights: Long and Skinny
This paper explores the relationship between private and common property. It starts with the state of nature, works its way through Roman law, and finishes with a discussion of the application of these principles in a modern context.
Richard A. Epstein
doaj +1 more source
QR Factorization of Tall and Skinny Matrices in a Grid Computing Environment [PDF]
Previous studies have reported that common dense linear algebra operations do not achieve speed up by using multiple geographical sites of a computational grid. Because such operations are the building blocks of most scientific applications, conventional
Camille Coti +14 more
core +8 more sources
#Skinny girls: young girls’ learning processes and health-related social media
This paper provides in-depth knowledge into young girls’ learning processes in relation to physical activity, diet/nutrition and body image. Data were generated from interviews with 49 girls (age 13–15) in England.
Victoria A. Goodyear +3 more
semanticscholar +1 more source
Analysis of AES, SKINNY, and Others with Constraint Programming
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems.
Siwei Sun +6 more
doaj +1 more source
CUR Decompositions, Similarity Matrices, and Subspace Clustering [PDF]
A general framework for solving the subspace clustering problem using the CUR decomposition is presented. The CUR decomposition provides a natural way to construct similarity matrices for data that come from a union of unknown subspaces $\mathscr{U ...
Aldroubi, Akram +3 more
core +3 more sources

