Results 21 to 30 of about 564,681 (292)

Last glacial maximum radiative forcing from mineral dust aerosols in an Earth System model [PDF]

open access: yes, 2015
The mineral dust cycle in pre-industrial (PI) and last glacial maximum (LGM) simulations with the CMIP5 model HadGEM2-A is evaluated. The modeled global dust cycle is enhanced at the LGM, with larger emissions in the Southern hemisphere, consistent with ...
Hopcroft, Peter   +3 more
core   +1 more source

Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]

open access: yesJisuanji gongcheng, 2016
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj   +1 more source

Efficient numerical schemes for viscoplastic avalanches. Part 2: the 2D case [PDF]

open access: yes, 2018
This paper deals with the numerical resolution of a shallow water viscoplastic flow model. Viscoplastic materials are characterized by the existence of a yield stress: below a certain critical threshold in the imposed stress, there is no deformation and ...
Fernández Nieto, Enrique Domingo   +2 more
core   +3 more sources

A Combinatorial Approach to Threshold Schemes [PDF]

open access: yesSIAM Journal on Discrete Mathematics, 1988
We investigate the combinatorial properties of threshold schemes. Informally, a (t,w)-threshold scheme is a way of distributing partial information (shadows) to w participants, so that any t of them can easily calculate a key, but no subset of fewer than t participants can determine the key.
Stinson, D. R., Vanstone, S. A.
openaire   +1 more source

Physical Layer Authentication Based on Nonlinear Kalman Filter for V2X Communication

open access: yesIEEE Access, 2020
Authentication is an important guarantee for vehicle to everything (V2X) commercial deployment. Currently, V2X security often use identity authentication schemes based on public key infrastructure (PKI).
Jian Wang   +4 more
doaj   +1 more source

Method of Constructing a Nonlinear Approximating Scheme of a Complex Signal: Application Pattern Recognition

open access: yesMathematics, 2021
A method for identification of structures of a complex signal and noise suppression based on nonlinear approximating schemes is proposed. When we do not know the probability distribution of a signal, the problem of identifying its structures can be ...
Oksana Mandrikova   +2 more
doaj   +1 more source

Reaching consensus for membership dynamic in secret sharing and its application to cross-chain

open access: yesHigh-Confidence Computing, 2023
The communication efficiency optimization, censorship resilience, and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant (BFT) consensus.
Yan Zhu   +5 more
doaj   +1 more source

Concatenation Schemes for Topological Fault-tolerant Quantum Error Correction [PDF]

open access: yesQuantum, 2023
We investigate a family of fault-tolerant quantum error correction schemes based on the concatenation of small error detection or error correction codes with the three-dimensional cluster state.
Zhaoyi Li, Isaac Kim, Patrick Hayden
doaj   +1 more source

Threshold growth has a limited role in differentiating hepatocellular carcinoma from other focal hepatic lesions

open access: yesBMC Medical Imaging, 2023
Background and Objective The role of threshold growth, as one of the major features (MFs) of hepatocellular carcinoma (HCC) in the Liver Imaging Reporting and Data System (LI-RADS) is inconsistent.
Rong Lyu   +7 more
doaj   +1 more source

Evaluation of classical spatial-analysis schemes of extreme rainfall [PDF]

open access: yesNatural Hazards and Earth System Sciences, 2012
Extreme rainfall is classically estimated using raingauge data at raingauge locations. An important related issue is to assess return levels of extreme rainfall at ungauged sites. Classical methods consist in interpolating extreme-value models. In this
D. Ceresetti   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy