Results 131 to 140 of about 1,647,817 (351)
Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations
We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code ...
Sebastian Raubitzek +3 more
doaj +1 more source
New financial order : recommendations by the Issing Committee ; preparing G-20 – Washington, November 15, 2008 [PDF]
Content New Financial Architecture (Short Version) 1. Purpose of the paper – causes of the crisis 2. Recommendations 2.1. Incentives 2.2. Transparency 2.3. Regulation and Supervision 2.4. International Institutions 3.
Asmussen, Jörg +5 more
core
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner +9 more
wiley +1 more source
Monetary Policy Transparency in the Inflation Targeting [PDF]
This paper quantifies transparency of monetary policy in the three EU New Member States that have adopted direct inflation targeting strategy. Two measures of transparency are applied. The institutional measure reflects the extent to which a central bank
Artur Radziwill +2 more
core
When Pay is Kept Secret, the Implications on Performance are Revealing [PDF]
Key Findings Pay secrecy (in contrast to pay transparency) negatively affects the performance of individuals who are less tolerant to inequity; Pay secrecy negatively affects the perception of the link between performance and pay in individuals ...
Bamberger, Peter, Belogolovsky, Elena
core +1 more source
Synchrotron Radiation for Quantum Technology
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader +10 more
wiley +1 more source
Data Obfuscation for Privacy-Preserving Machine Learning Using Quantum Symmetry Properties
This study introduces a data obfuscation technique that leverages the exponential map of Lie-group generators. Originating from quantum machine learning frameworks, the method injects controlled noise into these generators, deliberately breaking symmetry
Sebastian Raubitzek +3 more
doaj +1 more source
A self‐sustaining solar photoelectrochemical cell (SS‐PEC) is developed to recover uranium from aqueous UO22+ with concurrent organic oxidation and electricity production. The monolithical photoanode directly captures electrons from organic compounds, leading to the oxidation of organic compounds and the decomposition of uranium‐organic complexes ...
Yumei Wang +7 more
wiley +1 more source
Transparency in Coverage Data and Variation in Prices for Common Health Care Services [PDF]
Benjamin Chartock +2 more
openalex +1 more source

