Results 31 to 40 of about 1,321,976 (196)

Enhanced secure key exchange systems based on the Johnson-noise scheme [PDF]

open access: yes, 2013
We introduce seven new versions of the Kirchhoff-Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme and a new transient protocol for practically-perfect security.
Kish, Laszlo B.
core   +3 more sources

Van Lambalgen's Theorem for uniformly relative Schnorr and computable randomness

open access: yes, 2013
We correct Miyabe's proof of van Lambalgen's Theorem for truth-table Schnorr randomness (which we will call uniformly relative Schnorr randomness). An immediate corollary is one direction of van Lambalgen's theorem for Schnorr randomness.
Miyabe, Kenshi, Rute, Jason
core   +1 more source

On interpreting truth tables and relevant truth table logic.

open access: yesNotre Dame Journal of Formal Logic, 1992
This paper is a critique of \textit{N. Tennant} [``Truth table logic'', Notre Dame J. Formal Logic 30, 459-484 (1989; Zbl 0698.03036)]. It demonstrates that no logic may be ``read off'' from standard truth tables without further assumptions, and that numerous different logics, including First Degree Entailment, may be read off, depending on what these ...
openaire   +2 more sources

An Algorithmic Argument for Nonadaptive Query Complexity Lower Bounds on Advised Quantum Computation

open access: yes, 2003
This paper employs a powerful argument, called an algorithmic argument, to prove lower bounds of the quantum query complexity of a multiple-block ordered search problem in which, given a block number i, we are to find a location of a target keyword in an
A. Ambainis   +9 more
core   +3 more sources

On the Complexity of Computing Two Nonlinearity Measures [PDF]

open access: yes, 2014
We study the computational complexity of two Boolean nonlinearity measures: the nonlinearity and the multiplicative complexity. We show that if one-way functions exist, no algorithm can compute the multiplicative complexity in time $2^{O(n)}$ given the ...
A.A. Razborov   +10 more
core   +1 more source

Automatic design of digital synthetic gene circuits.

open access: yesPLoS Computational Biology, 2011
De novo computational design of synthetic gene circuits that achieve well-defined target functions is a hard task. Existing, brute-force approaches run optimization algorithms on the structure and on the kinetic parameter values of the network.
Mario A Marchisio, Jörg Stelling
doaj   +1 more source

BigEAR: Inferring the Ambient and Emotional Correlates from Smartphone-based Acoustic Big Data [PDF]

open access: yes, 2016
This paper presents a novel BigEAR big data framework that employs psychological audio processing chain (PAPC) to process smartphone-based acoustic big data collected when the user performs social conversations in naturalistic scenarios.
Dubey, Harishchandra   +2 more
core   +3 more sources

Same Essence, Different Forms: The Qur'anic-Mystical View of Allameh Ṭabaṭabaʾi about the Unity of Religions and the Principles of Inter-Religious Dialogue [PDF]

open access: yesComparative Theology
Seyyed Mohammad Hossein Ṭabaṭabaʾi (1281-1360 A.H./ 1904-1981 A.D.) is a contemporary Shiite commentator and mystic whose mystical approach could be clearly seen in his inclusive interpretation of the plurality of religions.
Mohammad Javdan
doaj   +1 more source

Understanding perceptions of recovery from psychological distress in Sierra Leone through qualitative comparative analysis

open access: yesHumanities & Social Sciences Communications, 2021
Qualitative comparative analysis (QCA) is a relatively new method that examines causal complexity. Its use in mental health research is nascent. In low-income and fragile settings, with weak mental health service provision, identifying pathways of ...
Kanykey Jailobaeva   +4 more
doaj   +1 more source

Quantum parallelism of the controlled-NOT operation: an experimental criterion for the evaluation of device performance [PDF]

open access: yes, 2004
It is shown that a quantum controlled-NOT gate simultaneously performs the logical functions of three distinct conditional local operations. Each of these local operations can be verified by measuring a corresponding truth table of four local inputs and ...
Holger F. Hofmann   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy