Results 101 to 110 of about 15,909 (208)

Block scheduling in practice: An optimal decomposition strategy for nonidentical operating rooms

open access: yesDecision Sciences, EarlyView.
Abstract We develop and implement a Master Surgery Schedule for a real‐life hospital, assigning operating room (OR) time to surgical specialties over a multi‐week horizon. Through action research, we identify a critical operational challenge: the issue of split blocks. Split blocks allow two specialties to share an OR on the same day—one in the morning,
Vincent J. J. van Ham   +2 more
wiley   +1 more source

A Meet-in-the-middle Attack Method of Deoxys-BC [PDF]

open access: yesJisuanji kexue
The Deoxys-BC adopting the SPN structure and TWEAK framework is a lightweight tweakable block cipher published at ASIACRPYPT 2014.By researching the internal characteristic and key schedule of the Deoxys-BC,a 6-round meet-in-the-middle distinguisher ...
LI Zheng, LI Manman, CHEN Shaozhen
doaj   +1 more source

Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE [PDF]

open access: yes, 2016
Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases.
C Beierle   +12 more
core   +2 more sources

AI literacy: A core practice in world language education

open access: yesForeign Language Annals, EarlyView.
Abstract The emergence of artificial intelligence (AI) innovations like ChatGPT presents new opportunities and challenges for world languages (WL) education. WL teacher education programs must prepare preservice teachers with AI literacy to help them effectively integrate these technologies into teaching.
Xinyue Lu   +2 more
wiley   +1 more source

Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM

open access: yesCryptography, 2019
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi   +3 more
doaj   +1 more source

Memory Encryption for Smart Cards Barı¸s Ege 1, Elif Bilge Kavun 2,andTolgaYalçın 2 [PDF]

open access: yes
. With the latest advances in attack methods, it has become increasingly more difficult to secure data stored on smart cards, especially on non-volatile memories (NVMs), which may store sensitive information such as cryptographic keys or program code ...

core  

The Culture Clash of AI Adoption in Lean Quality Management. Resolving the Tensions at Siemens Electronics Works Amberg

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT Artificial intelligence (AI) brings great potential for manufacturers, but clashes with the established culture due to the unexplainable and opaque nature of the solutions it provides. Having little experience in AI and machine learning (ML), most manufacturing leaders experience barriers implementing AI.
Benjamin van Giffen   +5 more
wiley   +1 more source

BBB Secure Arbitrary Length Tweak TBC from n-bit Block Ciphers [PDF]

open access: yes
At FSE\u2715, Mennink introduced two tweakable block ciphers, $\widetilde{F}[1]$ and $\widetilde{F}[2]$, both utilizing an $n$-bit tweak. It was demonstrated that $\widetilde{F}[1]$ is secure for up to $2^{2n/3}$ queries, while $\widetilde{F}[2]$ is ...
Arghya Bhattacharjee   +4 more
core  

Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound [PDF]

open access: yes, 2018
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a $wn$-bit (tweakable) block cipher from $n$-bit public permutations.
Benoît Cogliati, Jooyoung Lee
core  

Old Skool Spinning and Syncing: Memory, Technologies, and Occupational Membership in a DJ Community

open access: yesJournal of Management Studies, EarlyView.
Abstract We show how technology and its temporal instantiations act as material‐relational mnemonic devices that provide temporal anchors for collective remembering in occupations and form the basis of what we call an 'occupational mnemonic community'.
Hamid Foroughi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy