Results 111 to 120 of about 15,909 (208)

Tensor Changepoint Detection and Eigenbootstrap

open access: yesJournal of Time Series Analysis, EarlyView.
ABSTRACT Tensor data consisting of multivariate outcomes over the items and across the subjects with longitudinal and cross‐sectional dependence are considered. A completely distribution‐free and tweaking‐parameter‐free detection procedure for changepoints at different locations is designed, which does not require training data.
Michal Pešta   +2 more
wiley   +1 more source

Practicing Power‐Sharing: How Political Adversaries (Fail to) Rule Jointly

open access: yesNations and Nationalism, EarlyView.
ABSTRACT Why does power‐sharing lead to peace and effective governance in some cases but not others? Whereas the current literature on this question predominantly focuses on institutional design, this article argues that more attention should be given to the everyday activities, routines and processes through which power‐sharing is operated.
Alexandre Wadih Raffoul
wiley   +1 more source

A Study of Key Management for Encrypted Storage in Storage Area Network [PDF]

open access: yes
As secure storage becomes more pervasive throughout the enterprise, the focus quickly moves from implementing encrypting storage devices to establishing effective and secure key management policies.
Hai Xin LU
core  

OralSegNet: An Approach to Early Detection of Oral Disease Using Transfer Learning

open access: yesOral Diseases, EarlyView.
ABSTRACT Objective Deep learning‐based segmentation system is proposed that exploits three variants of YOLOv11 architecture, namely YOLOv11n‐seg, YOLOv11s‐seg, and YOLOv11m‐seg for automated detection and localization of the oral disease conditions from photographic intraoral images.
Pranta Barua   +9 more
wiley   +1 more source

Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate

open access: yesIACR Transactions on Symmetric Cryptology
Authenticated Encryption (AE) modes of operation based on Tweakable Block Ciphers (TBC) usually measure efficiency in the number of calls to the underlying primitive per message block. On the one hand, many existing solutions reach a primitive-rate of 1,
Yaobin Shen   +2 more
doaj   +1 more source

Bonds on the Ballot: What Voters (Don't) Know About Debt Financing and Why It Matters

open access: yesPublic Budgeting &Finance, EarlyView.
Abstract American subnational governments commonly require voters to approve bond proposals, reflecting historical concerns about legislative shortsightedness. Yet voters need an understanding of how bond financing works to make choices consistent with preferences. Existing literature makes it unclear whether voters have such knowledge.
Shanna Pearson‐Merkowitz   +3 more
wiley   +1 more source

The Eris hybrid cipher [PDF]

open access: yes, 2010
An earlier paper by the same author (IACR Eprint 2008/473) suggested combining a block cipher and a stream cipher to get a strong hybrid cipher. This paper proposes a specific cipher based on those ideas, using the HC-128 stream cipher and a tweakable ...
Sandy Harris
core  

Home - About - Disclaimer - Privacy