Results 51 to 60 of about 17,753 (215)

Entanglement purification of unknown quantum states [PDF]

open access: yes, 2000
A concern has been expressed that ``the Jaynes principle can produce fake entanglement'' [R. Horodecki et al., Phys. Rev. A {\bf 59}, 1799 (1999)]. In this paper we discuss the general problem of distilling maximally entangled states from $N$ copies of a
A. K. Rajagopal   +29 more
core   +2 more sources

Incongruent, but I Get It! How Narrative Transportation Drives Engagement in Virtual Reality Advertising

open access: yesPsychology &Marketing, EarlyView.
ABSTRACT Virtual reality (VR) is a promising new technology that has gained attention from industry and academia, focusing on immersing consumers in simulated services and experiences and, more recently, on recognizing the emerging trend of video watching using VR headsets.
Meng‐Hua Hsieh   +2 more
wiley   +1 more source

Hashing to detect identical ordering of species in a shared sublattice

open access: yesScience and Technology of Advanced Materials: Methods
Finding very low energy configurations of species on a shared sublattice is unavoidable in some problems governed by ground states of the sublattice, such as voltage curve estimation of battery cathode materials. Calculations of partial occupancy systems,
Yoyo Hinuma
doaj   +1 more source

A Digital Phantom for MR Spectroscopy Data Simulation

open access: yesMagnetic Resonance in Medicine, EarlyView.
ABSTRACT Purpose Simulated data is increasingly valued by researchers for validating MRS processing and analysis algorithms. However, there is no consensus on the optimal approaches for simulation models and parameters. This study introduces a novel MRS digital brain phantom framework, providing a comprehensive and modular foundation for MRS data ...
D. M. J. van de Sande   +11 more
wiley   +1 more source

Fast Locality-Sensitive Hashing Frameworks for Approximate Near Neighbor Search

open access: yes, 2018
The Indyk-Motwani Locality-Sensitive Hashing (LSH) framework (STOC 1998) is a general technique for constructing a data structure to answer approximate near neighbor queries by using a distribution $\mathcal{H}$ over locality-sensitive hash functions ...
A Andoni   +12 more
core   +1 more source

Key Considerations on CITE‐Seq for Single‐Cell Multiomics

open access: yesPROTEOMICS, EarlyView.
ABSTRACT CITE‐Seq (Cellular Indexing of Transcriptomes and Epitopes by Sequencing) is an advanced single‐cell sequencing method to profile both gene expression and protein abundance simultaneously in individual cells using single‐cell mRNA sequencing techniques alongside antibody‐derived tags (ADTs), for protein detection.
Hye‐Wong Song   +3 more
wiley   +1 more source

On Symmetric and Asymmetric LSHs for Inner Product Search [PDF]

open access: yes, 2015
We consider the problem of designing locality sensitive hashes (LSH) for inner product similarity, and of the power of asymmetric hashes in this context.
Neyshabur, Behnam, Srebro, Nathan
core  

Attacks on quantum key distribution protocols that employ non-ITS authentication

open access: yes, 2015
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin   +25 more
core   +1 more source

Beyond Supply and Demand: The Moral Economy of Price Formation in Slab City

open access: yesEconomic Anthropology, EarlyView.
ABSTRACT This article investigates the unique economic practices of Slab City, California, an off‐grid community that rejects mainstream US values. Despite operating within the broader US economic system, Slab City residents have developed alternative forms of exchange, using cigarettes and cannabis alongside US dollars.
Bailey C. Hauswurz
wiley   +1 more source

The Message Authentication Code Based on Universal Hashing

open access: yesБезопасность информационных технологий, 2012
The article covers the research of message authentication codes based on universal hashing. The new message authentication code algorithm is described here. The analysis of the algorithm is also provided in this article.
T. A. Bilyk, A. U. Nesterenko
doaj  

Home - About - Disclaimer - Privacy