Results 51 to 60 of about 924,323 (216)

On Symmetric and Asymmetric LSHs for Inner Product Search [PDF]

open access: yes, 2015
We consider the problem of designing locality sensitive hashes (LSH) for inner product similarity, and of the power of asymmetric hashes in this context.
Neyshabur, Behnam, Srebro, Nathan
core  

Attacks on quantum key distribution protocols that employ non-ITS authentication

open access: yes, 2015
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin   +25 more
core   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Banal Radicalism: Free Spaces and the Routinization of Radical Practices in Far‐Right Movements

open access: yesThe British Journal of Sociology, EarlyView.
ABSTRACT How do free spaces become radicalizing spaces? Studies of far‐right radicalism have highlighted the role of insulated movement spaces in radicalizing their members. In these spaces, participants can flaunt their radical ideas and infuse them into everyday practices, forming these ideas into comprehensive and resilient worldviews.
Oded Marom
wiley   +1 more source

Quantum Entanglement Capacity with Classical Feedback

open access: yes, 2007
For any quantum discrete memoryless channel, we define a quantity called quantum entanglement capacity with classical feedback ($E_B$), and we show that this quantity lies between two other well-studied quantities.
A. W. Leung   +5 more
core   +1 more source

Conserved Sequence Identification Within Large Genomic Datasets Using ‘Unikseq2’: Application in Environmental DNA Assay Development

open access: yesMolecular Ecology Resources, EarlyView.
ABSTRACT Identification of conserved genomic sequences and their utilisation as anchor points for clade detection and/or characterisation is a mainstay in ecological studies. For environmental DNA (eDNA) assays, effective processing of large genomic datasets is crucial for reliable species detection in biodiversity monitoring.
Mark Louie D. Lopez   +6 more
wiley   +1 more source

Software Performance of Universal Hash Functions [PDF]

open access: yes, 1999
This paper compares the parameters sizes and software performance of several recent constructions for universal hash functions: bucket hashing, polynomial hashing, Toeplitz hashing, division hashing, evaluation hashing, and MMH hashing. An objective comparison between these widely varying approaches is achieved by defining constructions that offer a ...
Bart Preneel, Wim Nevelsteen
openaire   +2 more sources

“The Pause That Refreshes”: American Servicemen on R&R in Australia, 1967–1971

open access: yesAustralian Journal of Politics &History, EarlyView.
Nearly 10% of the 3 million Americans who served in Vietnam spent one week of “R&R” leave in Australia—principally in Sydney. This “friendly invasion” constitutes a substantial neglected legacy of the conflict. Across dozens of oral history interviews and memoirs, US servicemen recall with fondness their week‐long respite in a nation that was at once ...
Chris Dixon, Jon Piccini
wiley   +1 more source

Simple proof of confidentiality for private quantum channels in noisy environments

open access: yes, 2019
Complete security proofs for quantum communication protocols can be notoriously involved, which convolutes their verification, and obfuscates the key physical insights the security finally relies on.
Briegel, H. J.   +4 more
core   +1 more source

Current application of blockchain technology in healthcare and its potential roles in Urology

open access: yesBJU International, EarlyView.
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy