Results 71 to 80 of about 945,337 (242)

Combinatorial techniques for universal hashing

open access: yesJournal of Computer and System Sciences, 1994
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +2 more sources

Entrepreneurial Market Leadership Claims, Cultural Resonance, and Investor Evaluations in Nascent Markets: The Goldilocks Effect

open access: yesJournal of Management Studies, EarlyView.
Abstract Cultural entrepreneurship research emphasizes entrepreneurs’ use of cultural resources to influence audience evaluations through resonance. However, the process by which such cultural resonance is achieved remains underexplored, particularly as an intermediary outcome.
Xiumei Li   +3 more
wiley   +1 more source

Large‐Scale Integrative Taxonomy of the Smallest Insects Reveals Astonishing Temperate Diversity (Hymenoptera: Chalcidoidea: Mymaridae)

open access: yesMolecular Ecology, EarlyView.
ABSTRACT Fairyflies (Hymenoptera: Chalcidoidea: Mymaridae) are a diverse but taxonomically understudied group of parasitoid wasps that attack the eggs of other insects. Being among the very smallest of all insects, they are often ignored in biodiversity surveys despite being one of the most abundant microhymenoptera in many habitats.
Catherine Hébert, Colin Favret
wiley   +1 more source

The Drivers of Science Referenced in US EPA Regulatory Impact Analyses: Open Access, Professional Popularity, and Agency Involvement

open access: yesRegulation &Governance, EarlyView.
ABSTRACT We perform bibliometric analysis on documents for 255 Regulatory Impact Analyzes (RIAs) prepared by the US Environmental Protection Agency (EPA) from 1980 through 2024. Using a series of automated information extraction methods, we extract references from these documents and match them to bibliographic records.
Tyler A. Scott, Sojeong Kim, Liza Wood
wiley   +1 more source

Finding the Words: How Does the Aging Brain Process Language? A Focused Review of Brain Connectivity and Compensatory Pathways

open access: yesTopics in Cognitive Science, EarlyView.
Abstract As people age, there is a natural decline in cognitive functioning and brain structure. However, the relationship between brain function and cognition in older adults is neither straightforward nor uniform. Instead, it is complex, influenced by multiple factors, and can vary considerably from one person to another.
Monica Baciu, Elise Roger
wiley   +1 more source

Simple proof of confidentiality for private quantum channels in noisy environments

open access: yes, 2019
Complete security proofs for quantum communication protocols can be notoriously involved, which convolutes their verification, and obfuscates the key physical insights the security finally relies on.
Briegel, H. J.   +4 more
core   +1 more source

Incongruent, but I Get It! How Narrative Transportation Drives Engagement in Virtual Reality Advertising

open access: yesPsychology &Marketing, Volume 43, Issue 1, Page 175-193, January 2026.
ABSTRACT Virtual reality (VR) is a promising new technology that has gained attention from industry and academia, focusing on immersing consumers in simulated services and experiences and, more recently, on recognizing the emerging trend of video watching using VR headsets.
Meng‐Hua Hsieh   +2 more
wiley   +1 more source

Linking the NETSARC+ National Sarcoma Database With the SNDS to Evaluate Adjuvant and/or Neoadjuvant Therapy: Report on the Linkage Process and Result (Health Data Hub's DEEPSARC Pilot Project)

open access: yesFundamental &Clinical Pharmacology, Volume 40, Issue 1, January 2026.
ABSTRACT Background DEEPSARC, one of the first projects running on the Health Data Hub, aimed to identify real‐life treatment regimens that could improve overall survival. The project is based on matching the national database of the sarcoma reference network with the SNDS.
Erwan Drezen   +12 more
wiley   +1 more source

On the Theory of Spatial and Temporal Locality [PDF]

open access: yes, 2005
This paper studies the theory of caching and temporal and spatial locality. We show the following results: (1) hashing can be used to guarantee that caches with limited associativity behave as well as fully associative cache; (2) temporal locality cannot
Snir, Marc, Yu, Jing
core  

Key recycling in authentication

open access: yes, 2014
In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad.
Portmann, Christopher
core   +1 more source

Home - About - Disclaimer - Privacy