Results 81 to 90 of about 914,695 (232)
Quantum Entanglement Capacity with Classical Feedback
For any quantum discrete memoryless channel, we define a quantity called quantum entanglement capacity with classical feedback ($E_B$), and we show that this quantity lies between two other well-studied quantities.
A. W. Leung+5 more
core +1 more source
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci+7 more
wiley +1 more source
Maximization of Extractable Randomness in a Quantum Random-Number Generator
The generation of random numbers via quantum processes is an efficient and reliable method to obtain true indeterministic random numbers that are of vital importance to cryptographic communication and large-scale computer modeling.
Assad, S. M.+6 more
core +1 more source
ABSTRACT Automatic Document Classification (ADC) refers to the process of automatically categorizing or labeling documents into predefined classes or categories. Its effectiveness may depend on various factors, including the models used for the formal representation of documents, the classification techniques applied, or a combination of both. Recently,
Renzo Alva Principe+2 more
wiley +1 more source
The Human Shield Hypothesis: Does Predator Avoidance of Humans Create Refuges for Prey?
The human shield hypothesis posits that predators avoid areas of human disturbance due to perceived risk from humans, and prey therefore seeks refuge in these areas of perceived safety. Our systematic review of the human shield hypothesis revealed mixed evidence for human shields in the literature.
Kaitlyn M. Gaynor+15 more
wiley +1 more source
ABSTRACT In France, chronic hepatitis C whatever fibrosis stage or comorbidities can be freely treated by any physician. However, screening is still currently based on risk factors, and universal screening remains controversial. The aims of this prospective DEVICHO study were to assess the value of universal screening in hospitalised patients, to ...
Si Ahmed Si Nafa+15 more
wiley +1 more source
On Symmetric and Asymmetric LSHs for Inner Product Search [PDF]
We consider the problem of designing locality sensitive hashes (LSH) for inner product similarity, and of the power of asymmetric hashes in this context.
Neyshabur, Behnam, Srebro, Nathan
core
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin+25 more
core +1 more source
ABSTRACT Assessing steroid hormones through feces provides invaluable insight on the stress and reproductive physiology of wildlife, and has been broadly applied to monitor the health and welfare of wild animals managed under human care. This study utilized fecal hormone monitoring to evaluate adrenal and gonadal activity in 18 captive lions (Panthera ...
Paula Serres‐Corral+9 more
wiley +1 more source
Practical Evaluation of Lempel-Ziv-78 and Lempel-Ziv-Welch Tries
We present the first thorough practical study of the Lempel-Ziv-78 and the Lempel-Ziv-Welch computation based on trie data structures. With a careful selection of trie representations we can beat well-tuned popular trie data structures like Judy, m ...
A Poyias+23 more
core +1 more source