Results 21 to 30 of about 15,339 (156)
Participatory varietal selection of potato using the mother & baby trial design: A gender-responsive trainer’s guide. [PDF]
This guide aims to provide step-by-step guidance on facilitating and documenting the PVS dynamics using the MBT design to select, and eventually release, potato varieties preferred by end-users that suit male and female farmers ’different needs, diverse ...
Amaya, N. +7 more
core +1 more source
Practicing Your Protocols [PDF]
The purpose of this resource is to have students learn to use the hydrology instruments and collect the hydrology data accurately. In the classroom, students practice using the instruments or kits for protocols, exploring the range of measurements and ...
The GLOBE Program, UCAR (University Corporation for Atmospheric Research)
core
Networked PID control design : a pseudo-probabilistic robust approach [PDF]
Networked Control Systems (NCS) are feedback/feed-forward control systems where control components (sensors, actuators and controllers) are distributed across a common communication network.
Katebi, M.R., Recalde Camacho, L.
core
The Hanabi Challenge: A New Frontier for AI Research
From the early days of computing, games have been important testbeds for studying how well machines can do sophisticated decision making. In recent years, machine learning has made dramatic advances with artificial agents reaching superhuman performance ...
Bard, Nolan +14 more
core +1 more source
Probabilistic Routing Protocol for Intermittently Connected Networks [PDF]
This document is a product of the Delay Tolerant Networking Research Group and has been reviewed by that group. No objections to its publication as an RFC were raised.
Davies, Elwyn +3 more
core +2 more sources
Secure quantum key distribution using squeezed states [PDF]
We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite ...
A.M. Steane +20 more
core +2 more sources
From quantum-codemaking to quantum code-breaking [PDF]
This is a semi-popular overview of quantum entanglement as an important physical resource in the field of data security and quantum computing. After a brief outline of entanglement's key role in philosophical debates about the meaning of quantum ...
Ekert, Artur
core +1 more source
State-dependent Priority Scheduling for Networked Control Systems
Networked control systems (NCS) have attracted considerable attention in recent years. While the stabilizability and optimal control of NCS for a given communication system has already been studied extensively, the design of the communication system for ...
Blind, Rainer +3 more
core +1 more source
We show that in device independent quantum key distribution protocols the privacy of randomness is of crucial importance. For sublinear test sample sizes even the slightest guessing probability by an eavesdropper will completely compromise security.
Huber, Marcus, Pawlowski, Marcin
core +1 more source
The Power of Unentanglement [PDF]
The class QMA(k). introduced by Kobayashi et al., consists of all languages that can be verified using k unentangled quantum proofs. Many of the simplest questions about this class have remained embarrassingly open: for example, can we give any ...
Aaronson, Scott +4 more
core +6 more sources

