We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 3,099 results
  1. From Substitution Box to Threshold

    With the escalating demand for lightweight ciphers as well as side channel protected implementation of those ciphers in recent times, this work...
    Anubhab Baksi, Sylvain Guilley, ... Sofiane Takarabt in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  2. Computation on Structures

    Over the last decades the field of computer science has changed a lot. In practice we are now dealing with very complex systems, but it seems that...
    Chapter 2021
  3. On the Existence of Consensus Converging Organized Groups in Large Social Networks

    In this paper we investigate the emergence of highly organized communities in graphs modeling social networks and interactions among their members....
    Vasiliki Liagkou, Panagiotis E. Nastou, ... Yannis C. Stamatiou in Structural Information and Communication Complexity
    Conference paper 2024
  4. Imbalance factor: a simple new scale for measuring inter-class imbalance extent in classification problems

    Learning from datasets that suffer from differences in absolute frequency of classes is one of the most challenging tasks in the machine learning...

    Mohsen Pirizadeh, Hadi Farahani, Saeed Reza Kheradpisheh in Knowledge and Information Systems
    Article 13 May 2023
  5. Q-Learning Based Adaptive Scheduling Method for Hospital Outpatient Clinics

    Proper selection of the number of Service Providers (SPs) such as doctors, registration windows, and examination equipments in outpatient clinics can...
    Wenlong Ni, Lingyue Lai, ... Jue Wang in Neural Information Processing
    Conference paper 2024
  6. Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA

    We consider a transform, called Derive-then-Derandomize, that hardens a given signature scheme against randomness failure and implementation error....
    Mihir Bellare, Hannah Davis, Zi**g Di in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  7. Towards True Decentralization: Development, Testing and Evaluation of a Novel Blockchain Consensus Protocol

    The blockchain technology that powers the Bitcoin network was unveiled to the world in 2008. After more than a decade of research and development, a...
    Kesara Wimal, Geethapriya Liyanage in Asia Pacific Advanced Network
    Conference paper 2024
  8. Quality Control Model of Value Extraction of Residual Silk Reuse Based on Improved Genetic Algorithm

    The recovery and reuse of residual silk in the tobacco industry is a normal work, but the efficiency of this work has always been a weak link in...
    Qi Ji, Mingxing Li, Chao Shen in Intelligence Computation and Applications
    Conference paper 2024
  9. Model-Based Indirect RL: Dynamic Programming

    Many distinct communities have actively worked on solving sequential decision processes, in which multistage decisions are made to optimize the...
    Chapter 2023
  10. Distribution Estimation for Probabilistic Loops

    We present an algorithmic approach to estimate the value distributions of random variables of probabilistic loops whose statistical moments are...
    Ahmad Karimi, Marcel Moosbrugger, ... Efstathia Bura in Quantitative Evaluation of Systems
    Conference paper 2022
  11. Two High-Performance Antenna Selection Schemes for Secure SSK Modulation in Intelligent Industrial Wireless Sensing Systems

    Industrial wireless sensor networks (IWSNs) provide intelligent factory management with a new dimension. Reliable intelligent industrial wireless...
    Hui Xu, Benjamin K. Ng, ... Chan-Tong Lam in Big Data Intelligence and Computing
    Conference paper 2023
  12. Design and Application of Music Assisted Teaching System Based on ARM and SA Algorithm

    In music teaching, there are some tasks that cannot be completed or done well by humans, so it is necessary to develop an auxiliary teaching system...
    Conference paper 2024
  13. Lattice-Based Proof-of-Work for Post-Quantum Blockchains

    Proof of Work (PoW) protocols, originally proposed to circumvent DoS and email spam attacks, are now at the heart of the majority of recent...
    Rouzbeh Behnia, Eamonn W. Postlethwaite, ... Attila Altay Yavuz in Data Privacy Management, Cryptocurrencies and Blockchain Technology
    Conference paper 2022
  14. A free mind cannot be digitally transferred

    The digital transfer of the mind to a computer system (i.e., mind uploading ) requires representing the mind as a finite sequence of bits (1s and 0s)....

    Gonzalo Génova, Valentín Moreno, Eugenio Parra in AI & SOCIETY
    Article Open access 27 June 2022
  15. Seeing like an algorithm: operative images and emergent subjects

    Algorithmic vision, the computational process of making meaning from digital images or visual information, has changed the relationship between the...

    Rebecca Uliasz in AI & SOCIETY
    Article 16 September 2020
  16. Po-Miner: A Web Mining Poem Generator and its Security Model

    The growing importance of data science and analytics has led to innovative applications spread across various fields and genres over a short period...

    Prakash Hegade, Rajaram M. Joshi, ... Srushti Basavaraddi in SN Computer Science
    Article 07 August 2021
  17. Introducing the Book

    This book has two principal goals: to enlighten and to engage. 1. Most obviously, the book is designed as an introduction to Computation Theory for...
    Arnold L. Rosenberg, Lenwood S. Heath in Understanding Computation
    Chapter 2022
  18. Theoretical and Empirical Analysis of FALCON and SOLMAE Using Their Python Implementation

    Since NIST has recently selected FALCON as one of quantum–resistant digital signatures which uses the hash-and-sign paradigm in the style of...
    Conference paper 2024
  19. DDSC-SMOTE: an imbalanced data oversampling algorithm based on data distribution and spectral clustering

    Imbalanced data poses a significant challenge in machine learning, as conventional classification algorithms often prioritize majority class samples,...

    **nqi Li, Qicheng Liu in The Journal of Supercomputing
    Article 02 May 2024
  20. True Turing: A Bird’s-Eye View

    Alan Turing is often portrayed as a materialist in secondary literature. In the present article, I suggest that Turing was instead an idealist,...

    Edgar Daylight in Minds and Machines
    Article Open access 19 June 2023
Did you find what you were looking for? Share feedback.