Showing 1 - 20 results of 3,746 for search '(more OR (share OR score)) function generated', query time: 0.21s Refine Results
  1. 1

    SliceScore: A Network Function Sharing Aware and Slice-Oriented DDoS Filtering Approach by Omer Zekvan Yilmaz, Kubra Kalkan, Fatih Alagoz

    Published 2025-01-01
    “…Recently, network function (NF) sharing has been proposed in the literature in order to further exploit unused resources and lower the costs for network operators. …”
    Get full text
    Article
  2. 2
  3. 3

    Enhancing the secrecy of a cryptographic key generated using synchronized artificial neural networks1 by M. L. Radziukevich, V. F. Golikov

    Published 2020-03-01
    “…To solve the problem of increasing the    confidentiality of the generated shared secret, if it is used as a cryptographic key, it is proposed to use the  mixing a certain number of results of individual synchronizations (convolution). …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7

    Joint Cognition: Thought Contagion and the Consequences of Cooperation when Sharing the Task of Random Sequence Generation. by John Nicholas Towse, Andrea Sarah Towse, Satoru Saito, Yukio Maehara, Akira Miyake

    Published 2016-01-01
    “…Generating random number sequences is a popular psychological task often used to measure executive functioning. …”
    Get full text
    Article
  8. 8

    Research on privacy data security sharing scheme based on blockchain and function encryption by Yi LI, Jinsong WANG, Hongwei ZHANG

    Published 2022-09-01
    “…Blockchain technology has provided new ideas for data validation, data traceability, data trustworthiness, and data availability in data sharing, but privacy data security in data sharing still faces many challenges.Firstly, the current status of blockchain-based data sharing research was reviewed.Then a secure sharing model of privacy data was proposed.By encrypting the privacy data through function cryptography, and generating the proof of computational correctness through zero-knowledge proof technology, a secure and reliable data sharing with “data available but not visible” was realized.The experimental results show that the sharing delay and economic overhead of the model are within the acceptable range, which demonstrates the security and feasibility of the model.…”
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    New insights into the generation and function of megakaryocytes in health and disease by Changhong Du, Jun Chen, Junping Wang

    Published 2025-03-01
    “…Furthermore, although been well known as a component of the BM niche maintaining hematopoietic stem cells (HSCs) during homeostasis, the newly-identified properties of MKs further make them a key supporter for stressed or diseased HSCs during myeloablative injury, aging and hematopoietic malignancy. Therefore, the generation and function of MKs are more diverse than we previously thought. …”
    Get full text
    Article
  12. 12

    Subjective Evaluation of Generative AI-Driven Dialogues in Paired Dyadic and Topic-Sharing Triadic Interaction Structures by Kaori Abe, Changqin Quan, Sheng Cao, Zhiwei Luo

    Published 2025-05-01
    “…By switching interaction structures to adapt to users’ demands, system behavior becomes more appropriate for users.…”
    Get full text
    Article
  13. 13

    Blockchain-Based Modified AES with Chaotic Random Key Generation for Secured E-Medical Data Sharing by Vinothkumar.M, R. Saravana Ram

    Published 2025-04-01
    “…Though traditional methods have used algorithms based on these concepts for secured EMD sharing, they lacked with regard for privacy and security. …”
    Get full text
    Article
  14. 14

    Direct Conditional Score Modeling for Accelerated MRI Reconstruction by Hongki Lim

    Published 2024-01-01
    “…This paper presents a novel approach called Direct Conditional Score (DCS) modeling that directly models the conditional score function, eliminating the need for separate likelihood terms. …”
    Get full text
    Article
  15. 15

    Generating diversity and securing completeness in algorithmic retrosynthesis by Florian Mrugalla, Christopher Franz, Yannic Alber, Georg Mogk, Martín Villalba, Thomas Mrziglod, Kevin Schewior

    Published 2025-05-01
    “…In order to generate a diverse set of synthesis plans for chemists to select from, we capture the concept of diversity in a novel chemical diversity score (CDS). …”
    Get full text
    Article
  16. 16

    Generative Inverse Design of Metamaterials with Functional Responses by Interpretable Learning by Wei (Wayne) Chen, Rachel Sun, Doksoo Lee, Carlos M. Portela, Wei Chen

    Published 2025-06-01
    “…Unlike data‐intensive and noninterpretable deep‐learning‐based methods, this work proposes the random‐forest‐based interpretable generative inverse design (RIGID), a single‐shot inverse design method for fast generation of metamaterials with on‐demand functional behaviors. …”
    Get full text
    Article
  17. 17

    Evaluation of the Impact of Government Audit on Quality Management, Based on Neutroalgebra Generated by the PROSPECTOR Function by Alexander Santos Silva Bernardo, Jeri Gloria Ramón Ruffner, David Sánchez Cruz, Patricia Padilla-Vento

    Published 2024-12-01
    “…The present study focuses on the evaluation of the impact of government audit on quality management, using a novel approach based on the neutralalgebra generated by the PROSPECTOR function. The central question of the research lies in the need to improve the effectiveness of government audits to ensure more efficient and transparent quality management in public institutions. …”
    Get full text
    Article
  18. 18

    Enhancing Efficiency in Trustless Cryptography: An Optimized SM9-Based Distributed Key Generation Scheme by Jinhong Chen, Xueguang Zhou, Wei Fu, Yihuan Mao

    Published 2024-12-01
    “…Our scheme introduces a (t, n)-threshold system that functions without a trusted center, addressing the vulnerability of single points of failure in conventional key generation centers (KGCs). …”
    Get full text
    Article
  19. 19
  20. 20