Showing 181 - 200 results of 7,551 for search '(peers OR ((cheer OR cher) OR ((cheers OR chens) OR (chenn OR (hern OR herng)))))*', query time: 0.21s Refine Results
  1. 181

    Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping by Xu, Kexin, Tan, Benjamin Hong Meng, Wang, Li-Ping, Aung, Khin Mi Mi, Wang, Huaxiong

    Published 2023
    “…To that end, we adapt Chen et al.'s bootstrapping algorithm to the NTRU setting and construct an efficient conversion from multi-key NTRU to multi-key RLWE ciphertexts. …”
    Get full text
    Journal Article
  2. 182

    Chaotic neural networks for solving combinatorial optimization problems by Tian, Fuyu.

    Published 2008
    “…The thesis re-examine Chen and Aihara's experiments on solving TSP by extensive simulations. …”
    Get full text
    Thesis
  3. 183

    Three essays on the funds allocation of U.S. Firms by Shih, Chia Mei

    Published 2018
    “…In essay two, we employ comprehensive measures of investment and cash flow, and evaluate the findings of Chen and Chen (2012) that the investment-cash flow sensitivity of U.S. firms has disappeared over time. …”
    Get full text
    Get full text
    Thesis
  4. 184

    Bombs away. by Tong, Junwei.

    Published 2012
    “…Bombs Away is a 3D animated short film produced by Junwei Tong, Kenneth Chen and Gabriel Yeong. It is about an army commander who takes up painting, seeking solace from the ravages of war.…”
    Get full text
    Final Year Project (FYP)
  5. 185

    A two sample size estimator for large data sets by O'Connell, M, Smith, HW, Thomassen, Ø

    Published 2025
    “…As an alternative, we show how the asymptotically efficient CEP-GMM estimator of Chen et al. (2005) and Chen et al. (2008) can also be used to reduce computational cost in our setting. …”
    Journal article
  6. 186

    The new Chinese women by Seah, Pei Jun

    Published 2015
    “…This paper will thus argue that both Chen Ran and Yan Geling both portray the stereotypical female sexuality as well as alternatives of it. …”
    Get full text
    Final Year Project (FYP)
  7. 187

    That mysterious man by Lin, Enyi

    Published 2024
    “…Xu An reports to his captain Chen Yi. Xu An's main mission is to find clues on Zhang Xu's daily actions in Tang Nightclub. …”
    Get full text
    Thesis-Master by Coursework
  8. 188

    Design and comparative analysis of different pricing mechanisms and energy allocation policies for energy trading by Lim, Jerand Ze Hui

    Published 2022
    “…As a result, the dependency on fossil fuels, natural gas, and coals to produce electricity will be minimized. Peer-to-peer (P2P) energy trading has been proposed as a solution to this problem. …”
    Get full text
    Final Year Project (FYP)
  9. 189

    Solving combinatorial optimization problems using augmented lagrange chaotic simulated annealing by Wang, Lipo., Tian, Fuyu, Soong, Boon Hee, Wan, Chunru

    Published 2012
    “…Chaotic simulated annealing (CSA) proposed by Chen and Aihara has been successfully used to solve a variety of combinatorial optimization problems. …”
    Get full text
    Get full text
    Journal Article
  10. 190

    Distributed discovery of network resources in p2p systems by Yap, Teck Min.

    Published 2010
    “…Peer-to-Peer (P2P) network system which is a distributed system are getting famous in recent years and hence those P2P applications are broadly used in file sharing and transferring such as Gnutella, BitTorrent, uTorrent, BitComet and FlashTrack. …”
    Get full text
    Final Year Project (FYP)
  11. 191

    Access structures of elliptic secret sharing schemes by Chen, Hao, Ling, San, Xing, Chaoping

    Published 2013
    “…It is a central problem in secret sharing to understand the access structures of secret sharing schemes. In Chen and Kramer, secret sharing schemes from algebraic-geometric codes and their applications in secure multiparty computation were proposed and studied. …”
    Get full text
    Get full text
    Journal Article
  12. 192

    0-1 Knapsack in Nearly Quadratic Time by Jin, Ce

    Published 2024
    “…On the upper bound side, currently the fastest algorithm runs in 𝑂e(𝑛 + 𝑤 12/5 max ) time (Chen, Lian, Mao, and Zhang 2023), improving the earlier 𝑂(𝑛 + 𝑤 3 max)-time algorithm by Polak, Rohwedder, and Węgrzycki (2021). …”
    Get full text
    Article
  13. 193

    Moonchild. by Chan, Yin Wan., Chong, Sara Shuzhen.

    Published 2009
    “…Being the product of an extremely close collaboration with my partner Chen Yanyun, we will most probably have different yet similar experiences expressed in each of our papers. …”
    Get full text
    Final Year Project (FYP)
  14. 194

    Chatalone : crowd chat application by How, Yi De

    Published 2021
    “…This project aims to develop a cross-platform mobile-based messaging application that will allow users to chat with other users anonymously in a local area, through a peer-to-peer mesh network, without requiring internet or mobile network coverage.…”
    Get full text
    Final Year Project (FYP)
  15. 195

    Microfluidic Platform for Investigating Prostate Cancer Metastasis by Ng, Wei Kai

    Published 2017
    “…Objective: To develop a microfluidic model of bone metastasis. [1st Award]-[Peer Assessment Review]…”
    Get full text
    Get full text
    Student Research Poster
  16. 196

    Multi-chain energy trading In blockchain-based microgrids with notary schemes by Nathanael Axel Wibisono

    Published 2024
    “…By integrating blockchain technology, Blockchain-based Microgrids (BBMs) employ a secure, transparent ledger system to streamline peer-to-peer energy exchanges within these networks. …”
    Get full text
    Final Year Project (FYP)
  17. 197

    Security in mobile ad hoc networks by Choy, Sok Sien.

    Published 2008
    “…Mobile Ad Hoc Networks, or MANETs, have recently gained much attention in the research community in anticipation of pertinent applications in converging communications services. The proliferation of peer-to-peer products has rendered MANET security an imminent issue. …”
    Get full text
    Thesis
  18. 198

    New optimal asymmetric quantum codes from constacyclic codes by Guanghui, Zhang, Bocong, Chen, Liangchen, Li

    Published 2014
    “…The first class is the asymmetric quantum codes with parameters [[q2 + 1, q2 + 1 - 2(t + k + 1), (2k + 2)/(2t + 2)]]q2 where q is an odd prime power, t, k are integers with , which is a generalization of [J. Chen, J. Li and J. Lin, Int. J. Theor. Phys. 53 (2014) 72, Theorem 2] in the sense that we do not assume that q ≡1 (mod 4). …”
    Get full text
    Get full text
    Journal Article
  19. 199

    Associations between violence in childhood, depression and suicide attempts in adolescence: evidence from a cohort study in Luwero district, Uganda by Akunzirwe, R, Carter, DJ, Hanna, L, Zinke-Allmang, A, Akim, A, Datzberger, S, Parkes, J, Knight, L, Atuhaire, L, Nakuti, J, Mirembe, A, Allen, E, Naker, D, Devries, K, Bhatia, A

    Published 2024
    “…However, few studies use longitudinal data from low- and middle-income countries with attention to how associations differ by experiencing specific types of violence or alongside different contexts of peer and family support. In this study, we quantify the association between experiences of violence in early adolescence and depression and suicide attempts in late adolescence and explore whether this association is modified by family and peer connectedness. …”
    Journal article
  20. 200

    Highlights from Faraday Discussion 172: Carbon in electrochemistry, Sheffield, UK, July 2014 by Dyatkin, B, Ash, PA, Sharma, S

    Published 2015
    “…All discussions form part of the peer review process and are sequentially recorded and published with the accepted manuscripts.…”
    Conference item