Search alternatives:
peers » peer (Expand Search)
cheer » chee (Expand Search), sheer (Expand Search), cheen (Expand Search)
cheers » chees (Expand Search), sheers (Expand Search), cheens (Expand Search), cheaters (Expand Search), checkers (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
chens » chen (Expand Search), cheng (Expand Search), chess (Expand Search)
chenn » chenan (Expand Search), chen (Expand Search), cheng (Expand Search)
hern » chern (Expand Search), shern (Expand Search), here (Expand Search)
herng » cherng (Expand Search), sherng (Expand Search), hereg (Expand Search), heng (Expand Search), heong (Expand Search)
peers » peer (Expand Search)
cheer » chee (Expand Search), sheer (Expand Search), cheen (Expand Search)
cheers » chees (Expand Search), sheers (Expand Search), cheens (Expand Search), cheaters (Expand Search), checkers (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
chens » chen (Expand Search), cheng (Expand Search), chess (Expand Search)
chenn » chenan (Expand Search), chen (Expand Search), cheng (Expand Search)
hern » chern (Expand Search), shern (Expand Search), here (Expand Search)
herng » cherng (Expand Search), sherng (Expand Search), hereg (Expand Search), heng (Expand Search), heong (Expand Search)
-
181
Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping
Published 2023“…To that end, we adapt Chen et al.'s bootstrapping algorithm to the NTRU setting and construct an efficient conversion from multi-key NTRU to multi-key RLWE ciphertexts. …”
Get full text
Journal Article -
182
Chaotic neural networks for solving combinatorial optimization problems
Published 2008“…The thesis re-examine Chen and Aihara's experiments on solving TSP by extensive simulations. …”
Get full text
Thesis -
183
Three essays on the funds allocation of U.S. Firms
Published 2018“…In essay two, we employ comprehensive measures of investment and cash flow, and evaluate the findings of Chen and Chen (2012) that the investment-cash flow sensitivity of U.S. firms has disappeared over time. …”
Get full text
Get full text
Thesis -
184
Bombs away.
Published 2012“…Bombs Away is a 3D animated short film produced by Junwei Tong, Kenneth Chen and Gabriel Yeong. It is about an army commander who takes up painting, seeking solace from the ravages of war.…”
Get full text
Final Year Project (FYP) -
185
A two sample size estimator for large data sets
Published 2025“…As an alternative, we show how the asymptotically efficient CEP-GMM estimator of Chen et al. (2005) and Chen et al. (2008) can also be used to reduce computational cost in our setting. …”
Journal article -
186
The new Chinese women
Published 2015“…This paper will thus argue that both Chen Ran and Yan Geling both portray the stereotypical female sexuality as well as alternatives of it. …”
Get full text
Final Year Project (FYP) -
187
That mysterious man
Published 2024“…Xu An reports to his captain Chen Yi. Xu An's main mission is to find clues on Zhang Xu's daily actions in Tang Nightclub. …”
Get full text
Thesis-Master by Coursework -
188
Design and comparative analysis of different pricing mechanisms and energy allocation policies for energy trading
Published 2022“…As a result, the dependency on fossil fuels, natural gas, and coals to produce electricity will be minimized. Peer-to-peer (P2P) energy trading has been proposed as a solution to this problem. …”
Get full text
Final Year Project (FYP) -
189
Solving combinatorial optimization problems using augmented lagrange chaotic simulated annealing
Published 2012“…Chaotic simulated annealing (CSA) proposed by Chen and Aihara has been successfully used to solve a variety of combinatorial optimization problems. …”
Get full text
Get full text
Journal Article -
190
Distributed discovery of network resources in p2p systems
Published 2010“…Peer-to-Peer (P2P) network system which is a distributed system are getting famous in recent years and hence those P2P applications are broadly used in file sharing and transferring such as Gnutella, BitTorrent, uTorrent, BitComet and FlashTrack. …”
Get full text
Final Year Project (FYP) -
191
Access structures of elliptic secret sharing schemes
Published 2013“…It is a central problem in secret sharing to understand the access structures of secret sharing schemes. In Chen and Kramer, secret sharing schemes from algebraic-geometric codes and their applications in secure multiparty computation were proposed and studied. …”
Get full text
Get full text
Journal Article -
192
0-1 Knapsack in Nearly Quadratic Time
Published 2024“…On the upper bound side, currently the fastest algorithm runs in 𝑂e(𝑛 + 𝑤 12/5 max ) time (Chen, Lian, Mao, and Zhang 2023), improving the earlier 𝑂(𝑛 + 𝑤 3 max)-time algorithm by Polak, Rohwedder, and Węgrzycki (2021). …”
Get full text
Article -
193
Moonchild.
Published 2009“…Being the product of an extremely close collaboration with my partner Chen Yanyun, we will most probably have different yet similar experiences expressed in each of our papers. …”
Get full text
Final Year Project (FYP) -
194
Chatalone : crowd chat application
Published 2021“…This project aims to develop a cross-platform mobile-based messaging application that will allow users to chat with other users anonymously in a local area, through a peer-to-peer mesh network, without requiring internet or mobile network coverage.…”
Get full text
Final Year Project (FYP) -
195
Microfluidic Platform for Investigating Prostate Cancer Metastasis
Published 2017“…Objective: To develop a microfluidic model of bone metastasis. [1st Award]-[Peer Assessment Review]…”
Get full text
Get full text
Student Research Poster -
196
Multi-chain energy trading In blockchain-based microgrids with notary schemes
Published 2024“…By integrating blockchain technology, Blockchain-based Microgrids (BBMs) employ a secure, transparent ledger system to streamline peer-to-peer energy exchanges within these networks. …”
Get full text
Final Year Project (FYP) -
197
Security in mobile ad hoc networks
Published 2008“…Mobile Ad Hoc Networks, or MANETs, have recently gained much attention in the research community in anticipation of pertinent applications in converging communications services. The proliferation of peer-to-peer products has rendered MANET security an imminent issue. …”
Get full text
Thesis -
198
New optimal asymmetric quantum codes from constacyclic codes
Published 2014“…The first class is the asymmetric quantum codes with parameters [[q2 + 1, q2 + 1 - 2(t + k + 1), (2k + 2)/(2t + 2)]]q2 where q is an odd prime power, t, k are integers with , which is a generalization of [J. Chen, J. Li and J. Lin, Int. J. Theor. Phys. 53 (2014) 72, Theorem 2] in the sense that we do not assume that q ≡1 (mod 4). …”
Get full text
Get full text
Journal Article -
199
Associations between violence in childhood, depression and suicide attempts in adolescence: evidence from a cohort study in Luwero district, Uganda
Published 2024“…However, few studies use longitudinal data from low- and middle-income countries with attention to how associations differ by experiencing specific types of violence or alongside different contexts of peer and family support. In this study, we quantify the association between experiences of violence in early adolescence and depression and suicide attempts in late adolescence and explore whether this association is modified by family and peer connectedness. …”
Journal article -
200
Highlights from Faraday Discussion 172: Carbon in electrochemistry, Sheffield, UK, July 2014
Published 2015“…All discussions form part of the peer review process and are sequentially recorded and published with the accepted manuscripts.…”
Conference item