Showing 21 - 39 results of 39 for search 'Operation Ellamy~', query time: 1.96s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24

    Efficiency Simultaneous key Exchange-Cryptography Extraction from Public key in Fog-Cloud Federation-Based Secure Offloading for Automatic Weather Stations Observing Systems by Yashar Salami, Vahid Khajehvand, Esmaeil Zeinali

    Published 2023-03-01
    “…The data is sent to the CPS unsafely for processing, considering that the raw data in the wireless network is sent. No encryption operation or key exchange has been performed between the communication parties. …”
    Get full text
    Article
  5. 25
  6. 26

    Soil data from the Barbastro-Balaguer gypsum belt, NE SpainMendeley Data by Juan Herrero, María Tierra, Carmen Castañeda

    Published 2025-02-01
    “…This gypsum outcrop was named in the 19th Century [2] as a gypseous belt, and has been further studied by other geologists like [3,4] and by civil engineers e.g. Hué and Llamas [5]. Traditionally chesas were rangeland, with sparse almond and olive trees and rainfed winter cereals confined at the flat —and often terraced— valley bottoms, or vales as known in NE Spain. …”
    Get full text
    Article
  7. 27
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32

    The evolution of binary system from predynastic Egypt to Leibniz era by Z. Pourfereidouni, M. Radjabalipour

    Published 2024-12-01
    “…The novelty of the present paper is the study of the evolution of the binary number system from the predynastic Egypt down to the Leibniz era who, by the benefit of  Khwarazmi's  "Indian Arithmetics,"  completed this evolution by representing integers in $0-1$ forms and performing the hybrid decimal/binary Egyptian arithmetic operations purely inside the $0-1$ system. The second author is pleased to dedicate his share of this paper to  Esfandiar Eslami  showing  his love and appreciation for decades of his friendship and collaboration (since 1967) and, of course, the young coauthor joins the joy of this dedication to her former professor.…”
    Get full text
    Article
  13. 33
  14. 34
  15. 35
  16. 36
  17. 37
  18. 38

    Probing the Pitfalls: Understanding SVD’s Shortcomings in Language Model Compression by Сергей Александрович Плетенев

    Published 2024-12-01
    “…Each of these approaches operates differently, can be applied at various levels of the model architecture, and is suited to different deployment scenarios. …”
    Get full text
    Article
  19. 39