Results 51 to 60 of about 1,839,877 (306)

Methods of information theory and algorithmic complexity for network biology. [PDF]

open access: yesSeminars in Cell and Developmental Biology, 2014
We survey and introduce concepts and tools located at the intersection of information theory and network biology. We show that Shannon's information entropy, compressibility and algorithmic complexity quantify different local and global aspects of ...
H. Zenil, N. Kiani, J. Tegnér
semanticscholar   +1 more source

An Algorithmic Approach to Information and Meaning [PDF]

open access: yes, 2011
I will survey some matters of relevance to a philosophical discussion of information, taking into account developments in algorithmic information theory (AIT).
Zenil, Hector
core   +4 more sources

Around Kolmogorov complexity: basic notions and results

open access: yes, 2015
Algorithmic information theory studies description complexity and randomness and is now a well known field of theoretical computer science and mathematical logic.
A Nies, M Li, RG Downey
core   +2 more sources

LDAcoop: Integrating non‐linear population dynamics into the analysis of clonogenic growth in vitro

open access: yesMolecular Oncology, EarlyView.
Limiting dilution assays (LDAs) quantify clonogenic growth by seeding serial dilutions of cells and scoring wells for colony formation. The fraction of negative wells is plotted against cells seeded and analyzed using the non‐linear modeling of LDAcoop.
Nikko Brix   +13 more
wiley   +1 more source

Algorithmic complexity of quantum capacity

open access: yes, 2017
Recently the theory of communication developed by Shannon has been extended to the quantum realm by exploiting the rules of quantum theory. This latter stems on complex vector spaces.
Mancini, Stefano   +1 more
core   +1 more source

Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity

open access: yesMolecular Oncology, EarlyView.
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung   +17 more
wiley   +1 more source

2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment

open access: yesIEEE Access, 2018
With the increasing use of mobile devices, a secure communication and key exchange become the significant security issues in mobile environments. However, because of open network environments, mobile user can be vulnerable to various attacks.
Kisung Park   +3 more
doaj   +1 more source

Algorithmic Information Theory: Some Recollections [PDF]

open access: yes, 2007
Presents a history of the evolution of the author's ideas on program-size complexity and its applications to metamathematics over the course of more than four decades. Includes suggestions for further work.
openaire   +2 more sources

Crucial parameters for precise copy number variation detection in formalin‐fixed paraffin‐embedded solid cancer samples

open access: yesMolecular Oncology, EarlyView.
This study shows that copy number variations (CNVs) can be reliably detected in formalin‐fixed paraffin‐embedded (FFPE) solid cancer samples using ultra‐low‐pass whole‐genome sequencing, provided that key (pre)‐analytical parameters are optimized.
Hanne Goris   +10 more
wiley   +1 more source

A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things

open access: yesIEEE Access, 2020
The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more ...
Mohammad Wazid   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy