Results 51 to 60 of about 1,839,877 (306)
Methods of information theory and algorithmic complexity for network biology. [PDF]
We survey and introduce concepts and tools located at the intersection of information theory and network biology. We show that Shannon's information entropy, compressibility and algorithmic complexity quantify different local and global aspects of ...
H. Zenil, N. Kiani, J. Tegnér
semanticscholar +1 more source
An Algorithmic Approach to Information and Meaning [PDF]
I will survey some matters of relevance to a philosophical discussion of information, taking into account developments in algorithmic information theory (AIT).
Zenil, Hector
core +4 more sources
Around Kolmogorov complexity: basic notions and results
Algorithmic information theory studies description complexity and randomness and is now a well known field of theoretical computer science and mathematical logic.
A Nies, M Li, RG Downey
core +2 more sources
LDAcoop: Integrating non‐linear population dynamics into the analysis of clonogenic growth in vitro
Limiting dilution assays (LDAs) quantify clonogenic growth by seeding serial dilutions of cells and scoring wells for colony formation. The fraction of negative wells is plotted against cells seeded and analyzed using the non‐linear modeling of LDAcoop.
Nikko Brix +13 more
wiley +1 more source
Algorithmic complexity of quantum capacity
Recently the theory of communication developed by Shannon has been extended to the quantum realm by exploiting the rules of quantum theory. This latter stems on complex vector spaces.
Mancini, Stefano +1 more
core +1 more source
Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung +17 more
wiley +1 more source
With the increasing use of mobile devices, a secure communication and key exchange become the significant security issues in mobile environments. However, because of open network environments, mobile user can be vulnerable to various attacks.
Kisung Park +3 more
doaj +1 more source
Algorithmic Information Theory: Some Recollections [PDF]
Presents a history of the evolution of the author's ideas on program-size complexity and its applications to metamathematics over the course of more than four decades. Includes suggestions for further work.
openaire +2 more sources
This study shows that copy number variations (CNVs) can be reliably detected in formalin‐fixed paraffin‐embedded (FFPE) solid cancer samples using ultra‐low‐pass whole‐genome sequencing, provided that key (pre)‐analytical parameters are optimized.
Hanne Goris +10 more
wiley +1 more source
The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more ...
Mohammad Wazid +3 more
doaj +1 more source

