Results 41 to 50 of about 241,807 (271)

Two Faces of NOTCH1 in Childhood Lymphoblastic T‐Cell Neoplasia: Prognostic Divergence of Mutational and Structural Aberrations

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT In pediatric patients, T‐cell lymphoblastic lymphoma (T‐LBL) survival exceeds 80%. Relapse remains associated with limited curative options. Frontline treatment is largely extrapolated from T‐cell acute lymphoblastic leukemia (T‐ALL) treatment, reflecting the ongoing debate, whether both entities represent distinct diseases or variants within ...
Marie C. Heider   +4 more
wiley   +1 more source

HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree [PDF]

open access: yes, 2011
Small-world phenomena have been observed in existing peer-to-peer (P2P) networks which has proved useful in the design of P2P file-sharing systems. Most studies of constructing small world behaviours on P2P are based on the concept of clustering peer ...
A. Ahmed   +25 more
core   +2 more sources

Attribute-Based Signatures with User-Controlled Linkability [PDF]

open access: yes, 2014
In this paper, we introduce Attribute-Based Signatures with User-Controlled Linkability ABS-UCL. Attribute-based signatures allow a signer who has enough credentials/attributes to anonymously sign a message w.r.t. some public policy revealing neither the attributes used nor his identity.
Ghadafi, Essam M O   +3 more
openaire   +2 more sources

Efficacy and Safety Analysis of Roxarestat in Regulating Renal Anemia in Patients on Maintenance Hemodialysis

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Objective To compare the efficacy and safety of roxarestat versus recombinant human erythropoietin (rhEPO) in the management of renal anemia in patients undergoing maintenance hemodialysis. Methods This was a prospective, open‐label, randomized controlled trial.
Lingling Chen, Junjie Zhu, Qiaonan Ge
wiley   +1 more source

XML Security in Certificate Management - XML Certificator [PDF]

open access: yes, 2009
The trend of rapid growing use of XML format in data/document management system reveals that security measures should be urgently considered into next generation's data/document systems.
Cripps, Nathan, Lu, Joan
core   +1 more source

Short Attribute-Based Signatures for Threshold Predicates [PDF]

open access: yes, 2012
J. Herranz is supported by a Ramón y Cajal grant, partially funded by the European Social Fund (ESF) of the Spanish MICINN Ministry, F. Laguillaumie by the French ANR-07-TCOM-013-04 PACE Project and B. Libert by the F.RS.-F.N.RS. through a “Chargé de recherches" fellowship and by the BCRYPT Interuniversity Attraction Pole. Both J. Herranz and C. Ràfols
Herranz, Javier   +3 more
openaire   +3 more sources

Effects of the Fluid Replacement Method During Online Hemodiafiltration on the Solute Removal Performance and Biocompatibility Using the Asymmetric Cellulose Triacetate Membrane

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Pre‐dilution online hemodiafiltration (Pre‐HDF) is predominantly used in Japan, whereas post‐dilution online HDF (Post‐HDF) is more common in Europe. An asymmetric cellulose triacetate (ATA) membrane may improve biocompatibility.
Kenji Sakurai   +4 more
wiley   +1 more source

An IoT Attribute-Based Security Framework for Topic-Based Publish/Subscribe Systems

open access: yesIEEE Access, 2021
Publish/subscribe is a widely used paradigm in the Internet of Things (IoT). It allows a loose coupling between data producers and data consumers using a network of interconnected brokers.
Olivier Blazy   +3 more
doaj   +1 more source

Organoids in pediatric cancer research

open access: yesFEBS Letters, EarlyView.
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley   +1 more source

Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity

open access: yesTongxin xuebao, 2015
Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring
Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG
doaj   +2 more sources

Home - About - Disclaimer - Privacy