Results 61 to 70 of about 1,339,191 (372)

Quantum Certificate Complexity [PDF]

open access: yes, 2002
Given a Boolean function f, we study two natural generalizations of the certificate complexity C(f): the randomized certificate complexity RC(f) and the quantum certificate complexity QC(f). Using Ambainis' adversary method, we exactly characterize QC(f)
Aaronson, Scott
core   +6 more sources

Certificate Verification System using Blockchain

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2019
—During the course of education the students achieve many certificates. Student produce these certificates while applying for jobs at public or private sectors, where all these certificates are needed to be verified manually. There can be incidents where
Nitin Kumavat
semanticscholar   +1 more source

Molecular imaging predicts trastuzumab‐deruxtecan (T‐DXd) response in head and neck cancer xenograft models

open access: yesMolecular Oncology, EarlyView.
Trastuzumab‐deruxtecan, a HER2‐targeting antibody‐drug conjugate, shows promising antitumor activity in head and neck squamous cell carcinoma with low HER2 expression. In vitro and in vivo studies demonstrated dose‐dependent cell death and tumor growth reduction in low HER2‐expressing cell lines, which correlated with drug accumulation measured using a
Abdullah Bin Naveed   +8 more
wiley   +1 more source

Radiotherapy medical physics in the Philippines: A contemporary overview

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose With cancer ranking as the third leading cause of death in the Philippines and a disparity in healthcare resources across regions, this research aimed to assess the state of radiotherapy medical physics in the country. Methodology The study utilized a comprehensive online survey with 94 structured questions answered by 19 clinics ...
John Paul C. Cabahug   +4 more
wiley   +1 more source

On the Power of Non-Adaptive Learning Graphs

open access: yes, 2012
We introduce a notion of the quantum query complexity of a certificate structure. This is a formalisation of a well-known observation that many quantum query algorithms only require the knowledge of the disposition of possible certificates in the input ...
Belovs, Aleksandrs, Rosmanis, Ansis
core   +1 more source

X.509 certificate error testing [PDF]

open access: yes, 2018
X.509 Certificates are used by a wide range of technologies to verify identities, while the SSL protocol is used to provide a secure encrypted tunnel through which data can be sent over a public network.
Jimenez M., Momani E. M. H., Toma C
core   +1 more source

Efficient Verified (UN)SAT Certificate Checking

open access: yesJournal of automated reasoning, 2017
SAT solvers decide the satisfiability of Boolean formulas in conjunctive normal form. They are commonly used for software and hardware verification. Modern SAT solvers are highly complex and optimized programs.
P. Lammich
semanticscholar   +1 more source

Dysphagia and Mortality Risk in Individuals With Primary Progressive Apraxia of Speech

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Individuals with primary progressive apraxia of speech (PPAOS) often develop parkinsonism and dysphagia. To evaluate the clinical correlates and impact of dysphagia in this population, we compared enrollment visit data between individuals with (n = 12) versus individuals without (n = 44) dysphagia symptoms.
Gabriela Meade   +8 more
wiley   +1 more source

Molecular Screening of SCN1A‐Related Seizures in Children With Febrile Seizures: Diagnostic Yield and Variant Distribution

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective SCN1A‐related seizures first present as febrile seizures (FS). Definitive features emerge later, making early diagnosis challenging. We evaluated the diagnostic yield and clinical characteristics of pathogenic SCN1A variants in FS, and analyzed the effect of variant characteristics on clinical phenotypes required for early ...
Jia Wang   +11 more
wiley   +1 more source

Counterfactual quantum certificate authorization

open access: yes, 2014
We present a multi-partite protocol in a counterfactual paradigm. In counterfactual quantum cryptography, secure information is transmitted between two spatially separated parties even when there is no physical travel of particles transferring the ...
H., Akshata Shenoy   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy