Results 41 to 50 of about 47,824 (189)

XAI Human-Machine collaboration applied to network security

open access: yesFrontiers in Computer Science
Cyber attacking is easier than cyber defending—attackers only need to find one breach, while the defenders must successfully repel all attacks. This research demonstrates how cyber defenders can increase their capabilities by joining forces with ...
Steve Moyle   +2 more
doaj   +1 more source

Multi-objective improvement of software using co-evolution and smart seeding [PDF]

open access: yes, 2008
Optimising non-functional properties of software is an important part of the implementation process. One such property is execution time, and compilers target a reduction in execution time using a variety of optimisation techniques. Compiler optimisation
Abbass, H   +15 more
core   +3 more sources

Proteogenomic and V(D)J Analysis of Human Decidual T Cells Highlights Unique Transcriptional Programming and Clonal Distribution [PDF]

open access: green, 2023
Deborah Chasman   +8 more
openalex   +1 more source

Optimizing the operation of fuel cell vehicle-to-grid systems using supervised learning

open access: yesFrontiers in Energy Research
The operation of fuel cell electric vehicle-to-grid (FCEV2G) stations presents a significant challenge due to the need to manage onsite hydrogen production, storage, and vehicle dispatch in volatile electricity markets.
Arda Mert Cetin, Xiao-Yu Wu
doaj   +1 more source

Probabilistic cloning and identification of linearly independent quantum states

open access: yes, 1998
We construct a probabilistic quantum cloning machine by a general unitary-reduction operation. With a postselection of the measurement results, the machine yields faithful copies of the input states.
A. Ekert   +25 more
core   +1 more source

Simple test for quantum channel capacity

open access: yes, 2007
Basing on states and channels isomorphism we point out that semidefinite programming can be used as a quick test for nonzero one-way quantum channel capacity.
Alber G   +15 more
core   +1 more source

A Review on Models and Applications of Quantum Computing

open access: yesQuantum Reports
This manuscript is intended for readers who have a general interest in the subject of quantum computation and provides an overview of the most significant developments in the field.
Eduard Grigoryan   +2 more
doaj   +1 more source

Cell-free Embryonic Stem Cell Extract-mediated Derivation of Multi-potent Stem Cells from NIH3T3 Fibroblasts for Functional and Anatomical Ischemic Tissue Repair [PDF]

open access: yes, 2007
The oocyte-independent generation of multipotent stem cells is one of the goals in regenerative medicine. We report that upon exposure to mouse ES cell (ESC) extracts, reversibly permeabilized NIH3T3 cells undergo de-differentiation followed by stimulus ...
Deepali Ahluwalia   +13 more
core   +1 more source

Quantifying cross-language code reuse via function-level clone detection

open access: yesJournal of King Saud University: Computer and Information Sciences
Code reuse through cloning is common in software development, yet excessive or unchecked cloning can harm maintainability and raise plagiarism concerns.
Yi Rong, Yan Zhou
doaj   +1 more source

Home - About - Disclaimer - Privacy