Results 61 to 70 of about 4,301,094 (348)

Secure multiparty computations without computers

open access: yesTheoretical Computer Science, 1998
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ari Renvall, Valtteri Niemi
openaire   +3 more sources

Pericytes change function depending on glioblastoma vicinity: emphasis on immune regulation

open access: yesMolecular Oncology, EarlyView.
Pericytes alter their transcriptome depending on their proximity to the tumor core. In the tumor core, pericytes display a more active state with higher communication strength but with lower immune activation potential and a shift toward extracellular matrix production.
Carolina Buizza   +5 more
wiley   +1 more source

Manet: motion-aware network for video action recognition

open access: yesComplex & Intelligent Systems
Video action recognition is a fundamental task in video understanding. Actions in videos may vary at different speeds or scales, and it is difficult to cope with a wide variety of actions by relying on a single spatio-temporal scale to extract features ...
Xiaoyang Li   +4 more
doaj   +1 more source

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks

open access: yesEURASIP Journal on Information Security, 2020
Aiming at preventing user data leakage and the damage that is caused by co-resident attacks in the cloud environment, a data partitioning and encryption backup (P&XE) scheme is proposed.
Junfeng Tian, Zilong Wang, Zhen Li
doaj   +1 more source

When Is a Function Securely Computable? [PDF]

open access: yesIEEE Transactions on Information Theory, 2011
A subset of a set of terminals that observe correlated signals seek to compute a given function of the signals using public communication. It is required that the value of the function be kept secret from an eavesdropper with access to the communication. We show that the function is securely computable if and only if its entropy is less than the "aided
Himanshu Tyagi   +2 more
openaire   +4 more sources

Earthing effects on mitochondrial function: ATP production and ROS generation

open access: yesFEBS Open Bio, EarlyView.
In contrast to sham and naive controls, grounded mitochondria not only exhibit significantly enhanced energy production but also demonstrate a remarkable reduction in membrane potential and oxidative stress. This suggests a profound improvement in mitochondrial health, presenting a promising avenue for therapeutic interventions.
Cecilia Giulivi, Richard Kotz
wiley   +1 more source

Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer

open access: yesCybersecurity
In certain cloud Electronic Medical Records (EMRs) applications, the data ownership may need to be transferred. In practice, not only the data but also the auditing ability should be transferred securely and efficiently.
Yamei Wang   +4 more
doaj   +1 more source

Les chercheurs face à la surveillance d’État : état des lieux et contre-mesures

open access: yesTracés, 2019
Since the 2013 disclosures of whistleblower Edward Snowden on the surveillance practices of Western intelligence agencies, the exposure of the field of social science to state surveillance – implemented by judiciary and police authorities, and more ...
Félix Tréguer, Camille Noûs
doaj   +1 more source

Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree

open access: yesMathematics, 2022
Quantum informatics is a new subject formed by the intersection of quantum mechanics and informatics. Quantum communication is a new way to transmit quantum states through quantum entanglement, quantum teleportation, and quantum information splitting ...
Dongfen Li   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy