Results 71 to 80 of about 41,732 (190)

Extended precision software packages [PDF]

open access: yes
A description of three extended precision packages is presented along with three small conversion subroutines which can be used in conjunction with the extended precision packages. These extended packages represent software packages written in FORTRAN 4.
Phillips, E. J.
core   +1 more source

Population‐Based Modeling to Predict Human PK/PD of TAK‐500, an Anti‐CCR2 Antibody–Drug Conjugate for First‐in‐Human Study in Cancer Patients

open access: yesClinical and Translational Science, Volume 19, Issue 4, April 2026.
ABSTRACT TAK‐500 is a novel immune cell–directed antibody–drug conjugate (iADC) composed of TAK‐202, an anti‐CCR2 monoclonal antibody, conjugated to the STING agonist dazostinag (TAK‐676), and is designed to stimulate antitumor immunity by reprogramming CCR2‐positive monocytes. To support clinical translation, we developed a population pharmacokinetic (
Anitha Saravanakumar   +8 more
wiley   +1 more source

Solving the trophic puzzle: Host–parasite associations in Neotropical fig wasps associated with fig trees of section Americanae

open access: yesEcological Entomology, Volume 51, Issue 2, Page 284-294, April 2026.
We determined the trophic associations among fig wasp species associated with Ficus citrifolia by integrating gall morphology, the temporal sequence of wasp colonization, and oviposition behaviour. Dissection of galls produced by four gall‐inducing species at a late developmental phase enabled direct identification of occupants and inference of host ...
Leví Oliveira Barros   +2 more
wiley   +1 more source

Fixed-point privacy-preserving computation scheme on integer homomorphic encryption

open access: yes工程科学学报
This study focuses on the increasingly critical privacy requirements of sensitive real-number data in modern and practical multiparty applications such as collaborative data analysis, privacy-preserving machine learning, and secure financial computations.
Haoting HAN   +5 more
doaj   +1 more source

Aligning Mathematics Curriculum to Create Potential for Active Learning in Pre-K Through Eighth Grade Teacher Education [PDF]

open access: yes, 2004
In this paper, we consider some issues surrounding the teaching of mathematics to pre-service teachers. In particular. we look at the possibilities for teaching elementary mathematics from an advanced standpoint and alignments of curriculum that have the
Parker, G. E.
core   +1 more source

Linking Biotic Interactions to Species Stability

open access: yesEcology Letters, Volume 29, Issue 4, April 2026.
We develop a unifying framework that predicts how species respond to environmental disturbances by linking species‐level stability to a single quantity: self‐regulation loss (SL). Using analytical results, simulations, and experimental protist communities, we show that SL accurately predicts both sensitivity to press disturbances and recovery from ...
Ismaël Lajaaiti   +4 more
wiley   +1 more source

Roundoff errors in the problem of computing Cauchy principal value integrals

open access: yes, 2015
We investigate the possibility of fast, accurate and reliable computation of the Cauchy principal value integrals $\mathrm{P}\!\int_{a}^{b} f(x)(x-\tau)^{-1} dx$ $(a < \tau < b)$ using standard adaptive quadratures. In order to properly control the error
Keller, Paweł, Wróbel, Iwona
core   +1 more source

Subjective Memory Impairment in the General Adult Population: Associations With Early‐Life Cognition, Concurrent Objective Memory, Dementia Risk Factors

open access: yesEuropean Journal of Neurology, Volume 33, Issue 4, April 2026.
Subjective memory impairment in the general adult population: associations with early‐life cognition, concurrent objective memory, and dementia risk factors. ABSTRACT Background Subjective memory impairment (SMI) is used as a proxy for objective memory, although their relationship remains unclear.
Simon Holmvik   +5 more
wiley   +1 more source

Efficient and secure multi-party computation protocol supporting deep learning

open access: yesCybersecurity
Privacy-preserving deep learning based on secure multi-party computation (MPC) has emerged as a critical research focus in recent years. While existing approaches predominantly employ additive secret sharing with a fixed number of parties, they have yet ...
Shancheng Zhang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy