Results 111 to 120 of about 1,076,339 (338)
Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks
This paper focuses on Byzantine attack detection for Gaussian two-hop one-way relay network, where an amplify-and-forward relay may conduct Byzantine attacks by forwarding altered symbols to the destination.
Ruohan Cao
doaj +1 more source
OGRE-P2, A MONTE CARLO PROGRAM FOR COMPUTING GAMMA-RAY LEAKAGE FROM LAMINATED SLABS WITH A DISTRIBUTED SOURCE [PDF]
D.K. Trubey, Simon Penny, M.B. Emmett
openalex +1 more source
D-iteration based asynchronous distributed computation [PDF]
The aim of this paper is to explain how the D-iteration can be used for an efficient asynchronous distributed computation. We present the main ideas of the method and illustrate them through very simple examples.
arxiv
Using mass cytometry, we analyzed serial blood samples from patients with relapsed epithelial ovarian cancer (EOC) treated with oleclumab–durvalumab combination immunotherapy in the NSGO‐OV‐UMB1/ENGOT‐OV30 trial. Our analysis identified potential predictive, monitoring, and response biomarkers detectable through liquid biopsy. These findings facilitate
Luka Tandaric+11 more
wiley +1 more source
Retracted: Research and Implementation of Distributed Computing Management System for College Students' Sports Health Based on Integrated Regional Collaborative Medical Care. [PDF]
International OT.
europepmc +1 more source
The pushed beta distribution and contaminated binary sampling [PDF]
We examine a generalisation of the beta distribution that we call the pushed beta distribution. This is a continuous univariate distribution on the unit interval which generalises the beta distribution by "pushing" the density in a particular direction using an additional multiplicative term in the density kernel.
arxiv
In molecular cancer diagnostics, comprehensive genomic profiling (CGP) is going to replace the small NGS panels since it provides all clinically relevant somatic variants as well as genomic biomarkers with clinical value. Here, we compared two CGP assays and demonstrate that the choice for diagnostic implementation will depend on the specific ...
Guy Froyen+17 more
wiley +1 more source
Abstract This study uses longitudinal data from the UK Millennium Cohort Study (N = 13,277) to examine the childhood and early adolescence factors that predict weapon involvement in middle adolescence, which in this study is exemplified by having carried or used a weapon.
Aase Villadsen, Emla Fitzsimons
wiley +1 more source
Video Analytics in Elite Soccer: A Distributed Computing Perspective. [PDF]
Jha D+6 more
europepmc +1 more source
Las Vegas is better than determinism in VLSI and distributed computing (Extended Abstract) [PDF]
Kurt Mehlhorn, Erik M. Schmidt
openalex +1 more source