Results 61 to 70 of about 2,144,321 (256)
Research Ready Data Lakes: Protecting Privacy in Relatable Datasets
Background with rationale The Georgia Policy Labs’ mission is to improve outcomes for children and families by producing rigorous research with long-term government partners.
Robert McMillan, Maggie Reeves
doaj +1 more source
Guest Editorial: Multi‐view representation learning for computer vision
IET Computer Vision, EarlyView.
Xin Ning+5 more
wiley +1 more source
Time Efficient Hash Key Generation for Blockchain Enabled Framework
Blockchain, in general, helps organizations to improve the transparency and governance by removing its shortfalls and building better control overall. Blockchain network, public or private, is a competent technology when used in order with an optimized ...
Shyam Kumar Sinha, Debarka Mukhopadhyay
doaj +1 more source
Non‐participation in smartphone data collection using research apps
Abstract Research apps allow to administer survey questions and passively collect smartphone data, thus providing rich information on individual and social behaviours. Agreeing to this novel form of data collection requires multiple consent steps, and little is known about the effect of non‐participation. We invited 4,293 Android smartphone owners from
Florian Keusch+5 more
wiley +1 more source
A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms, and it is used as a proof-of-work function in several cryptocurrencies.
Balatsoukas-Stimming, Alexios+4 more
core +2 more sources
Quantum attacks on Bitcoin, and how to protect against them [PDF]
The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer.
Aggarwal, Divesh+4 more
core +3 more sources
Optimized Entanglement Purification [PDF]
We investigate novel protocols for entanglement purification of qubit Bell pairs. Employing genetic algorithms for the design of the purification circuit, we obtain shorter circuits achieving higher success rates and better final fidelities than what is ...
Albert, Victor V.+2 more
core +2 more sources
Germline variants in CDKN2A wild‐type melanoma prone families
Among melanoma‐prone families, wild‐type for CDKN2A and CDK4, some have pathogenic variants in genes not usually linked to melanoma. Furthermore, rare XP‐related variants and variants in MC1R are enriched in such families. Germline pathogenic variants in CDKN2A are well established as an underlying cause of familial malignant melanoma. While pathogenic
Gjertrud T. Iversen+5 more
wiley +1 more source
Scalable distributed event detection for Twitter [PDF]
Social media streams, such as Twitter, have shown themselves to be useful sources of real-time information about what is happening in the world.
Macdonald, Craig+4 more
core +2 more sources
Glioblastoma multiforme is the most devastating and incurable brain tumor. To better study this disease, a 3D model is developed using a hyaluronic acid‐based hydrogel combined with a multicellular approach. This model recapitulates in vivo brain stiffness, cell‐extracellular matrix and cell‐cell interactions and the tumor's hijacking function with the
Mateo S. Andrade Mier+26 more
wiley +1 more source