Results 61 to 70 of about 2,144,321 (256)

Research Ready Data Lakes: Protecting Privacy in Relatable Datasets

open access: yesInternational Journal of Population Data Science, 2019
Background with rationale The Georgia Policy Labs’ mission is to improve outcomes for children and families by producing rigorous research with long-term government partners.
Robert McMillan, Maggie Reeves
doaj   +1 more source

Guest Editorial: Multi‐view representation learning for computer vision

open access: yes, 2023
IET Computer Vision, EarlyView.
Xin Ning   +5 more
wiley   +1 more source

Time Efficient Hash Key Generation for Blockchain Enabled Framework

open access: yesIEEE Access
Blockchain, in general, helps organizations to improve the transparency and governance by removing its shortfalls and building better control overall. Blockchain network, public or private, is a competent technology when used in order with an optimized ...
Shyam Kumar Sinha, Debarka Mukhopadhyay
doaj   +1 more source

Non‐participation in smartphone data collection using research apps

open access: yesJournal of the Royal Statistical Society: Series A (Statistics in Society), Volume 185, Issue S2, Page S225-S245, December 2022., 2022
Abstract Research apps allow to administer survey questions and passively collect smartphone data, thus providing rich information on individual and social behaviours. Agreeing to this novel form of data collection requires multiple consent steps, and little is known about the effect of non‐participation. We invited 4,293 Android smartphone owners from
Florian Keusch   +5 more
wiley   +1 more source

A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies

open access: yes, 2020
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms, and it is used as a proof-of-work function in several cryptocurrencies.
Balatsoukas-Stimming, Alexios   +4 more
core   +2 more sources

Quantum attacks on Bitcoin, and how to protect against them [PDF]

open access: yes, 2017
The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer.
Aggarwal, Divesh   +4 more
core   +3 more sources

Optimized Entanglement Purification [PDF]

open access: yes, 2019
We investigate novel protocols for entanglement purification of qubit Bell pairs. Employing genetic algorithms for the design of the purification circuit, we obtain shorter circuits achieving higher success rates and better final fidelities than what is ...
Albert, Victor V.   +2 more
core   +2 more sources

Germline variants in CDKN2A wild‐type melanoma prone families

open access: yesMolecular Oncology, EarlyView.
Among melanoma‐prone families, wild‐type for CDKN2A and CDK4, some have pathogenic variants in genes not usually linked to melanoma. Furthermore, rare XP‐related variants and variants in MC1R are enriched in such families. Germline pathogenic variants in CDKN2A are well established as an underlying cause of familial malignant melanoma. While pathogenic
Gjertrud T. Iversen   +5 more
wiley   +1 more source

Scalable distributed event detection for Twitter [PDF]

open access: yes, 2013
Social media streams, such as Twitter, have shown themselves to be useful sources of real-time information about what is happening in the world.
Macdonald, Craig   +4 more
core   +2 more sources

3D In Vitro Glioma‐Neuron‐Astrocyte Biomimetic Composites Recapitulate Key Molecular Mechanisms Linked to Glioblastoma Multiforme Pathophysiology

open access: yesAdvanced Functional Materials, EarlyView.
Glioblastoma multiforme is the most devastating and incurable brain tumor. To better study this disease, a 3D model is developed using a hyaluronic acid‐based hydrogel combined with a multicellular approach. This model recapitulates in vivo brain stiffness, cell‐extracellular matrix and cell‐cell interactions and the tumor's hijacking function with the
Mateo S. Andrade Mier   +26 more
wiley   +1 more source

Home - About - Disclaimer - Privacy