Results 51 to 60 of about 35,120 (283)
Codes With Locality for Two Erasures
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
N. Prakash +3 more
openaire +2 more sources
Opportunistic Interference Management for Multicarrier systems
We study opportunistic interference management when there is bursty interference in parallel 2-user linear deterministic interference channels. A degraded message set communication problem is formulated to exploit the burstiness of interference in M ...
Diggavi, Suhas +2 more
core +1 more source
NF90–NF45 functions as a negative regulator of methyltransferase‐like 3/14 (METTL3/14)‐mediated N6‐methyladenosine (m6A) modification on primary microRNAs (pri‐miRNAs). NF90–NF45 binds to anti‐oncogenic pri‐miRNAs and inhibits their m6A modification, thereby suppressing the biogenesis of anti‐oncogenic miRNAs.
Takuma Higuchi +6 more
wiley +1 more source
A sequence‐encoded supramolecular construct containing two accessible toeholds is developed herein for enabling multiple editing operations. By introducing specific input strands, it is possible to selectively erase or rewrite digital content through parallel or series toehold‐mediated strand displacement (PTMSD or STMSD).
Jakub Ossowski +3 more
wiley +1 more source
Whether and Where to Code in the Wireless Relay Channel
The throughput benefits of random linear network codes have been studied extensively for wirelined and wireless erasure networks. It is often assumed that all nodes within a network perform coding operations.
Lucani, Daniel E. +2 more
core +1 more source
xStripeMerge: efficient wide stripe generation approach based on erasure coding storage
To address the issue of wide stripe generation in existing erasure coding storage systems, where storage scaling approaches resulted in a significant increase in wide stripe generation bandwidth and stripe merge scheme was constrained by dual-stripes, an
Meiguang ZHENG +3 more
doaj +2 more sources
A Secure Cloud-Edge Collaborative Fault-Tolerant Storage Scheme and Its Data Writing Optimization
Fueled by the explosive growth of edge smart IoT devices, edge storage systems (ESS) have emerged as a new paradigm to support the efficient access of massive edge data.
Junqi Chen +3 more
doaj +1 more source
Efficient Charge Transport in Zero‐Dimensional Perovskite for Ultrahigh‐Sensitivity X‐Ray Detection
A novel mono‐octahedral 0D Bi‐based Dpy3Bi2I12 perovskite strengthens the internal hydrogen bonds and forms a quasi‐2D lattice, exhibits exceptional charge transport and mobility, achieving high X‐ray sensitivity and ultralow‐dose imaging, and setting a new benchmark for 0D detector performance.
Xin Song +16 more
wiley +1 more source
Molecularly engineered memristors integrating Ag nanoparticle–embedded synthetic DNA with quasi‐2D halide perovskites enable ultra‐low‐operational voltage, forming‐free resistive switching, and record‐low power density. This synergistic integration of customized DNA and 2D OHP in bio‐hybrid architecture enhances charge transport, reduces variability ...
Kavya S. Keremane +9 more
wiley +1 more source
Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes
For an arbitrary degree distribution pair (DDP), we construct a sequence of low-density parity-check (LDPC) code ensembles with girth growing logarithmically in block-length using Ramanujan graphs.
Bloch, Matthieu +3 more
core +1 more source

