Results 41 to 50 of about 21,581 (216)
Quantum Computing with Very Noisy Devices
In theory, quantum computers can efficiently simulate quantum physics, factor large numbers and estimate integrals, thus solving otherwise intractable computational problems. In practice, quantum computers must operate with noisy devices called ``gates''
A Steane +23 more
core +1 more source
Percolation, renormalization, and quantum computing with non-deterministic gates [PDF]
We apply a notion of static renormalization to the preparation of entangled states for quantum computing, exploiting ideas from percolation theory. Such a strategy yields a novel way to cope with the randomness of non-deterministic quantum gates. This is
G. Grimmett +3 more
core +2 more sources
CCDC80 suppresses high‐grade serous ovarian cancer migration via negative regulation of B7‐H3
PAX8 is a lineage‐specific master regulator of transcription in high‐grade serous ovarian cancer (HGSC) progression. We show for the first time that PAX8 facilitates proliferation and metastasis by repressing the cell autonomous tumor suppressor CCDC80 and inducing B7‐H3 expression.
Aya Saleh +12 more
wiley +1 more source
Loss of IGF‐1R impairs DNA‐PKcs recruitment to chromatin leading to defective end‐joining
IGF‐1R promotes radioresistance by facilitating DNA‐PKcs recruitment to chromatin, enabling non‐homologous end‐joining (NHEJ) repair of double‐strand breaks. Inhibition or loss of IGF‐1R disrupts this recruitment to damage sites, driving compensatory reliance on microhomology‐mediated end‐joining (MMEJ) repair.
Matthew O. Ellis +3 more
wiley +1 more source
This protocol paper outlines methods to establish the success of a time‐resolved serial crystallographic experiment, by means of statistical analysis of timepoint data in reciprocal space and models in real space. We show how to amplify the signal from excited states to visualise structural changes in successful experiments.
Jake Hill +4 more
wiley +1 more source
Multicast in DKS(N, k, f) Overlay Networks [PDF]
Recent developments in the area of peer-to-peer computing show that structured overlay networks implementing distributed hash tables scale well and can serve as infrastructures for Internet scale applications.
Ali Ghodsi +4 more
core +7 more sources
A probabilistic extension of UML statecharts: specification and verification [PDF]
This paper is the extended technical report that corresponds to a published paper [14]. This paper introduces means to specify system randomness within UML statecharts, and to verify probabilistic temporal properties over such enhanced statecharts which ...
Hermanns, Holger +2 more
core +9 more sources
Digital twins to accelerate target identification and drug development for immune‐mediated disorders
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley +1 more source
Objective We aimed to estimate the prevalence and cumulative incidence of hydroxychloroquine retinopathy (HCQ‐R) and its risk factors among patients receiving long‐term HCQ with rheumatic diseases through a systematic review and meta‐analysis of observational studies that used spectral‐domain optical coherence tomography (SD‐OCT) for screening ...
Narsis Daftarian +4 more
wiley +1 more source
Creep experiments at 900°C on coarse‐grained steel‐ceramic composites containing recycled magnesia reveal that higher ceramic volume fractions significantly enhance the creep resistance. Detailed EBSD investigations identify subgrain formation in the steel matrix as the dominant deformation mechanism.
Moritz Müller +6 more
wiley +1 more source

