Results 61 to 70 of about 163,266 (144)

Thermal risk of seed germination of UK's plant populations and implications for climate‐smart ecological restoration

open access: yesRestoration Ecology, Volume 34, Issue 1, January 2026.
Abstract Introduction Seed‐based ecological restoration actions are needed to halt biodiversity loss and mitigate climate change effects. However, identifying populations to target for climate‐ready seed sourcing remains a major challenge due to germination and genetic constraints.
Efisio Mattana   +10 more
wiley   +1 more source

Spectrum, Spring 1990 [PDF]

open access: yes, 1989
Spectrum was a newsletter for students, faculty, staff and alumni of the Henry M.
Frankl, Spencer N.
core   +1 more source

Towards an interpreter for efficient encrypted computation [PDF]

open access: yes, 2012
Fully homomorphic encryption (FHE) techniques are capable of performing encrypted computation on Boolean circuits, i.e., the user specifies encrypted inputs to the program, and the server computes on the encrypted inputs.
Devadas, Srinivas   +2 more
core   +2 more sources

Identifying Key Questions and Challenges in Microchimerism Biology

open access: yesAdvanced Science, Volume 12, Issue 48, December 29, 2025.
This study identifies key unanswered questions about microchimerism, the presence of cells from one individual living in another. Experts highlight how these cells may affect health, pregnancy, and disease. This study outlines research priorities and challenges in detecting and studying these rare microchimeric cells, aiming to guide future discoveries
Kristine J. Chua   +31 more
wiley   +1 more source

On the exact decryption range for Gentry–Halevi's implementation of fully homomorphic encryption

open access: yesJournal of Mathematical Cryptology, 2014
In this paper, we revisit the fully homomorphic encryption (FHE) scheme implemented by Gentry and Halevi, which is just an instantiation of Gentry's original scheme based on ideal lattices.
Yasuda Masaya   +4 more
doaj   +1 more source

Bostonia Magazine: A Boston University Alumni House Publication. Volume 54 [PDF]

open access: yes, 1980
Founded in 1900, Bostonia magazine is Boston University's main alumni publication, which covers alumni and student life, as well as university activities, events, and ...

core  

Characteristics and staging of patients with Alzheimer's disease: real‐world data from the United Kingdom

open access: yesAlzheimer's &Dementia, Volume 21, Issue S6, December 2025.
Abstract Background Alzheimer's disease (AD) prevalence is increasing, with high burden felt by patients, families and healthcare systems. Early and accurate diagnosis of AD, including dementia severity, is important to ensure patients receive appropriate support, and treatment where available.
Caroline S Casey   +8 more
wiley   +1 more source

Discovery of Three Toxic Proteins of Klebsiella Phage fHe-Kpn01

open access: yesViruses, 2020
The lytic phage, fHe-Kpn01 was isolated from sewage water using an extended-spectrum beta-lactamase-producing strain of Klebsiella pneumoniae as a host. The genome is 43,329 bp in size and contains direct terminal repeats of 222 bp.
Cindy M. Spruit   +4 more
doaj   +1 more source

Mechanisms of lncRNA in Diabetic Foot Ulcer Wound Healing

open access: yesThe Journal of Gene Medicine, Volume 27, Issue 11, November 2025.
This review elucidates the critical roles of lncRNAs in regulating inflammation, angiogenesis, and extracellular matrix remodeling during diabetic foot ulcer healing. Key lncRNAs such as GAS5, H19, and MALAT1 modulate these processes by sponging miRNAs and targeting signaling pathways. We also discuss the therapeutic potential and current challenges of
Yiming Chen   +5 more
wiley   +1 more source

Accelerating NTT with RISC-V Vector Extension for Fully Homomorphic Encryption

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Fully Homomorphic Encryption (FHE) has gained increasing importance mainly due to its potential use in privacy-preserving cloud computing. This privacy stems from the computation being directly performed on data that is encrypted by the client. However,
Tiago B. Rodrigues   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy