Results 41 to 50 of about 6,315,248 (307)

Matching in Informal Financial Institutions [PDF]

open access: yesJournal of the European Economic Association, 2010
This paper analyzes an informal financial institution that brings heterogeneous agents together in groups. We analyze decentralized matching into these groups, and the equilibrium composition of participants that consequently arises. We find that participants sort remarkably well across the competing groups, and that they re-sort immediately following ...
Jan, Eeckhout, Kaivan, Munshi
openaire   +2 more sources

Blinatumomab Utilization in Pediatric B‐Cell Acute Lymphoblastic Leukemia: Experience From the Mountain West

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Blinatumomab is a bispecific T‐cell engager approved for the treatment of pediatric B‐cell acute lymphoblastic leukemia (B‐ALL). Outpatient home infusion reduces hospitalization burden and optimizes resource utilization, but is logistically challenging.
Angela Parra del Riego   +10 more
wiley   +1 more source

Formal Security Reassessment of the 5G-AKA-FS Protocol: Methodological Corrections and Augmented Verification Techniques

open access: yesSensors
The 5G-AKA protocol, a foundational component for 5G network authentication, has been found vulnerable to various security threats, including linkability attacks that compromise user privacy.
Yongho Ko   +2 more
doaj   +1 more source

ACCESSIBILITY OF FINANCIAL INFORMATION IN RELATION TO CHANGES IN SIZE OF ENTITIES CAUSED BY THE COVID‐19 CRISIS

open access: yesPolityki Europejskie, Finanse i Marketing, 2020
The consequences of the Covid-19 pandemic on the quality and scope of financialinformation prepared by accounting are complex. The scope of the financial statement and theobligation to audit depend on the classification of units based on their size.
Małgorzata Garstka
doaj   +1 more source

End-to-End Post-Quantum Cryptography Encryption Protocol for Video Conferencing System Based on Government Public Key Infrastructure

open access: yesApplied System Innovation, 2023
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing ...
Yeongjae Park   +5 more
doaj   +1 more source

Financial Information Failure and Lawyer Responsibility [PDF]

open access: yes, 2006
When public firms collapse amid allegations of financial information failure-such as misleading financial statements-society looks beyond the role of accountants to see who else should be held responsible.
Schwarcz, Steven L.
core   +1 more source

A methionine‐lined active site governs carbocation stabilization and product specificity in a bacterial terpene synthase

open access: yesFEBS Letters, EarlyView.
This study reveals a unique active site enriched in methionine residues and demonstrates that these residues play a critical role by stabilizing carbocation intermediates through novel sulfur–cation interactions. Structure‐guided mutagenesis further revealed variants with significantly altered product profiles, enhancing pseudopterosin formation. These
Marion Ringel   +13 more
wiley   +1 more source

Financial markets: very noisy information processing [PDF]

open access: yes, 1998
We report new results about the impact of noise on information processing with application to financial markets. These results quantify the tradeoff between the amount of data and the noise level in the data.
Abu-Mostafa, Yaser S.   +2 more
core   +1 more source

Potential therapeutic targeting of BKCa channels in glioblastoma treatment

open access: yesMolecular Oncology, EarlyView.
This review summarizes current insights into the role of BKCa and mitoBKCa channels in glioblastoma biology, their potential classification as oncochannels, and the emerging pharmacological strategies targeting these channels, emphasizing the translational challenges in developing BKCa‐directed therapies for glioblastoma treatment.
Kamila Maliszewska‐Olejniczak   +4 more
wiley   +1 more source

Toward an Era of Secure 5G Convergence Applications: Formal Security Verification of 3GPP AKMA with TLS 1.3 PSK Option

open access: yesApplied Sciences
The 5th Generation Mobile Communication (5G) plays a significant role in the Fourth Industrial Revolution (4IR), facilitating significant improvements and innovations in various fields.
Yongho Ko   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy