Results 111 to 120 of about 2,338,489 (263)

Secure resource metering and accounting with hash chain in cloud storage

open access: yesTongxin xuebao, 2013
Cloud storage is a pay-per-use service of which the billing plan is typically based on users' resource consump-tion metered by server side. Therefore, the trustworthiness between payer and service provider becomes a key factor for the business, and ...
Mei LIU   +5 more
doaj   +2 more sources

How error correction affects polymerase chain reaction deduplication: A survey based on unique molecular identifier datasets of short reads

open access: yesQuantitative Biology, Volume 13, Issue 3, September 2025.
Abstract Next‐generation sequencing data are widely utilised for various downstream applications in bioinformatics and numerous techniques have been developed for PCR‐deduplication and error‐correction to eliminate bias and errors introduced during the sequencing.
Pengyao Ping   +4 more
wiley   +1 more source

A Framework for Blockchain Interoperability and Runtime Selection

open access: yes, 2019
The suitability of a particular blockchain for a given use case depends mainly on the blockchain's functional and non-functional properties. Such properties may vary over time, and thus, a selected blockchain may become unsuitable for a given use case ...
Borkowski, Michael   +2 more
core  

Exploring the untapped potential of single‐cell and spatial omics in plant biology

open access: yesNew Phytologist, Volume 247, Issue 3, Page 1098-1116, August 2025.
Summary Advances in single‐cell and spatial omics technologies have revolutionised biology by revealing the diverse molecular states of individual cells and their spatial organization within tissues. The field of plant biology has widely adopted single‐cell transcriptome and chromatin accessibility profiling and spatial transcriptomics, which extend ...
Tatsuya Nobori
wiley   +1 more source

Enhanced Hash Chain based Scheme for Security and Privacy in RFID Systems

open access: yes, 2011
research Paper describes security and privacy issues in RFID systems and proposes a new enhanced algorithm. Our proposed protocol is an enhancement over Sang-Soo Yeo and Sung Kwon Kim" protocol and it provides better security and privacy.
Vaibhaw Dixit, H. Verma, Akhil K. Singh
semanticscholar   +1 more source

Hybridization and Asymmetrical Introgression Between the Vulnerable Gray‐Headed Chickadee and a More Abundant Congener, the Boreal Chickadee: Implications for Conservation

open access: yesEcology and Evolution, Volume 15, Issue 7, July 2025.
We assess genetic evidence of hybridization between gray‐headed chickadees and boreal chickadees using mitochondrial DNA and nuclear DNA sequencing of individuals from historical and contemporary time periods. We detected two early‐generation hybrids among the historical boreal chickadee samples and none within the contemporary boreal chickadee samples
Matthew R. Armstrong   +7 more
wiley   +1 more source

Analysis of cross-chain technology of blockchain

open access: yes物联网学报, 2020
With the development of blockchain technology,more and more blockchain projects have appeared.Due to the closure property of the blockchain,different blockchains have become islands of value.The information interaction and value transfer problems between
Zhao GUO   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy