Results 51 to 60 of about 58,015 (113)

Identification of MEF2A, MEF2C, and MEF2D interactomes in basal and Fsk‐stimulated mouse MA‐10 Leydig cells

open access: yesAndrology, EarlyView.
Abstract Background Myocyte enhancer factor 2 transcription factors regulate essential transcriptional programs in various cell types. The activity of myocyte enhancer factor 2 factors is modulated through interactions with cofactors, chromatin remodelers, and other regulatory proteins, which are dependent on cell context and physiological state.
Karine de Mattos   +4 more
wiley   +1 more source

LightChain: A DHT-based Blockchain for Resource Constrained Environments [PDF]

open access: yes, 2019
As an append-only distributed database, blockchain is utilized in a vast variety of applications including the cryptocurrency and Internet-of-Things (IoT).
Hassanzadeh-Nazarabadi, Yahya   +2 more
core   +1 more source

Current application of blockchain technology in healthcare and its potential roles in Urology

open access: yesBJU International, EarlyView.
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban   +6 more
wiley   +1 more source

Digital signatures over hash-entangled chains [PDF]

open access: yesSN Applied Sciences, 2019
In this work we introduce a new approach for digital signature based on hash chains. The method is supported on the well known security principles of hash functions. Some main advantages of this public key system include security and estimated efficiency through the so called signature chains.
openaire   +2 more sources

3DGS.zip: A survey on 3D Gaussian Splatting Compression Methods

open access: yesComputer Graphics Forum, EarlyView.
Abstract 3D Gaussian Splatting (3DGS) has emerged as a cutting‐edge technique for real‐time radiance field rendering, offering state‐of‐the‐art performance in terms of both quality and speed. 3DGS models a scene as a collection of three‐dimensional Gaussians, with additional attributes optimized to conform to the scene's geometric and visual properties.
M. T. Bagdasarian   +6 more
wiley   +1 more source

Generalized Hash Chain Traversal with Selective Output

open access: yesIEICE Transactions on Information and Systems, 2010
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where v0 is a public value, vn a secret value, and vi =h(vi+1). A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1 ≤ i ≤ n.
Yum, DH, Seo, JW, Cho, K, Lee, PJ
openaire   +4 more sources

Random Access Segmentation Volume Compression for Interactive Volume Rendering

open access: yesComputer Graphics Forum, EarlyView.
Abstract Segmentation volumes are voxel data sets often used in machine learning, connectomics, and natural sciences. Their large sizes make compression indispensable for storage and processing, including GPU video memory constrained real‐time visualization.
M. Piochowiak   +2 more
wiley   +1 more source

NSEC5, DNSSEC authenticated denial of existence [PDF]

open access: yes, 2018
The Domain Name System Security Extensions (DNSSEC) introduced two resource records (RR) for authenticated denial of existence: the NSEC RR and the NSEC3 RR. This document introduces NSEC5 as an alternative mechanism for DNSSEC authenticated
Goldberg, Sharon   +4 more
core  

Preventing financial ruin: How the West India trade fostered creativity in crisis lending by the Bank of England

open access: yesThe Economic History Review, EarlyView.
Abstract This paper contributes to the understanding of the complex relationship between British economic performance during the Napoleonic wars and the ‘West Indies’, as the Caribbean slave colonies were called. Not only did profits from slave‐based commerce provide financing for the growth of the financial sector, as has been claimed, but the risk of
Carolyn Sissoko, Mina Ishizu
wiley   +1 more source

Multi-Dimensional Hash Chains and Application to Micropayment Schemes [PDF]

open access: yes, 2006
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash chains. We show that this construction has storage-computational complexity of O(logN) per chain element, which is ...
openaire   +3 more sources

Home - About - Disclaimer - Privacy