Results 111 to 120 of about 91,922 (250)
Under normoxic conditions, the SUMOylated fraction of TFAP2A cannot interact with the Ku70/Ku80 complex, nor it can bind to chromatin. The unSUMOylated fraction pre‐occupies the chromatin of a subset of hypoxia‐induced genes together with the Ku70/Ku80 complex for basal euchromatin formation. Under hypoxic conditions, the SUMOylation equilibrium shifts
Amalia Kanoura+8 more
wiley +1 more source
A New Approach to Analyzing Robin Hood Hashing [PDF]
Robin Hood hashing is a variation on open addressing hashing designed to reduce the maximum search time as well as the variance in the search time for elements in the hash table. While the case of insertions only using Robin Hood hashing is well understood, the behavior with deletions has remained open.
arxiv
Efficient incremental hash chain with probabilistic filter-based method to update blockchain light nodes [PDF]
Maher Maalla, Sergey Bezzateev
openalex +1 more source
Association of gut microbiota with type 2 diabetes and its remission was examined in a population‐based study. Specific gut microbes were significantly associated with T2D and its remission. The gut microbiota may represent a potential area for further exploration in T2D treatment and prevention.
Keita Kinoshita+10 more
wiley +1 more source
A Dynamic Hash Table for the GPU [PDF]
We design and implement a fully concurrent dynamic hash table for GPUs with comparable performance to the state of the art static hash tables. We propose a warp-cooperative work sharing strategy that reduces branch divergence and provides an efficient alternative to the traditional way of per-thread (or per-warp) work assignment and processing.
arxiv
Abstract Objective Liver transplant recipients are at a high risk of infection during the first month. Therefore, it is crucial to implement isolation measures correctly to prevent the spread of nosocomial infections. Evidence‐based practices and proper implementation of isolation measures can significantly reduce morbidity and mortality.
Kapıkıran Gürkan+3 more
wiley +1 more source
The application of hash chains and hash structures to cryptography
In this thesis we study how hash chains and other hash structures can be used in various cryptographic applications. In particular we focus on the applications of entity authentication, signatures and key establishment. We study recursive application of hash functions to create hash chains, hash trees and other hash structures. We collate all these to
openaire +3 more sources
Simple implementation of deletion from open-address hash table [PDF]
Deletion from open-address hash table is not so easy as deletion from chained hash table, because in open-address table we can't simply mark a slot containing deleted key as empty. Search for keys may become incorrect. The classical method to implement deletion is to mark slots in hash table by three values: "free", "busy", "deleted".
arxiv
Intentionality and Attentionality Dynamics in an Institutional Change Process
Abstract In this article, we explore how actors' intentionality emerges, develops, and co‐evolves with institutional change. Although intentions are essential in shaping institutional change agents' motivations and actions, our understanding of their dynamics is limited and biased by the assumption that intentions are usually identifiable prior to ...
Sofiane Baba, Taïeb Hafsi, Omar Hemissi
wiley +1 more source
Lessons from the Syria‐Hezbollah Criminal Syndicate, 1985–2005
Abstract Hezbollah, founded with the intention of destroying Israel, has long engaged in illicit efforts to amass resources the size of some states’ coffers. The Lebanese group's long‐running global criminal syndicate with the Assad regime, initially forged in the 1980s, more recently allowed it to fight for more than a decade in the Syrian conflict ...
Iftah Burman, Yehuda Blanga
wiley +1 more source