Results 141 to 150 of about 159,796 (327)
Finding minimal perfect hash functions [PDF]
Gary Haggard, Kevin Karplus
openalex +1 more source
This study investigates the effect of IL‐33 and Hymenoptera venom on mast cell cytokine profiles under venom immunotherapy (VIT)‐like conditions. Our in vitro model of VIT‐like mast cell stimulation demonstrates a modulatory effect of IL‐33 on the secreted mast cell cytokine profile.
Andrea R. Teufelberger +3 more
wiley +1 more source
The power of primes: security of authentication based on a universal hash-function family [PDF]
Basel Alomair +2 more
openalex +1 more source
Abstract Background Myocyte enhancer factor 2 transcription factors regulate essential transcriptional programs in various cell types. The activity of myocyte enhancer factor 2 factors is modulated through interactions with cofactors, chromatin remodelers, and other regulatory proteins, which are dependent on cell context and physiological state.
Karine de Mattos +4 more
wiley +1 more source
We present a 25‐stage reconstruction of the ice‐flow pattern evolution of the Scandinavian Ice Sheet based on mapping and analysis of ~240 000 subglacial lineations and lineation fields across Norway, Sweden, Finland, and parts of NW Russia. Our reconstruction uses a glacial geomorphological inversion approach, in which we generated 611 individual ...
Frances E. G. Butcher +9 more
wiley +1 more source
An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things. [PDF]
Ahmed AA, Ahmed WA.
europepmc +1 more source
Robust Hashing for Multi-View Data: Jointly Learning Low-Rank Kernelized Similarity Consensus and Hash Functions [PDF]
Lin Wu, Yang Wang
openalex +1 more source
Physical attractiveness, drug taking and gender differences
Abstract This study investigates the relationship between adolescent physical attractiveness and drug‐taking behaviour, emphasizing the human capital and “pretty girl” effects on the decision to use drugs. Through the human capital effect, physically attractive adolescents are better positioned to accumulate human capital at a young age compared to ...
Andy Chung, Junsen Zhang
wiley +1 more source
Finding Bugs in Cryptographic Hash Function Implementations. [PDF]
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc +1 more source
Encoding Occupancy in Memory Location for Efficient and Compact High‐Resolution Voxel Structures
We encode information about geometric structure into the pointers of a sparse voxel directed acyclic graph (SVDAG). Each pointer carries information about the structure of the node it points to. Our encoding improves ray tracing performance and reduces model size in memory.
Jaina Modisett, Markus Billeter
wiley +1 more source

