Results 81 to 90 of about 123,825 (281)
Drug Critical Limits for Urgent Physician Notification
Critical limits represent quantitative decision thresholds for drugs that require immediate clinician notification and potential life‐saving intervention. United States hospitals lack a national standard for drug critical limits. We collected critical limits from 417 US hospitals across all 50 states and Washington, D.C.; of these, 411 maintained drug ...
Elina Kuang +3 more
wiley +1 more source
Risperidone is a commonly used antipsychotic for treating psychiatric illness in children and adolescents. There is a large variability in risperidone response and discontinuation rates remain high. Pharmacogenomics offers the opportunity to improve risperidone outcomes, yet studies in pediatric populations are limited.
Jack W. Staples +10 more
wiley +1 more source
Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing [PDF]
Cayley hash functions are based on a simple idea of using a pair of (semi)group elements, $A$ and $B$, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the natural way, by using multiplication of elements in the (semi ...
Bromberg, Lisa +2 more
core +1 more source
Zero-Shot Hashing via Transferring Supervised Knowledge
Hashing has shown its efficiency and effectiveness in facilitating large-scale multimedia applications. Supervised knowledge e.g. semantic labels or pair-wise relationship) associated to data is capable of significantly improving the quality of hash ...
Frome A. +17 more
core +1 more source
Abstract Glut1 deficiency syndrome (Glut1DS) leads to neurological and cognitive symptoms and is primarily treated using carbohydrate‐restricted ketogenic diets. However, a recent clinical trial of a less restrictive, non‐ketogenic, medium chain triglyceride (MCT) diet with a high decanoic acid content suggests efficacy in Glut1DS treatment.
Erwann Pain +10 more
wiley +1 more source
Quantum authentication of classical messages
Although key distribution is arguably the most studied context on which to apply quantum cryptographic techniques, message authentication, i.e., certifying the identity of the message originator and the integrity of the message sent, can also benefit ...
Curty, Marcos, Santos, David J.
core +1 more source
Term Spread Volatility as a Leading Indicator of Economic Activity
ABSTRACT In this paper, we examine the macroeconomic predictive power of the volatility of the US Treasury yield curve slope (term spread volatility). Our forecasting exercise shows that US term spread volatility has significant predictive power for US industrial production and employment growth.
Anastasios Megaritis +3 more
wiley +1 more source
Fast Scalable Construction of (Minimal Perfect Hash) Functions
Recent advances in random linear systems on finite fields have paved the way for the construction of constant-time data structures representing static functions and minimal perfect hash functions using less space with respect to existing techniques.
A Goerdt +13 more
core +1 more source
bacNeo: A Computational Toolkit for Identifying Bacteria‐Derived Neoantigens in Human Cancers
We present bacterial neoantigen (bacNeo), a multi‐omics‐based computational software to classify bacterial components (BACC), type bacteria‐bound HLA alleles (BACH), and prioritize bacterial peptides as neoantigens (BACP). Bacterial neoantigen potential is quantified by score for peptide antigenicity recognition & kinetics (SPARK), enabling ...
Yunzhe Wang +5 more
wiley +1 more source
A Second Preimage Attack on the XOR Hash Combiner
The exclusive-or (XOR) hash combiner is a classical hash function combiner, which is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1.
Shiwei Chen +3 more
doaj +1 more source

