Results 81 to 90 of about 168,960 (287)
In the modern era of multicore processors, utilizing cores is a tedious job. Synchronization and communication among processors involve high cost. Software transaction memory systems (STMs) addresses this issues and provide better concurrency in which ...
CH Papadimitriou +7 more
core +1 more source
Risperidone is a commonly used antipsychotic for treating psychiatric illness in children and adolescents. There is a large variability in risperidone response and discontinuation rates remain high. Pharmacogenomics offers the opportunity to improve risperidone outcomes, yet studies in pediatric populations are limited.
Jack W. Staples +10 more
wiley +1 more source
Accurate querying of frequent subgraphs in power grid graph data
With the development of information technology, the amount of power grid topology data has gradually increased. Therefore, accurate querying of this data has become particularly important. Several researchers have chosen different indexing methods in the
Aihua Zhou +3 more
doaj +1 more source
On the insertion time of random walk cuckoo hashing
Cuckoo Hashing is a hashing scheme invented by Pagh and Rodler. It uses $d\geq 2$ distinct hash functions to insert items into the hash table. It has been an open question for some time as to the expected time for Random Walk Insertion to add items.
Frieze, Alan, Johansson, Tony
core +1 more source
Term Spread Volatility as a Leading Indicator of Economic Activity
ABSTRACT In this paper, we examine the macroeconomic predictive power of the volatility of the US Treasury yield curve slope (term spread volatility). Our forecasting exercise shows that US term spread volatility has significant predictive power for US industrial production and employment growth.
Anastasios Megaritis +3 more
wiley +1 more source
Space-efficient computation of k-mer dictionaries for large values of k
Computing k-mer frequencies in a collection of reads is a common procedure in many genomic applications. Several state-of-the-art k-mer counters rely on hash tables to carry out this task but they are often optimised for small k as a hash table keeping ...
Diego Díaz-Domínguez +2 more
doaj +1 more source
bacNeo: A Computational Toolkit for Identifying Bacteria‐Derived Neoantigens in Human Cancers
We present bacterial neoantigen (bacNeo), a multi‐omics‐based computational software to classify bacterial components (BACC), type bacteria‐bound HLA alleles (BACH), and prioritize bacterial peptides as neoantigens (BACP). Bacterial neoantigen potential is quantified by score for peptide antigenicity recognition & kinetics (SPARK), enabling ...
Yunzhe Wang +5 more
wiley +1 more source
A class of structured P2P systems supporting browsing [PDF]
Browsing is a way of finding documents in a large amount of data which is complementary to querying and which is particularly suitable for multimedia documents.
Cohen, Julien
core +2 more sources
From Expectations to Experience: A Comparison of Program Director Priorities to Resident Case Logs
The present study identified 47 essential otolaryngology procedures via program director surveys and evaluated the extent of resident participation in these cases through ACGME case logs. Results revealed significant variability in surgical experience, with nearly half of these essential procedures being logged fewer than 10 times during residency ...
Taylor S. Erickson +7 more
wiley +1 more source
More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function
We explicitly construct random hash functions for privacy amplification (extractors) that require smaller random seed lengths than the previous literature, and still allow efficient implementations with complexity $O(n\log n)$ for input length $n$.
Hayashi, Masahito, Tsurumaru, Toyohiro
core +1 more source

