Results 51 to 60 of about 15,348,814 (368)

A blockchain-enabled secure searchable-encryption-based data transaction protocol [PDF]

open access: yesBlockchain
With the development of artificial intelligence and big data, data has become an important part of production factors, and the sharing and transaction of data have a very high importance. Through the storage service of the cloud data transaction platform,
Xingyun Hu   +7 more
doaj   +1 more source

Information Exchange between Construction and Manufacturing Industries to Achieve Circular Economy: A Literature Review and Interviews with Swedish Experts

open access: yesBuildings, 2023
The construction industry is responsible for 32% of the world’s consumption of natural resources, causing 850 million tons of construction waste in the European Union alone.
Annika Moscati   +4 more
doaj   +1 more source

Screening for lung cancer: A systematic review of overdiagnosis and its implications

open access: yesMolecular Oncology, EarlyView.
Low‐dose computed tomography (CT) screening for lung cancer may increase overdiagnosis compared to no screening, though the risk is likely low versus chest X‐ray. Our review of 8 trials (84 660 participants) shows added costs. Further research with strict adherence to modern nodule management strategies may help determine the extent to which ...
Fiorella Karina Fernández‐Sáenz   +12 more
wiley   +1 more source

Trust and privacy in distributed work groups [PDF]

open access: yes, 2009
Proceedings of the 2nd International Workshop on Social Computing, Behavioral Modeling and PredictionTrust plays an important role in both group cooperation and economic exchange.
C Shapiro   +15 more
core   +1 more source

Information Exchange in Randomly Deployed Dense WSNs With Wireless Energy Harvesting Capabilities [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2016
As large-scale dense and often randomly deployed wireless sensor networks (WSNs) become widespread, local information exchange between colocated sets of nodes may play a significant role in handling the excessive traffic volume.
Prodromos-Vasileios Mekikis   +5 more
semanticscholar   +1 more source

CDK11 inhibition induces cytoplasmic p21WAF1 splice variant by p53 stabilisation and SF3B1 inactivation

open access: yesMolecular Oncology, EarlyView.
CDK11 inhibition stabilises the tumour suppressor p53 and triggers the production of an alternative p21WAF1 splice variant p21L, through the inactivation of the spliceosomal protein SF3B1. Unlike the canonical p21WAF1 protein, p21L is localised in the cytoplasm and has reduced cell cycle‐blocking activity.
Radovan Krejcir   +12 more
wiley   +1 more source

The farm decision role of price information from commodity exchanges: an ex-ante evaluation using quasi-rational price expectations in Ethiopia [PDF]

open access: yes, 2011
Farmers use different information to predict future returns upon which they base current decisions. In designing information systems, knowledge about the information set used by farmers is relevant to have insight into the necessary information that ...
D'Haese, Luc   +4 more
core  

Network coding for undirected information exchange [PDF]

open access: yes, 2009
We consider the information exchange problem where each in a set of terminals transmits information to all other terminals in the set, over an undirected network.
Diggavi, Suthas N.   +2 more
core   +3 more sources

Strength through diversity: how cancers thrive when clones cooperate

open access: yesMolecular Oncology, EarlyView.
Intratumor heterogeneity can offer direct benefits to the tumor through cooperation between different clones. In this review, Kuiken et al. discuss existing evidence for clonal cooperativity to identify overarching principles, and highlight how novel technological developments could address remaining open questions.
Marije C. Kuiken   +3 more
wiley   +1 more source

Cyberspace Protection – the Challenge of Our Time? [PDF]

open access: yesBezpieczeństwo i Technika Pożarnicza, 2018
Aim: The main purpose of these considerations is to identify the cyberspace protection issues in the light of the National Security Strategy of the Republic of Poland of 2014, Polish legislation in the field of cybercrime protection, the cyberspace ...
Magdalena El Ghamari
doaj   +1 more source

Home - About - Disclaimer - Privacy