Results 51 to 60 of about 8,141,629 (261)

Real‐World Pediatric Blinatumomab Administration: Access to Outpatient Care Delivery and Impact of a Hospital‐Dispensed Model

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Blinatumomab has been shown to be highly effective for patients with pediatric B‐ALL and has recently become standard of care therapy. Due to its past use in the clinical trial setting, there is limited information available about real‐world administration.
Katelyn Oranges   +12 more
wiley   +1 more source

Secure Key Rate of the BB84 Protocol using Finite Sample Bits

open access: yes, 2010
We improve the non-asymptotic key rate shown by Scarani and Renner by proposing several methods to construct tighter conservative confidence intervals of the phase error rate than one shown by them.
Matsumoto, Ryutaroh   +2 more
core   +1 more source

Clinical Insights Into Hypercalcemia of Malignancy in Childhood

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley   +1 more source

A Large Deviations Approach to Secure Lossy Compression

open access: yes, 2015
We consider a Shannon cipher system for memoryless sources, in which distortion is allowed at the legitimate decoder. The source is compressed using a rate distortion code secured by a shared key, which satisfies a constraint on the compression rate, as ...
Merhav, Neri, Weinberger, Nir
core   +1 more source

On the secret-key rate of binary random variables

open access: yesProceedings of 1994 IEEE International Symposium on Information Theory, 2002
Consider a scenario in which two parties Alice and Bob as well as an opponent Eve receive the output of a binary symmetric source (e,g. installed in a satellite) over individual, not necessarily independent binary symmetric channels. Alice and Bob share no secret key initially and can only communicate over a public channel completely accessible to Eve.
Gander, Martin Jakob, Maurer, Ueli M.
openaire   +3 more sources

Key rate of quantum key distribution with hashed two-way classical communication [PDF]

open access: yesPhysical Review A, 2007
RevTex, 19 pages, 2 figures, to be presented at 2007 IEEE International Symposium on Information Theory, Appendices E and F are added in version ...
Shun Watanabe   +3 more
openaire   +2 more sources

Survival Outcomes and Complications Among Canadian Children With Retinoblastoma: A Population‐Based Report From CYP‐C

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Retinoblastoma (RB) is the most common pediatric ocular cancer, yet population‐based data on survival and risk factors remain limited. This study aimed to describe survival in a large national RB cohort and identify predictors of death and complications.
Samuel Sassine   +14 more
wiley   +1 more source

Sub-Gbps key rate four-state continuous-variable quantum key distribution within metropolitan area

open access: yesCommunications Physics, 2022
With the continuous development of metropolitan broadband and network, the need of secure and faster transmission also increases. The authors demonstrate a single-carrier four-state continuous-variable quantum key distribution (CVQKD) with sub-Gbps key ...
Heng Wang   +10 more
doaj   +1 more source

Interest Rate Risk of Bonds in the Condition of a Changing Key Rate

open access: yesФинансы: теория и практика, 2022
The article is devoted to the analysis of the behavior of the interest rate risk of bonds in the conditions of a changing key interest rate. As known, the key rate is an instrument of monetary regulation of the Central Bank of the Russian Federation ...
N. V. Popova
doaj   +1 more source

No-Switching Quantum Key Distribution using Broadband Modulated Coherent Light [PDF]

open access: yes, 2005
We realize an end-to-end no-switching quantum key distribution protocol using continuous-wave coherent light. We encode weak broadband Gaussian modulations onto the amplitude and phase quadratures of light beams at the Shannon's information limit. Our no-
Andrew M. Lance   +11 more
core   +1 more source

Home - About - Disclaimer - Privacy