Results 91 to 100 of about 7,526,383 (337)
Practical Subtyping for System F with Sized (Co-)Induction
We present a rich type system with subtyping for an extension of System F. Our type constructors include sum and product types, universal and existential quantifiers, inductive and coinductive types.
Lepigre, Rodolphe, Raffalli, Christophe
core
Preliminary Results in a Multi-site Empirical Study on Cross-organizational ERP Size and Effort Estimation [PDF]
This paper reports on initial findings in an empirical study carried out with representatives of two ERP vendors, six ERP adopting organizations, four ERP implementation consulting companies, and two ERP research and advisory services firms.
Daneva, M.
core +1 more source
Design and Analysis of LT Codes with Decreasing Ripple Size
In this paper we propose a new design of LT codes, which decreases the amount of necessary overhead in comparison to existing designs. The design focuses on a parameter of the LT decoding process called the ripple size.
Popovski, Petar +2 more
core +2 more sources
Designing Identification Schemes with Keys of Short Size [PDF]
In the last few years, there have been several attempts to build identification protocols that do not rely on arithmetical operations with large numbers but only use simple operations (see [10, 8]). One was presented at the CRYPTO 89 rump session ([8]) and depends on the so-called Permuted Kernel problem (PKP).
openaire +2 more sources
Anaplastic thyroid cancer (ATC) lacks iodide uptake ability due to MAPK activation increasing the expression of the histone methyltransferase EZH2, which represses thyroid differentiation genes (TDGs) such as the sodium iodide symporter (NIS). Dual inhibition of MAPK (U0126) and EZH2 (EPZ6438/Tazemetostat) reverses this mechanism, thus restoring TDG ...
Diego Claro de Mello +6 more
wiley +1 more source
Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters [PDF]
In Identity-Based Encryption (IBE) systems, key revocation is non-trivial. This is because a user's identity is itself a public key. Moreover, the private key corresponding to the identity needs to be obtained from a trusted key authority through an ...
Chen, Jie +4 more
core
Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key
Based on mutual authentication, the session key is established for communication nodes on the open network. In order to satisfy fine-grained access control for cloud storage, the two-party attribute-based key agreement protocol (TP-AB-KA) was proposed.
Jiguo Li +4 more
openaire +2 more sources
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley +1 more source
Effective population size reflects the history of population growth, contraction, and structuring. When the effect of structuring is negligible, the inferred trajectory of the effective population size can be informative about the key events in the ...
Ural Yunusbaev +3 more
doaj +1 more source
Experimental quantum key distribution with finite-key security analysis for noisy channels
In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit.
Bacco, Davide +4 more
core +1 more source

