Results 91 to 100 of about 7,526,383 (337)

Practical Subtyping for System F with Sized (Co-)Induction

open access: yes, 2017
We present a rich type system with subtyping for an extension of System F. Our type constructors include sum and product types, universal and existential quantifiers, inductive and coinductive types.
Lepigre, Rodolphe, Raffalli, Christophe
core  

Preliminary Results in a Multi-site Empirical Study on Cross-organizational ERP Size and Effort Estimation [PDF]

open access: yes, 2007
This paper reports on initial findings in an empirical study carried out with representatives of two ERP vendors, six ERP adopting organizations, four ERP implementation consulting companies, and two ERP research and advisory services firms.
Daneva, M.
core   +1 more source

Design and Analysis of LT Codes with Decreasing Ripple Size

open access: yes, 2012
In this paper we propose a new design of LT codes, which decreases the amount of necessary overhead in comparison to existing designs. The design focuses on a parameter of the LT decoding process called the ripple size.
Popovski, Petar   +2 more
core   +2 more sources

Designing Identification Schemes with Keys of Short Size [PDF]

open access: yes, 1994
In the last few years, there have been several attempts to build identification protocols that do not rely on arithmetical operations with large numbers but only use simple operations (see [10, 8]). One was presented at the CRYPTO 89 rump session ([8]) and depends on the so-called Permuted Kernel problem (PKP).
openaire   +2 more sources

Targeting EZH2 reverses thyroid cell dedifferentiation and enhances iodide uptake in anaplastic thyroid cancer

open access: yesFEBS Letters, EarlyView.
Anaplastic thyroid cancer (ATC) lacks iodide uptake ability due to MAPK activation increasing the expression of the histone methyltransferase EZH2, which represses thyroid differentiation genes (TDGs) such as the sodium iodide symporter (NIS). Dual inhibition of MAPK (U0126) and EZH2 (EPZ6438/Tazemetostat) reverses this mechanism, thus restoring TDG ...
Diego Claro de Mello   +6 more
wiley   +1 more source

Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters [PDF]

open access: yes, 2012
In Identity-Based Encryption (IBE) systems, key revocation is non-trivial. This is because a user's identity is itself a public key. Moreover, the private key corresponding to the identity needs to be obtained from a trusted key authority through an ...
Chen, Jie   +4 more
core  

Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key

open access: yesSecurity and Communication Networks, 2018
Based on mutual authentication, the session key is established for communication nodes on the open network. In order to satisfy fine-grained access control for cloud storage, the two-party attribute-based key agreement protocol (TP-AB-KA) was proposed.
Jiguo Li   +4 more
openaire   +2 more sources

Comparing self‐reported race and genetic ancestry for identifying potential differentially methylated sites in endometrial cancer: insights from African ancestry proportions using machine learning models

open access: yesMolecular Oncology, EarlyView.
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley   +1 more source

Recent effective population size in Eastern European plain Russians correlates with the key historical events

open access: yesScientific Reports, 2020
Effective population size reflects the history of population growth, contraction, and structuring. When the effect of structuring is negligible, the inferred trajectory of the effective population size can be informative about the key events in the ...
Ural Yunusbaev   +3 more
doaj   +1 more source

Experimental quantum key distribution with finite-key security analysis for noisy channels

open access: yes, 2013
In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit.
Bacco, Davide   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy