Results 51 to 60 of about 19,120,707 (376)
Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus +6 more
wiley +1 more source
Error Free Perfect Secrecy Systems
Shannon's fundamental bound for perfect secrecy says that the entropy of the secret message cannot be larger than the entropy of the secret key initially shared by the sender and the legitimate receiver. Massey gave an information theoretic proof of this
Chan, Terence H. +3 more
core +1 more source
Better features to track by estimating the tracking convergence region [PDF]
Reliably tracking key points and textured patches from frame to frame is the basic requirement for many bottomup computer vision algorithms. The problem of selecting the features that can be tracked well is addressed here.
Heijden, Ferdinand van der +1 more
core +4 more sources
Nanomaterials: size is the key
Nanomaterials deserve special attention since they constitute a kind of material that improves structural and functional properties compared to the bulk material. Nanomaterials have emerged as materials with at least one dimension in the range of 1 to 100 nm.
Ferreiro, A. +6 more
openaire +1 more source
ABSTRACT Background The Improving Population Outcomes for Renal Tumours of childhood (IMPORT) is a prospective clinical observational study capturing detailed demographic and outcome data on children and young people diagnosed with renal tumours in the United Kingdom and the Republic of Ireland.
Naomi Ssenyonga +56 more
wiley +1 more source
Secure and {\sl Practical} Identity-Based Encryption [PDF]
In this paper, we present a variant of Waters' Identity-Based Encryption scheme with a much smaller public-key size (only a few kilobytes). We show that this variant is semantically secure against passive adversaries in the standard model.\smallskip In
Naccache, David
core +1 more source
Seismic cycles, size of the largest events, and the avalanche size distribution in a model of seismicity [PDF]
We address several questions on the behavior of a numerical model recently introduced to study seismic phenomena, that includes relaxation in the plates as a key ingredient.
A. Rosso +4 more
core +2 more sources
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis +13 more
wiley +1 more source
Security of continuous-variable quantum key distribution against general attacks
We prove the security of Gaussian continuous-variable quantum key distribution against arbitrary attacks in the finite-size regime. The novelty of our proof is to consider symmetries of quantum key distribution in phase space in order to show that, to ...
Anthony Leverrier +5 more
core +3 more sources
Root system size and root hair length are key phenes for nitrate acquisition and biomass production across natural variation in Arabidopsis [PDF]
Jérôme De Pessemier +13 more
openalex +1 more source

