Results 101 to 110 of about 551,720 (296)
Protocols for Learning Classifiers on Distributed Data [PDF]
We consider the problem of learning classifiers for labeled data that has been distributed across several nodes. Our goal is to find a single classifier, with small approximation error, across all datasets while minimizing the communication between nodes.
arxiv
NAD+ regeneration by mitochondrial complex I NADH dehydrogenase is important for cancer cell proliferation. Specifically, NAD+ is necessary for the activities of NAD+‐dependent deacetylases SIRT3 and SIRT7, which suppress the expression of p21Cip1 cyclin‐dependent kinase inhibitor, an antiproliferative molecule, at the translational and transcriptional
Masato Higurashi+5 more
wiley +1 more source
On the Use of Key Assignment Schemes in Authentication Protocols [PDF]
Key Assignment Schemes (KASs) have been extensively studied in the context of cryptographically-enforced access control, where derived keys are used to decrypt protected resources. In this paper, we explore the use of KASs in entity authentication protocols, where we use derived keys to encrypt challenges.
arxiv
Using mass cytometry, we analyzed serial blood samples from patients with relapsed epithelial ovarian cancer (EOC) treated with oleclumab–durvalumab combination immunotherapy in the NSGO‐OV‐UMB1/ENGOT‐OV30 trial. Our analysis identified potential predictive, monitoring, and response biomarkers detectable through liquid biopsy. These findings facilitate
Luka Tandaric+11 more
wiley +1 more source
Background Obesity and its associated health complications have become a global public health concern, necessitating innovative approaches to weight management.
Monica Dinu+9 more
doaj +1 more source
In molecular cancer diagnostics, comprehensive genomic profiling (CGP) is going to replace the small NGS panels since it provides all clinically relevant somatic variants as well as genomic biomarkers with clinical value. Here, we compared two CGP assays and demonstrate that the choice for diagnostic implementation will depend on the specific ...
Guy Froyen+17 more
wiley +1 more source
Information Dissemination in Unknown Radio networks with Large Labels [PDF]
We consider the problems of deterministic broadcasting and gossiping in completely unknown ad-hoc radio networks. We assume that nothing is known to the nodes about the topology or even the size of the network, $n$, except that $n > 1$. Protocols for vanilla model, when $n$ is known, may be run for increasingly larger estimates $2^i$ on the size of the
arxiv
Epithelial–mesenchymal transition (EMT) and tumor‐infiltrating lymphocytes (TILs) are associated with early breast cancer response to neoadjuvant chemotherapy (NAC). This study evaluated EMT and TIL shifts, with immunofluorescence and RNA sequencing, at diagnosis and in residual tumors as potential biomarkers associated with treatment response.
Françoise Derouane+16 more
wiley +1 more source
Inferring Inductive Invariants from Phase Structures [PDF]
Infinite-state systems such as distributed protocols are challenging to verify using interactive theorem provers or automatic verification tools. Of these techniques, deductive verification is highly expressive but requires the user to annotate the system with inductive invariants.
arxiv
Molecular and functional profiling unravels targetable vulnerabilities in colorectal cancer
We used whole exome and RNA‐sequencing to profile divergent genomic and transcriptomic landscapes of microsatellite stable (MSS) and microsatellite instable (MSI) colorectal cancer. Alterations were classified using a computational score for integrative cancer variant annotation and prioritization.
Efstathios‐Iason Vlachavas+15 more
wiley +1 more source