Results 41 to 50 of about 718,869 (314)
Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks [PDF]
We initiate the study of distributed protocols over directed anonymous networks that are not necessarily strongly connected. In such networks, nodes are aware only of their incoming and outgoing edges, have no unique identity, and have no knowledge of ...
Bruck, Jehoshua +2 more
core +4 more sources
Background Despite standard treatments including chemoradiotherapy with temozolomide (TMZ) (STUPP protocol), the prognosis of glioblastoma patients remains poor.
Emilie Thivat +10 more
doaj +1 more source
RIBAR and xRIBAR: methods for reproducible relative MS/MS-based label-free protein quantification [PDF]
Mass spectrometry-driven proteomics is increasingly relying on quantitative analyses for biological discoveries. As a result, different methods and algorithms have been developed to perform relative or absolute quantification based on mass spectrometry ...
Colaert, Niklaas +2 more
core +1 more source
Somatic Differentiation and MR Imaging of Magnetically Labeled Human Embryonic Stem Cells
Magnetic resonance (MR) imaging of superparamagnetic iron oxide (SPIO)-labeled stem cells offers a non-invasive evaluation of stem cell engraftment in host organs.
Hossein Nejadnik +10 more
doaj +1 more source
A multicontrast MR atlas of the Wistar rat brain
We describe a multi-contrast, multi-dimensional atlas of the Wistar rat acquired at microscopic spatial resolution using magnetic resonance histology (MRH). Diffusion weighted images, and associated scalar images were acquired of a single specimen with a
G. Allan Johnson +6 more
doaj +1 more source
The most dangerous attack against IPv6 networks today is a distributed denial‐of‐service (DDoS) attack using Internet Control Message Protocol version 6 (ICMPv6) messages. Many ICMPv6‐DDoS attack detection mechanisms rely on self‐created datasets because very few suitable ICMPv6‐DDoS attack datasets are publicly available due to privacy and security ...
Selvakumar Manickam +6 more
openaire +1 more source
Jarzynski's equality, fluctuation theorems, and variance reduction: Mathematical analysis and numerical algorithms [PDF]
In this paper, we study Jarzynski's equality and fluctuation theorems for diffusion processes. While some of the results considered in the current work are known in the (mainly physics) literature, we review and generalize these nonequilibrium theorems ...
Hartmann, Carsten +2 more
core +2 more sources
The T cell receptor (TCR) repertoire can provide a personalized biomarker for infectious and non-infectious diseases. We describe a protocol for amplifying, sequencing, and analyzing TCRs which is robust, sensitive, and versatile.
Theres Oakes +13 more
doaj +1 more source
Self-Learning Classifier for Internet traffic [PDF]
Network visibility is a critical part of traffic engineering, network management, and security. Recently, unsupervised algorithms have been envisioned as a viable alternative to automatically identify classes of traffic. However, the accuracy achieved so
Baralis, Elena Maria +3 more
core +1 more source
24 versus 48 Weeks of Peginterferon Plus Ribavirin in Hepatitis C Virus Genotype 6 Chronically Infected Patients with a Rapid Virological Response: A Non-Inferiority Randomized Controlled Trial. [PDF]
The optimal treatment of hepatitis C virus (HCV) genotype 6 is unclear owing to its limited geographic distribution. Because of a high predictive value of rapid virological response (RVR) for sustained virological response (SVR), we conducted an open ...
Qingxian Cai +21 more
doaj +1 more source

