Results 41 to 50 of about 1,734,839 (338)

Quantum Identity-Based Encryption from the Learning with Errors Problem

open access: yesCryptography, 2022
To prevent eavesdropping and tampering, network security protocols take advantage of asymmetric ciphers to establish session-specific shared keys with which further communication is encrypted using symmetric ciphers.
Wenhua Gao   +3 more
doaj   +1 more source

Psychological Safety Among Interprofessional Pediatric Oncology Teams in Germany: A Nationwide Survey

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn   +4 more
wiley   +1 more source

Active Learning with Expected Error Reduction

open access: yes, 2022
Active learning has been studied extensively as a method for efficient data collection. Among the many approaches in literature, Expected Error Reduction (EER) (Roy and McCallum) has been shown to be an effective method for active learning: select the candidate sample that, in expectation, maximally decreases the error on an unlabeled set. However, EER
Mussmann, Stephen   +5 more
openaire   +2 more sources

Performance Dynamics and Termination Errors in Reinforcement Learning: A Unifying Perspective

open access: yes, 2019
In reinforcement learning, a decision needs to be made at some point as to whether it is worthwhile to carry on with the learning process or to terminate it.
Kuang, Nikki Lijing   +1 more
core   +1 more source

Hardware-efficient on-line learning through pipelined truncated-error backpropagation in binary-state networks [PDF]

open access: yes, 2017
Artificial neural networks (ANNs) trained using backpropagation are powerful learning architectures that have achieved state-of-the-art performance in various benchmarks.
Cauwenberghs, Gert   +3 more
core   +2 more sources

Predicting the Future Burden of Renal Replacement Therapy in Türkiye Using National Registry Data and Comparative Modeling Approaches

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Background Chronic kidney disease is a growing public health problem worldwide, and the number of patients requiring renal replacement therapy is steadily increasing. Türkiye has experienced a similar rise in both the incidence and prevalence of renal replacement therapy over the past decades; however, national‐level projections of future ...
Arzu Akgül   +2 more
wiley   +1 more source

OBOE: Collaborative Filtering for AutoML Model Selection

open access: yes, 2019
Algorithm selection and hyperparameter tuning remain two of the most challenging tasks in machine learning. Automated machine learning (AutoML) seeks to automate these tasks to enable widespread use of machine learning by non-experts.
Akimoto, Yuji   +3 more
core   +1 more source

Rule learning enhances structural plasticity of long-range axons in frontal cortex. [PDF]

open access: yes, 2016
Rules encompass cue-action-outcome associations used to guide decisions and strategies in a specific context. Subregions of the frontal cortex including the orbitofrontal cortex (OFC) and dorsomedial prefrontal cortex (dmPFC) are implicated in rule ...
Johnson, Carolyn   +3 more
core   +3 more sources

Liquid biopsy epigenetics: establishing a molecular profile based on cell‐free DNA

open access: yesMolecular Oncology, EarlyView.
Cell‐free DNA (cfDNA) fragments in plasma from cancer patients carry epigenetic signatures reflecting their cells of origin. These epigenetic features include DNA methylation, nucleosome modifications, and variations in fragmentation. This review describes the biological properties of each feature and explores optimal strategies for harnessing cfDNA ...
Christoffer Trier Maansson   +2 more
wiley   +1 more source

A Compact Multi-Identity Fully Homomorphic Encryption Scheme Without Fresh Ciphertexts

open access: yesApplied Sciences
The lattice-based multi-identity fully homomorphic encryption scheme combines the quantum security of lattice cryptography with the advantage of identity-based encryption.
Ziwei Wang, Ruwei Huang, Xiyi Wei
doaj   +1 more source

Home - About - Disclaimer - Privacy