Results 71 to 80 of about 1,743,904 (288)
Lessons Learned From a Delayed‐Start Trial of Modafinil for Freezing of Gait in Parkinson's Disease
ABSTRACT Objective Freezing of gait (FOG) in people with Parkinson's disease (PwPD) is debilitating and has limited treatments. Modafinil modulates beta/gamma band activity in the pedunculopontine nucleus (PPN), like PPN deep brain stimulation. We therefore tested the hypothesis that Modafinil would improve FOG in PwPD.
Tuhin Virmani +8 more
wiley +1 more source
A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE
The dual attack is one of the most efficient attack algorithms for learning with errors (LWE) problem. Recently, an efficient variant of the dual attack for sparse and small secret LWE was reported by Albrecht (Eurocrypt 2017), which forces some LWE ...
Jung Hee Cheon +3 more
doaj +1 more source
ABSTRACT Objective Accurate localization of epileptogenic tubers (ETs) in patients with tuberous sclerosis complex (TSC) is essential but challenging, as these tubers lack distinct pathological or genetic markers to differentiate them from other cortical tubers.
Tinghong Liu +11 more
wiley +1 more source
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure key storage is expensive, novel solutions have been developed based on the idea of deriving the key from noisy ...
Christopher Huth +4 more
doaj +1 more source
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick +14 more
wiley +1 more source
Smooth Hash Proof System Based on the Learning With Errors Problem With Multi-Bit Key Output
Since hash proof system (HPS) can be utilized to build versatilely cryptographic schemes, the study on realizing this cryptographic primitive has been a very active research area. With the increasing concerns on the huge progress in quantum computing, it
Momeng Liu +3 more
doaj +1 more source
A Convex Formulation for Mixed Regression with Two Components: Minimax Optimal Rates [PDF]
We consider the mixed regression problem with two components, under adversarial and stochastic noise. We give a convex optimization formulation that provably recovers the true solution, and provide upper bounds on the recovery errors for both arbitrary ...
Caramanis, Constantine +2 more
core
ABSTRACT Objective Glioma recurrence severely impacts patient prognosis, with current treatments showing limited efficacy. Traditional methods struggle to analyze recurrence mechanisms due to challenges in assessing tumor heterogeneity, spatial dynamics, and gene networks.
Lei Qiu +10 more
wiley +1 more source
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
In this work, we consider the ring- and module- variants of the LWE problem and investigate cold boot attacks on cryptographic schemes based on these problems, wherein an attacker is faced with the problem of recovering a scheme’s secret key from a noisy
Martin R. Albrecht +2 more
doaj +1 more source
Dynamical and Stationary Properties of On-line Learning from Finite Training Sets
The dynamical and stationary properties of on-line learning from finite training sets are analysed using the cavity method. For large input dimensions, we derive equations for the macroscopic parameters, namely, the student-teacher correlation, the ...
A.C.C. Coolen +19 more
core +1 more source

