Results 51 to 60 of about 5,476,619 (222)

Crypto-Verifying Protocol Implementations in ML [PDF]

open access: yes, 2007
We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational ...
Bhargavan, K., Corin, R.J., Fournet, C.
core   +2 more sources

Distance Properties of Short LDPC Codes and their Impact on the BP, ML and Near-ML Decoding Performance

open access: yes, 2017
Parameters of LDPC codes, such as minimum distance, stopping distance, stopping redundancy, girth of the Tanner graph, and their influence on the frame error rate performance of the BP, ML and near-ML decoding over a BEC and an AWGN channel are studied ...
A Orlitsky   +19 more
core   +1 more source

Predicting Chronicity in Children and Adolescents With Newly Diagnosed Immune Thrombocytopenia at the Timepoint of Diagnosis Using Machine Learning‐Based Approaches

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objectives To identify predictors of chronic ITP (cITP) and to develop a model based on several machine learning (ML) methods to estimate the individual risk of chronicity at the timepoint of diagnosis. Methods We analyzed a longitudinal cohort of 944 children enrolled in the Intercontinental Cooperative immune thrombocytopenia (ITP) Study ...
Severin Kasser   +6 more
wiley   +1 more source

Pathogenic Germline PALB2 and RAD50 Variants in Patients With Relapsed Ewing Sarcoma

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Approximately 10% of patients with Ewing sarcoma (EwS) have pathogenic germline variants. Here, we report two cases: first, a novel germline pathogenic variant in partner and localizer of BRCA2 (PALB2) in a patient with a late EwS relapse. Its impact on homologous recombination is demonstrated, and breast cancer risk is discussed.
Molly Mack   +12 more
wiley   +1 more source

Mécanismes de social engineering (phishing): étude technique et économique [PDF]

open access: yes, 2016
Les escroqueries sur internet sont nombreuses et variées. Toute personne est susceptible d’être la cible d’une attaque lors d’une navigation sur le net. De plus en plus d’escrocs n’hésitent pas à recourir au Social Engineering comme levier pour acquérir ...
Billard, David, Deuss, Kelvin
core  

Improved Outcomes for Older Children, Adolescents, and Young Adults With Neuroblastoma in the Post‐Immunotherapy Era: An Updated Report From the International Neuroblastoma Risk Group

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background We describe clinical and biologic characteristics of neuroblastoma in older children, adolescents, and young adults (OCAYA); describe survival outcomes in the post‐immunotherapy era; and identify if there is an age cut‐off that best discriminates outcomes.
Rebecca J. Deyell   +14 more
wiley   +1 more source

IMPLEMENTATION OF DECISION TREE AND SUPPORT VECTOR MACHINE ON RAISIN SEED CLASSIFICATION

open access: yesAksioma: Jurnal Program Studi Pendidikan Matematika, 2023
In everyday life there are many complex and global problems, especially in terms of decision making. Machine learning (ML) which is built from the concepts of computer science statistics and mathematics can automatically solve problems without guidance ...
Wardhani Utami Dewi   +2 more
doaj   +1 more source

Patient‐Level Barriers and Facilitators to Inpatient Physical Therapy in Adolescents and Young Adults With a Hematological Malignancy: A Qualitative Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher   +8 more
wiley   +1 more source

ml-Codesmell

open access: yes, 2022
The ml-Codesmell dataset was created by analyzing source code and extracting massive source code metrics with many labelled code smells. This dataset has been used to train and predict code smell using machine learning algorithms.
Nguyen Thanh, Binh   +3 more
openaire   +1 more source

Fragments of ML Decidable by Nested Data Class Memory Automata

open access: yes, 2015
The call-by-value language RML may be viewed as a canonical restriction of Standard ML to ground-type references, augmented by a "bad variable" construct in the sense of Reynolds.
A.S. Murawski   +12 more
core   +1 more source

Home - About - Disclaimer - Privacy