Results 51 to 60 of about 5,476,619 (222)
Crypto-Verifying Protocol Implementations in ML [PDF]
We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational ...
Bhargavan, K., Corin, R.J., Fournet, C.
core +2 more sources
Parameters of LDPC codes, such as minimum distance, stopping distance, stopping redundancy, girth of the Tanner graph, and their influence on the frame error rate performance of the BP, ML and near-ML decoding over a BEC and an AWGN channel are studied ...
A Orlitsky +19 more
core +1 more source
ABSTRACT Objectives To identify predictors of chronic ITP (cITP) and to develop a model based on several machine learning (ML) methods to estimate the individual risk of chronicity at the timepoint of diagnosis. Methods We analyzed a longitudinal cohort of 944 children enrolled in the Intercontinental Cooperative immune thrombocytopenia (ITP) Study ...
Severin Kasser +6 more
wiley +1 more source
Pathogenic Germline PALB2 and RAD50 Variants in Patients With Relapsed Ewing Sarcoma
ABSTRACT Approximately 10% of patients with Ewing sarcoma (EwS) have pathogenic germline variants. Here, we report two cases: first, a novel germline pathogenic variant in partner and localizer of BRCA2 (PALB2) in a patient with a late EwS relapse. Its impact on homologous recombination is demonstrated, and breast cancer risk is discussed.
Molly Mack +12 more
wiley +1 more source
Mécanismes de social engineering (phishing): étude technique et économique [PDF]
Les escroqueries sur internet sont nombreuses et variées. Toute personne est susceptible d’être la cible d’une attaque lors d’une navigation sur le net. De plus en plus d’escrocs n’hésitent pas à recourir au Social Engineering comme levier pour acquérir ...
Billard, David, Deuss, Kelvin
core
ABSTRACT Background We describe clinical and biologic characteristics of neuroblastoma in older children, adolescents, and young adults (OCAYA); describe survival outcomes in the post‐immunotherapy era; and identify if there is an age cut‐off that best discriminates outcomes.
Rebecca J. Deyell +14 more
wiley +1 more source
IMPLEMENTATION OF DECISION TREE AND SUPPORT VECTOR MACHINE ON RAISIN SEED CLASSIFICATION
In everyday life there are many complex and global problems, especially in terms of decision making. Machine learning (ML) which is built from the concepts of computer science statistics and mathematics can automatically solve problems without guidance ...
Wardhani Utami Dewi +2 more
doaj +1 more source
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher +8 more
wiley +1 more source
The ml-Codesmell dataset was created by analyzing source code and extracting massive source code metrics with many labelled code smells. This dataset has been used to train and predict code smell using machine learning algorithms.
Nguyen Thanh, Binh +3 more
openaire +1 more source
Fragments of ML Decidable by Nested Data Class Memory Automata
The call-by-value language RML may be viewed as a canonical restriction of Standard ML to ground-type references, augmented by a "bad variable" construct in the sense of Reynolds.
A.S. Murawski +12 more
core +1 more source

