Results 41 to 50 of about 1,278,074 (287)

Toward 6G: Latency-Optimized MEC Systems with UAV and RIS Integration

open access: yesMathematics
Multi-access edge computing (MEC) has emerged as a cornerstone technology for deploying 6G network services, offering efficient computation and ultra-low-latency communication.
Abdullah Alshahrani
doaj   +1 more source

Alveolar Soft Part Sarcoma in Pediatric and Young Adult Patients: A Report From the Children's Oncology Group Study ARST0332

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Alveolar soft part sarcoma (ASPS) is a rare soft tissue sarcoma occurring most commonly in adolescence and young adulthood. Methods We present the clinical characteristics, treatments, and outcomes of patients with newly diagnosed ASPS enrolled on the Children's Oncology Group study ARST0332.
Jacquelyn N. Crane   +11 more
wiley   +1 more source

Test bed for Network Protocols Optimization

open access: yesTelfor Journal, 2019
This paper describes a test platform for verifying the functionality of network protocols as well as optimizing their parameters. The test bed is made by using combined OPNET simulator and MATLAB development environment. This test platform connects OPNET
A. Ceco, S. Mrdovic
doaj   +1 more source

Network Extractor Protocols [PDF]

open access: yes2008 49th Annual IEEE Symposium on Foundations of Computer Science, 2008
We design efficient protocols for processors to extract private randomness over a network with Byzantine faults, when each processor has access to an independent weakly-random n-bit source of sufficient min-entropy.We give several such network extractor protocols in both the information theoretic and computational settings.For a computationally ...
Yael Tauman Kalai   +3 more
openaire   +1 more source

Parent Quality of Life at Two Years Following Their Child's Completion of Acute Lymphoblastic Leukemia Treatment

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra   +3 more
wiley   +1 more source

Network-Layer Accountability Protocols: A Survey

open access: yesIEEE Access, 2018
Today’s Internet is vulnerable to numerous attacks, including source spoofing, distributed denial of service, prefix hijacking, and route forgery.
Lin He, Ying Liu, Gang Ren
doaj   +1 more source

Data security in smart devices: Advancement, constraints and future recommendations

open access: yesIET Networks, 2023
Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high‐tech devices has ...
Zhang Wenhua   +6 more
doaj   +1 more source

Toward an efficient solution for dynamic ad hoc network interoperability [PDF]

open access: yes, 2002
An ad hoc network is formed by an impromptu grouping of network capable nodes. The nodes forming the network have unconstrained mobility, and so provide a dynamic network topology.
Prince, Daniel   +2 more
core  

Incidence and Risk Factors of Serious Osteonecrosis in Pediatric Acute Lymphoblastic Leukemia: A CYP‐C Population‐Based Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Osteonecrosis (ON) is a debilitating complication of acute lymphoblastic leukemia (ALL) therapy. While numerous studies have explored its incidence and associated risk factors, investigations using large‐scale cohorts remain important to characterize ON across heterogeneous populations.
Noémie de Villiers   +5 more
wiley   +1 more source

Generating Payloads of Power Monitoring Systems Compliant with Power Network Protocols Using Generative Adversarial Networks

open access: yesEnergies
In the network environment of power systems, payload generation is used to construct data packets, which are used to obtain data for the security management of network assets.
Hao Zhang   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy