Results 51 to 60 of about 1,289,066 (290)
Quantum linear network coding as one-way quantum computation [PDF]
Network coding is a technique to maximize communication rates within a network, in communication protocols for simultaneous multi-party transmission of information.
de Beaudrap, Niel, Roetteler, Martin
core +2 more sources
STABILITY IN ROUTING: NETWORKS AND PROTOCOLS [PDF]
Summary: We provide a state-of-the-art survey of results concerning stability issues for routing in communication networks, and corresponding protocols. Roughly speaking, a distributed routing protocol is stable on some particular network if the protocol maintains a bounded number of packets in the network at all times, under some suitable assumptions ...
openaire +2 more sources
ABSTRACT Background PIK3CA‐related overgrowth spectrum (PROS) includes several rare overgrowth disorders resulting from somatic gain‐of‐function mutations in PIK3CA. Despite treatment advances, including the recent approval of alpelisib for PROS in the United States, literature detailing the patient experience with PROS is limited.
Vamsi Bollu +8 more
wiley +1 more source
Network-Layer Accountability Protocols: A Survey
Today’s Internet is vulnerable to numerous attacks, including source spoofing, distributed denial of service, prefix hijacking, and route forgery.
Lin He, Ying Liu, Gang Ren
doaj +1 more source
Simple and Efficient Local Codes for Distributed Stable Network Construction [PDF]
In this work, we study protocols so that populations of distributed processes can construct networks. In order to highlight the basic principles of distributed network construction we keep the model minimal in all respects.
Michail, Othon, Spirakis, Paul G.
core +2 more sources
ABSTRACT Background Blinatumomab is a bispecific T‐cell engager approved for the treatment of pediatric B‐cell acute lymphoblastic leukemia (B‐ALL). Outpatient home infusion reduces hospitalization burden and optimizes resource utilization, but is logistically challenging.
Angela Parra del Riego +10 more
wiley +1 more source
In the network environment of power systems, payload generation is used to construct data packets, which are used to obtain data for the security management of network assets.
Hao Zhang +6 more
doaj +1 more source
Data security in smart devices: Advancement, constraints and future recommendations
Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high‐tech devices has ...
Zhang Wenhua +6 more
doaj +1 more source
Hybrid Scenario Based Performance Analysis of DSDV and DSR
The area of mobile ad hoc networking has received considerable attention of the research community in recent years. These networks have gained immense popularity primarily due to their infrastructure-less mode of operation which makes them a suitable ...
Majumder, Koushik, Sarkar, Subir Kumar
core +1 more source
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin +2 more
wiley +1 more source

