Results 141 to 150 of about 25,319 (281)
Abstract This paper conducts a comparative legal analysis of corporate restructuring frameworks in England and Bhutan, examining their capacity to integrate climate variability considerations and promote sustainable business practices. It discusses the procedural mechanisms for restructuring financially distressed enterprises available under the law of
Eugenio Vaccari, Migmar Lham
wiley +1 more source
ABSTRACT We use foreign trade data on both imports and exports of goods and services among a group of 15 advanced economies to determine the incomes and price elasticities of demand for exports and imports of goods, services and goods and services combined in the long run.
Tjeerd M. Boonman +2 more
wiley +1 more source
Resilient and verifiable outsourced attribute-based non-interactive oblivious transfer protocol for tactical edge networks. [PDF]
Liu W, Fu B, Wang L.
europepmc +1 more source
PP-DDP: a privacy-preserving outsourcing framework for solving the double digest problem. [PDF]
Suo J +5 more
europepmc +1 more source
The graphical abstract illustrates the molecular mechanism by which chondroitin sulfate (DCS) alleviates glucocorticoid‐induced myopathy through the gut–muscle axis. DCS selectively enriches L. johnsonii Z‐RW, enhancing bshA‐encoded BSH activity to promote bile acid deconjugation and reduce the sugar–bile acid ratio, thereby re‐establishing intestinal ...
Ruiyun Wu +7 more
wiley +1 more source
HyAR-PPO: Hybrid Action Representation Learning for Incentive-Driven Task Offloading in Vehicular Edge Computing. [PDF]
Wang W, Li M, Wu H.
europepmc +1 more source
ABSTRACT Purpose/Objectives Insufficient tooth reduction compromises crown longevity and aesthetics. This study aimed to determine whether digitally designed, 3D‐printed reduction guides improved crown preparation accuracy and efficiency for dental students compared to freehand preparation.
Xiaoyue Shi, Shuncong Xu, Chenxuan Wei
wiley +1 more source
To address the problem that existing secure outsourcing schemes for K-Means clustering incur high computational and communication overhead, making them difficult to satisfy the efficiency requirements of practical applications, a privacy-preserving K ...
Zhao Wei +5 more
doaj
KmerCrypt: private k-mer search with homomorphic encryption. [PDF]
Provatas K +2 more
europepmc +1 more source
Crowdsourcing Definitions and Its Features: An Academic Technical Report [PDF]
Hosseini, Mahmoud
core

