Results 71 to 80 of about 25,319 (281)

Association of HAMP Expression and CD8+ T‐Cell Infiltration With Atezolizumab–Bevacizumab Response in Hepatocellular Carcinoma

open access: yesAnnals of Gastroenterological Surgery, EarlyView.
In hepatocellular carcinoma treated with atezolizumab–bevacizumab, responders showed RNA‐seq enrichment of immune and chemokine pathways with higher HAMP expression. In resected specimens, immunohistochemistry confirmed increased intratumoral CD8+ T‐cell density and hepcidin (HAMP), supporting HAMP plus CD8 as components of a composite predictor of ...
Shun Nakamura   +9 more
wiley   +1 more source

Cloud outsourcing secret sharing scheme against covert adversaries

open access: yesTongxin xuebao, 2017
In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of ...
En ZHANG   +5 more
doaj   +2 more sources

AI in chemical engineering: From promise to practice

open access: yesAIChE Journal, EarlyView.
Abstract Artificial intelligence (AI) in chemical engineering has moved from promise to practice: physics‐aware (gray‐box) models are gaining traction, reinforcement learning complements model predictive control (MPC), and generative AI powers documentation, digitization, and safety workflows.
Jia Wei Chew   +4 more
wiley   +1 more source

LLM‐Based Scientific Assistants for Knowledge Extraction: Which Design Choices Matter?

open access: yesAdvanced Intelligent Discovery, EarlyView.
A comprehensive framework for optimizing Large Language Models in domain‐specific applications is introduced. The LLM Playground integrates Prompt Engineering, knowledge augmentation, and advanced reasoning strategies to enable systematic comparison of architectures and base models.
David Exler   +7 more
wiley   +1 more source

Delegation of computation with verification outsourcing

open access: yesProceedings of the 2013 ACM symposium on Principles of distributed computing, 2013
In the Cloud Computing paradigm, a user often reduces financial, personnel, and computational burdens by outsourcing computation and other IT services to a professional service provider. However, to be able to assure the correctness of the result, the user still needs to perform the verification himself.
Gang Xu, George T. Amariucai, Yong Guan
openaire   +1 more source

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

Verifiable outsourced computation over encrypted data [PDF]

open access: yesInformation Sciences, 2019
Abstract In recent years, cloud computing has become the most popular and promising service platform. A cloud user can outsource its heavy computation overhead to a cloud service provider (CSP) and let the CSP make the computation instead. In order to guarantee the correctness of the outsourced processing (e.g., machine learning and data ...
Yu, Xixun, Yan, Zheng, Zhang, Rui
openaire   +2 more sources

Material‐Based Intelligence: Autonomous Adaptation and Embodied Computation in Physical Substrates

open access: yesAdvanced Intelligent Systems, EarlyView.
This perspective formulates a unifying framework for Material‐Based Intelligence (MBI), defining the physical requirements for materials to achieve embodied action, active memory and embodied information processing through intrinsic nonequilibrium dynamics. The design of intelligent materials often draws parallels with the complex adaptive behaviors of
Vladimir A. Baulin   +4 more
wiley   +1 more source

Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records

open access: yesIEEE Access, 2018
Personal health record (PHR) is a patient-centric model of health information exchange, which greatly facilitates the storage, access, and share of personal health information. In order to share the valuable resources and reduce the operational cost, the
Fuhu Deng   +5 more
doaj   +1 more source

Recomendation systems and crowdsourcing: a good wedding for enabling innovation? Results from technology affordances and costraints theory [PDF]

open access: yes, 2016
Recommendation Systems have come a long way since their first appearance in the e-commerce platforms.Since then, evolved Recommendation Systems have been successfully integrated in social networks. Now its time to test their usability and replicate their
BELLINI, Francesco, Nuhu, Kejda
core  

Home - About - Disclaimer - Privacy