Results 41 to 50 of about 1,098,399 (202)
This special volume of Statistical Sciences presents some innovative, if not provocative, ideas in the area of reliability, or perhaps more appropriately named, integrated system assessment.
Anderson-Cook, Christine+2 more
core +1 more source
Trust in Crowds: probabilistic behaviour in anonymity protocols [PDF]
The existing analysis of the Crowds anonymity protocol assumes that a participating member is either ‘honest’ or ‘corrupted’. This paper generalises this analysis so that each member is assumed to maliciously disclose the identity of other nodes with a ...
A. Serjantov+18 more
core +1 more source
The authors conducted a retrospective study of 94 patients with advanced cancer who underwent next‐generation sequencing (NGS) gene panel analysis and received targeted treatments when applicable. Results further support evidence indicating that molecular profiling provides clinical benefit.
Michaël Dang+3 more
wiley +1 more source
Intrusion detection is a critical aspect of network security to protect computer systems from unauthorized access and attacks. The capacity of traditional intrusion detection systems (IDS) to identify unknown sophisticated threats is constrained by their
Md. Alamgir Hossain, Md. Saiful Islam
doaj
Can we imitate the principal investor's behavior to learn option price? [PDF]
This paper presents a framework of imitating the principal investor's behavior for optimal pricing and hedging options. We construct a non-deterministic Markov decision process for modeling stock price change driven by the principal investor's decision making.
arxiv
CD226+CD8+ T cells express elevated levels of RUNX2, exhibit higher proliferation capacity, cytokines and cytolytic molecules expression, and migratory capacity. In contrast, CD226−CD8+ T cells display an exhausted phenotype associated with the increased expression of co‐inhibitory receptors and impaired effector functions.
Maryam Rezaeifar+4 more
wiley +1 more source
SoK: Machine Learning Governance [PDF]
The application of machine learning (ML) in computer systems introduces not only many benefits but also risks to society. In this paper, we develop the concept of ML governance to balance such benefits and risks, with the aim of achieving responsible applications of ML. Our approach first systematizes research towards ascertaining ownership of data and
arxiv
Epithelial–mesenchymal transition (EMT) and tumor‐infiltrating lymphocytes (TILs) are associated with early breast cancer response to neoadjuvant chemotherapy (NAC). This study evaluated EMT and TIL shifts, with immunofluorescence and RNA sequencing, at diagnosis and in residual tumors as potential biomarkers associated with treatment response.
Françoise Derouane+16 more
wiley +1 more source
Deep Space Network information system architecture study [PDF]
The purpose of this article is to describe an architecture for the Deep Space Network (DSN) information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990s.
Atkinson, D. J.+9 more
core +1 more source
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi+2 more
wiley +1 more source