Results 51 to 60 of about 4,198,145 (291)

Security of the Suffix Keyed Sponge

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We formalize and analyze the general suffix keyed sponge construction, a pseudorandom function built on top of a cryptographic permutation. The construction hashes its data using the (keyless) sponge construction, transforms part of the state using the ...
Christoph Dobraunig, Bart Mennink
doaj   +1 more source

The Application of the Burden of Proof Concept in Indonesia: A Comparative Study

open access: yesSASI, 2022
Introduction: One of the reasons for a reverse proof system is the difficulty of proving the offenses committed by certain perpetrators of a criminal offense, such as corruption and money laundering.
Abdullah Abdullah, Muhammad Hatta
doaj   +1 more source

Machine-Proof Your Career [PDF]

open access: yes, 2017
The Jetsons imagined a futuristic world where a typical work week was a single hour, two days a week. Technology took care of the rest for George Jetson and his co-workers – representing the great hope that technology would make human lives easier.
Hampton, Michael
core   +1 more source

Proof of Church's Thesis

open access: yes, 2019
We prove that if our calculating capability is that of a universal Turing machine with a finite tape, then Church's thesis is true.
Casares, Ramón
core   +1 more source

Keratin 19 as a prognostic marker and contributing factor of metastasis and chemoresistance in high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Keratin 19 (KRT19) is overexpressed in high‐grade serous ovarian cancer with high levels of Kallikrein‐related peptidases (KLK) 4–7 and is associated with poor survival. In vivo analyses demonstrate that elevated KRT19 increases peritoneal tumour burden.
Sophia Bielesch   +13 more
wiley   +1 more source

Mill's Proof

open access: yesPhilosophy, 2002
This paper constitutes a suggested route through the well-trodden minefield that is Mill's proof of Utilitarianism. A deductive course—tramping gamely straight across from an egoistic psychological hedonism to a disinterested ethical hedonism—would seemingly be the most hazardous route across the terrain.
openaire   +1 more source

Strategic judgment proofing [PDF]

open access: yesThe RAND Journal of Economics, 2008
A liquidity‐constrained entrepreneur raises capital to finance a business activity that may harm bystanders. The entrepreneur raises senior (secured) debt to shield assets from the tort victims in bankruptcy. For a fixed level of borrowing, senior debt creates better incentives for precaution taking than either junior debt or outside equity.
Che, Yeon-Koo, Spier, Kathryn E.
openaire   +7 more sources

Establishment of a humanized patient‐derived xenograft mouse model of high‐grade serous ovarian cancer for preclinical evaluation of combination immunotherapy

open access: yesMolecular Oncology, EarlyView.
We have established a humanized orthotopic patient‐derived xenograft (Hu‐oPDX) mouse model of high‐grade serous ovarian cancer (HGSOC) that recapitulates human tumor–immune interactions. Using combined anti‐PD‐L1/anti‐CD73 immunotherapy, we demonstrate the model's improved biological relevance and enhanced translational value for preclinical ...
Luka Tandaric   +10 more
wiley   +1 more source

Access to Justice as Illustrated by the Institute of Small Claims: an Assessment of the Procedural Law Reform in Ukraine [PDF]

open access: yesAccess to Justice in Eastern Europe, 2019
On 15-16 October 1999, a meeting of the European Council, whose influence on the development of civil process in the EU cannot be overestimated, took place in Tampere.
Panych Nazar
doaj   +1 more source

Parameterized Proof Complexity [PDF]

open access: yescomputational complexity, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dantchev, S., Martin, B., Szeider, S.
openaire   +2 more sources

Home - About - Disclaimer - Privacy