Results 91 to 100 of about 5,059,786 (358)

TSEP: Threshold-sensitive Stable Election Protocol for WSNs [PDF]

open access: yes, 2012
Wireless Sensor Networks (WSNs) are expected to find wide applicability and increasing deployment in near future. In this paper, we propose a new protocol, Threshold Sensitive Stable Election Protocol (TSEP), which is reactive protocol using three levels of heterogeneity.
arxiv   +1 more source

A comparative study of circulating tumor cell isolation and enumeration technologies in lung cancer

open access: yesMolecular Oncology, EarlyView.
Lung cancer cells were spiked into donor blood to evaluate the recovery rates of the following circulating tumor cell (CTC) enrichment technologies: CellMag™, EasySep™, RosetteSep™, Parsortix® PR1, and Parsortix® Prototype systems. Each method's advantages and disadvantages are described.
Volga M Saini   +11 more
wiley   +1 more source

Protecting Frontline Health Care Workers from COVID-19 with Hydroxychloroquine Pre-exposure Prophylaxis: A structured summary of a study protocol for a randomised placebo-controlled multisite trial in Toronto, Canada

open access: yesTrials, 2020
Objectives Primary Objective: To determine if pre-exposure prophylaxis (PrEP) with 400mg hydroxychloroquine (HCQ), taken orally once daily reduces microbiologically confirmed COVID-19 among front line health care workers at high risk for SARS-CoV-2 ...
Julie K. Wright   +20 more
doaj   +1 more source

Collusive Attacks to "Circle-Type" Multi-party Quantum Key Agreement Protocols [PDF]

open access: yesarXiv, 2016
We find that existing multi-party quantum key agreement (MQKA) protocols designed for fairness of the key are, in fact, unfair. Our analysis shows that these protocols are sensitive to collusive attacks; that is, dishonest participants can collaborate to predetermine the key without being detected.
arxiv  

Orthogonal-state-based protocols of quantum key agreement [PDF]

open access: yes, 2013
Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA
arxiv   +1 more source

The QUIC Transport Protocol: Design and Internet-Scale Deployment

open access: yesConference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 2017
We present our experience with QUIC, an encrypted, multiplexed, and low-latency transport protocol designed from the ground up to improve transport performance for HTTPS traffic and to enable rapid deployment and continued evolution of transport ...
Adam Langley   +20 more
semanticscholar   +1 more source

Cell‐free and extracellular vesicle microRNAs with clinical utility for solid tumors

open access: yesMolecular Oncology, EarlyView.
Cell‐free microRNAs (cfmiRs) are small‐RNA circulating molecules detectable in almost all body biofluids. Innovative technologies have improved the application of cfmiRs to oncology, with a focus on clinical needs for different solid tumors, but with emphasis on diagnosis, prognosis, cancer recurrence, as well as treatment monitoring.
Yoshinori Hayashi   +6 more
wiley   +1 more source

Summary cache: a scalable wide-area web cache sharing protocol

open access: yesTNET, 2000
The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Nevertheless it is not widely deployed due to the overhead of existing protocols.
Li Fan, P. Cao, J. Almeida, A. Broder
semanticscholar   +1 more source

KRAS and GNAS mutations in cell‐free DNA and in circulating epithelial cells in patients with intraductal papillary mucinous neoplasms—an observational pilot study

open access: yesMolecular Oncology, EarlyView.
This study demonstrates that KRAS and GNAS mutations are more prevalent in patients with resected intraductal papillary mucinous neoplasms (IPMN) compared to those under clinical surveillance. GNAS mutations significantly differ between the two patient cohorts, indicating that their absence may serve as a potential biomarker to support conservative ...
Christine Nitschke   +12 more
wiley   +1 more source

Timed Analysis of Security Protocols [PDF]

open access: yesarXiv, 2005
We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols using UPPAAL.
arxiv  

Home - About - Disclaimer - Privacy