Results 91 to 100 of about 5,059,786 (358)
TSEP: Threshold-sensitive Stable Election Protocol for WSNs [PDF]
Wireless Sensor Networks (WSNs) are expected to find wide applicability and increasing deployment in near future. In this paper, we propose a new protocol, Threshold Sensitive Stable Election Protocol (TSEP), which is reactive protocol using three levels of heterogeneity.
arxiv +1 more source
A comparative study of circulating tumor cell isolation and enumeration technologies in lung cancer
Lung cancer cells were spiked into donor blood to evaluate the recovery rates of the following circulating tumor cell (CTC) enrichment technologies: CellMag™, EasySep™, RosetteSep™, Parsortix® PR1, and Parsortix® Prototype systems. Each method's advantages and disadvantages are described.
Volga M Saini+11 more
wiley +1 more source
Objectives Primary Objective: To determine if pre-exposure prophylaxis (PrEP) with 400mg hydroxychloroquine (HCQ), taken orally once daily reduces microbiologically confirmed COVID-19 among front line health care workers at high risk for SARS-CoV-2 ...
Julie K. Wright+20 more
doaj +1 more source
Collusive Attacks to "Circle-Type" Multi-party Quantum Key Agreement Protocols [PDF]
We find that existing multi-party quantum key agreement (MQKA) protocols designed for fairness of the key are, in fact, unfair. Our analysis shows that these protocols are sensitive to collusive attacks; that is, dishonest participants can collaborate to predetermine the key without being detected.
arxiv
Orthogonal-state-based protocols of quantum key agreement [PDF]
Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA
arxiv +1 more source
The QUIC Transport Protocol: Design and Internet-Scale Deployment
We present our experience with QUIC, an encrypted, multiplexed, and low-latency transport protocol designed from the ground up to improve transport performance for HTTPS traffic and to enable rapid deployment and continued evolution of transport ...
Adam Langley+20 more
semanticscholar +1 more source
Cell‐free and extracellular vesicle microRNAs with clinical utility for solid tumors
Cell‐free microRNAs (cfmiRs) are small‐RNA circulating molecules detectable in almost all body biofluids. Innovative technologies have improved the application of cfmiRs to oncology, with a focus on clinical needs for different solid tumors, but with emphasis on diagnosis, prognosis, cancer recurrence, as well as treatment monitoring.
Yoshinori Hayashi+6 more
wiley +1 more source
Summary cache: a scalable wide-area web cache sharing protocol
The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Nevertheless it is not widely deployed due to the overhead of existing protocols.
Li Fan, P. Cao, J. Almeida, A. Broder
semanticscholar +1 more source
This study demonstrates that KRAS and GNAS mutations are more prevalent in patients with resected intraductal papillary mucinous neoplasms (IPMN) compared to those under clinical surveillance. GNAS mutations significantly differ between the two patient cohorts, indicating that their absence may serve as a potential biomarker to support conservative ...
Christine Nitschke+12 more
wiley +1 more source
Timed Analysis of Security Protocols [PDF]
We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols using UPPAAL.
arxiv