Results 61 to 70 of about 5,769,734 (343)

Memory cost of quantum protocols

open access: yes, 2011
In this paper we consider the problem of minimizing the ancillary systems required to realize an arbitrary strategy of a quantum protocol, with the assistance of classical memory.
Bisio, Alessandro   +3 more
core   +1 more source

Effects of Cancer Treatment on Somatosensory and Nociceptive Processing in Children and Adolescents: A Systematic Review

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Chemotherapy‐induced peripheral neuropathy remains a major complication in pediatric cancer, with disrupted somatosensory and nociceptive processing being a key aspect. This review synthesizes empirical studies on alterations in somatosensory and nociceptive processing in children and adolescents with cancer.
Julia Schweiger   +4 more
wiley   +1 more source

Internet of Things: Architectures, Protocols, and Applications

open access: yesJournal of Electrical and Computer Engineering, 2017
The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose.
Pallavi Sethi, S. Sarangi
semanticscholar   +1 more source

Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking [PDF]

open access: yes, 2012
The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking
Boyd, Colin   +2 more
core   +2 more sources

Carcinomas and Carcinoid Tumors of the Lungs and Bronchi in Children and Adolescents: The EXPeRT Recommendations

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Primary lung carcinomas and bronchial carcinoid tumors (BC) are very rare malignancies in childhood. While typical BC and mucoepidermoid carcinomas are mostly low‐grade, localized tumors with a more favorable prognosis than in adults, necessitating avoidance of overtreatment, adenocarcinomas of the lung are often diagnosed at advanced disease ...
Michael Abele   +19 more
wiley   +1 more source

Blind Interactive Learning of Modulation Schemes: Multi-Agent Cooperation Without Co-Design

open access: yesIEEE Access, 2020
We examine the problem of learning to cooperate in the context of wireless communication. In our setting, two agents must learn modulation schemes that enable them to communicate across a power-constrained additive white Gaussian noise channel.
Anant Sahai   +4 more
doaj   +1 more source

Formal Analysis of V2X Revocation Protocols [PDF]

open access: yes, 2017
Research on vehicular networking (V2X) security has produced a range of security mechanisms and protocols tailored for this domain, addressing both security and privacy.
C Cremers   +10 more
core   +2 more sources

Results of the Childhood Cancer and Leukaemia Group's United Kingdom Relapsed Wilms Tumour Trial

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The United Kingdom relapsed Wilms tumour (UKW‐R) trial aimed to improve the historically low survival rates after relapse of Wilms tumour (WT) through a prospective national risk‐stratified protocol. The trial also evaluated efficacy and toxicity of high‐dose melphalan.
Sucheta J. Vaidya   +10 more
wiley   +1 more source

Blockchain Protocols and Edge Computing Targeting Industry 5.0 Needs

open access: yesSensors, 2023
“Industry 5.0” is the latest industrial revolution. A variety of cutting-edge technologies, including artificial intelligence, the Internet of Things (IoT), and others, come together to form it.
Miguel Oliveira   +4 more
doaj   +1 more source

Designing Network Protocols for Good Equilibria [PDF]

open access: yes, 2010
Designing and deploying a network protocol determines the rules by which end users interact with each other and with the network. We consider the problem of designing a protocol to optimize the equilibrium behavior of a network with selfish users.
Chen, Ho-Lin   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy