Results 61 to 70 of about 5,769,734 (343)
Memory cost of quantum protocols
In this paper we consider the problem of minimizing the ancillary systems required to realize an arbitrary strategy of a quantum protocol, with the assistance of classical memory.
Bisio, Alessandro +3 more
core +1 more source
ABSTRACT Chemotherapy‐induced peripheral neuropathy remains a major complication in pediatric cancer, with disrupted somatosensory and nociceptive processing being a key aspect. This review synthesizes empirical studies on alterations in somatosensory and nociceptive processing in children and adolescents with cancer.
Julia Schweiger +4 more
wiley +1 more source
Internet of Things: Architectures, Protocols, and Applications
The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose.
Pallavi Sethi, S. Sarangi
semanticscholar +1 more source
Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking [PDF]
The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking
Boyd, Colin +2 more
core +2 more sources
ABSTRACT Primary lung carcinomas and bronchial carcinoid tumors (BC) are very rare malignancies in childhood. While typical BC and mucoepidermoid carcinomas are mostly low‐grade, localized tumors with a more favorable prognosis than in adults, necessitating avoidance of overtreatment, adenocarcinomas of the lung are often diagnosed at advanced disease ...
Michael Abele +19 more
wiley +1 more source
Blind Interactive Learning of Modulation Schemes: Multi-Agent Cooperation Without Co-Design
We examine the problem of learning to cooperate in the context of wireless communication. In our setting, two agents must learn modulation schemes that enable them to communicate across a power-constrained additive white Gaussian noise channel.
Anant Sahai +4 more
doaj +1 more source
Formal Analysis of V2X Revocation Protocols [PDF]
Research on vehicular networking (V2X) security has produced a range of security mechanisms and protocols tailored for this domain, addressing both security and privacy.
C Cremers +10 more
core +2 more sources
Results of the Childhood Cancer and Leukaemia Group's United Kingdom Relapsed Wilms Tumour Trial
ABSTRACT Background The United Kingdom relapsed Wilms tumour (UKW‐R) trial aimed to improve the historically low survival rates after relapse of Wilms tumour (WT) through a prospective national risk‐stratified protocol. The trial also evaluated efficacy and toxicity of high‐dose melphalan.
Sucheta J. Vaidya +10 more
wiley +1 more source
Blockchain Protocols and Edge Computing Targeting Industry 5.0 Needs
“Industry 5.0” is the latest industrial revolution. A variety of cutting-edge technologies, including artificial intelligence, the Internet of Things (IoT), and others, come together to form it.
Miguel Oliveira +4 more
doaj +1 more source
Designing Network Protocols for Good Equilibria [PDF]
Designing and deploying a network protocol determines the rules by which end users interact with each other and with the network. We consider the problem of designing a protocol to optimize the equilibrium behavior of a network with selfish users.
Chen, Ho-Lin +2 more
core +1 more source

