Results 101 to 110 of about 7,587 (272)
Privacy-Preserving Database Fingerprinting. [PDF]
Ji T, Ayday E, Yilmaz E, Li M, Li P.
europepmc +1 more source
Abstract Purpose Unicompartmental knee arthroplasty (UKA) offers benefits over total knee arthroplasty (TKA), but some studies indicated higher revision rates, often involving conversion to TKA. The infection risk associated with UKA to TKA conversion compared to primary TKA is not definitively established.
Maximilian Budin +7 more
wiley +1 more source
ABSTRACT The numerical approximation of nonlinear chaotic differential systems, such as the modified stretch‐twist‐fold (STF) flow and multi‐bond chaotic attractors, presents a significant challenge due to their sensitive dependence on initial conditions and complex dynamics where analytical solutions are unattainable.
Shina Daniel Oloniiju, Anastacia Dlamini
wiley +1 more source
Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data. [PDF]
Yuan Y, Zhang Z.
europepmc +1 more source
Judicial Discretion and Sentencing Behavior [PDF]
This research studies the impact of changes to federal judicial discretion on criminal sentencing outcomes. The Feeney Amendment to the 2003 PROTECT Act restricted federal judges’ ability to impose sentences outside of the U.S.
Freeborn, Beth, Hartmann, Monica
core +1 more source
Error Traps in Pediatric Neuromuscular Block
ABSTRACT Background Neuromuscular blocking agents are essential for safe pediatric anesthesia but remain a frequent source of preventable morbidity when misused, inadequately monitored, or incompletely reversed. Children, particularly neonates and infants, are especially vulnerable to residual neuromuscular block due to developmental pharmacological ...
Gabriel Soares de Sousa +5 more
wiley +1 more source
SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios. [PDF]
Li X, Yi Z, Li R, Wang XA, Li H, Yang X.
europepmc +1 more source
Strategies for Assessing Post‐Wildfire Geomorphic Resilience in Semiarid Rivers
ABSTRACT We review and summarize diverse components of a catchment that can be monitored after wildfire to assess the geomorphic resilience of the river corridor in semiarid regions. We distinguish upland portions of river catchments from river corridors.
Ellen Wohl +8 more
wiley +1 more source
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Based on provable data possession(PDP)model,a more perfect data integrity checking model for mobile cloud computing was proposed,in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block ...
Li YAN +5 more
doaj +2 more sources
Blockchain-Empowered Keyword Searchable Provable Data Possession for Large Similar Data
Provable Data Possession (PDP) is an alternative technique that guarantees the integrity of remote data. However, most current PDP schemes are inapplicable to similarity-like data checking with the same attribute, i.e., when there are numerous similar files to be checked by Data Owners (DOs).
Ying Miao +5 more
openaire +2 more sources

