Results 71 to 80 of about 6,908 (279)
ABSTRACT Background There is a paucity of population‐based data on adherence and adverse drug events (ADEs) associated with the treatment of coronavirus disease 2019 (COVID‐19) with nirmatrelvir and ritonavir (NMV/r). We sought to contribute data on patient‐reported treatment adherence and ADEs with NMV/r using data collected by community pharmacists ...
Colin R. Dormuth+4 more
wiley +1 more source
Circuit Depth Relative to a Random Oracle
<p>The study of separation of complexity classes with respect to random oracles was initiated by Bennett and Gill and continued by many other authors.</p><p> </p><p>Wilson defined relativized circuit depth and constructed various oracles A for which</p><p> </p><p> </p><ul> <li> P^A
openaire +6 more sources
Abstract Introduction The 2021 Cures Act mandates caregiver access to their child′s medical notes with few exceptions, yet fewer than 10% access notes during hospitalization. Caregiver review of real‐time notes facilitates identification of safety concerns and may enhance patient safety in pediatric hospitals. This trial will evaluate the Bedside Notes
Casey O'Hare+14 more
wiley +1 more source
Random Oracles with(out) Programmability [PDF]
This paper investigates the Random Oracle Model (ROM) feature known as programmability, which allows security reductions in the ROM to dynamically choose the range points of an ideal hash function. This property is interesting for at least two reasons: first, because of its seeming artificiality (no standard model hash function is known to support such
Anja Lehmann+5 more
openaire +2 more sources
Knowledge Gradient Procedure to Select the Best System Under Pairwise Comparisons
ABSTRACT This article considers fixed‐budget ranking and selection (R&S) problems where the performance of alternative designs can only be assessed through pairwise comparisons, a setting encountered in many applications, including player ranking in games, sports tournaments, recommender systems, image‐based search, public choice models such as voting ...
Dongyang Li+4 more
wiley +1 more source
Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors
Fully homomorphic encryption (FHE) is a form of public-key encryption that allows the computation of arbitrary functions on encrypted data without decrypting the data. As a result, it is a useful tool with numerous applications.
Mingxiang Li
doaj +1 more source
On the Complexity of the Bilevel Shortest Path Problem
ABSTRACT We introduce a new bilevel version of the classic shortest path problem and completely characterize its computational complexity with respect to several problem variants. In our problem, the leader and the follower each control a subset of the edges of a graph and together aim at building a path between two given vertices, while each of the ...
Dorothee Henke, Lasse Wulf
wiley +1 more source
The variability in responses to environmental change between populations remains poorly quantified and understood. This shortcoming has major consequences, as variation and flexibility of life‐history traits between populations contribute to the estimation of the adaptive potential, which is necessary for predicting the responses of interconnected ...
Camille Schatz+5 more
wiley +1 more source
Secure and efficient lightweight user authentication protocol for mobile cloud computing becomes a paramount concern due to the data sharing using Internet among the end users and mobile devices.
Sandip Roy+5 more
doaj +1 more source
Stories of coexistence: A narrative inquiry of leopard attacks on people
Abstract Pursuing human–wildlife coexistence is particularly challenging for carnivore species as conflict can negatively impact human livelihood and well‐being. Understanding the social context of how communities perceive conflicts with carnivores, often witnessed in their folklore and stories, can shed light on pathways for fostering coexistence.
Shweta Shivakumar+3 more
wiley +1 more source