Results 71 to 80 of about 133,625 (274)

Secrecy Through Synchronization Errors

open access: yes, 2015
In this paper, we propose a transmission scheme that achieves information theoretic security, without making assumptions on the eavesdropper's channel. This is achieved by a transmitter that deliberately introduces synchronization errors (insertions and ...
Castiglione, Jason, Kavcic, Aleksandar
core   +1 more source

Super‐Refractory Status Epilepticus (SRSE) in a Patient With Compound Heterozygous OPA1 Variants: Case Report and Literature Review

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Super‐Refractory Status Epilepticus (SRSE) is a rare, life‐threatening neurological emergency with unclear etiology in many cases. Mitochondrial dysfunction, often due to disease‐causing genetic variants, is increasingly recognized as a cause, with each gene producing distinct pathophysiological mechanisms.
Pouria Mohammadi   +2 more
wiley   +1 more source

The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints

open access: yes, 2006
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and informed wire-tapper who receives a degraded version of the signal at the ...
Tekin, Ender, Yener, Aylin
core   +3 more sources

Development of a Prediction Model for Progression Risk in High‐Grade Gliomas Based on Habitat Radiomics and Pathomics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To investigate the value of constructing models based on habitat radiomics and pathomics for predicting the risk of progression in high‐grade gliomas. Methods This study conducted a retrospective analysis of preoperative magnetic resonance (MR) images and pathological sections from 72 patients diagnosed with high‐grade gliomas (52 ...
Yuchen Zhu   +14 more
wiley   +1 more source

Robust Secure Authentication and Data Storage with Perfect Secrecy

open access: yesCryptography, 2018
We consider an authentication process that makes use of biometric data or the output of a physical unclonable function (PUF), respectively, from an information theoretical point of view.
Sebastian Baur, Holger Boche
doaj   +1 more source

Broadcast Channels with Privacy Leakage Constraints

open access: yes, 2017
The broadcast channel (BC) with one common and two private messages with leakage constraints is studied, where leakage rate refers to the normalized mutual information between a message and a channel symbol string.
Goldfeld, Ziv   +2 more
core   +1 more source

Clustering Algorithm Reveals Dopamine‐Motor Mismatch in Cognitively Preserved Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To explore the relationship between dopaminergic denervation and motor impairment in two de novo Parkinson's disease (PD) cohorts. Methods n = 249 PD patients from Parkinson's Progression Markers Initiative (PPMI) and n = 84 from an external clinical cohort.
Rachele Malito   +14 more
wiley   +1 more source

Almost universal codes for fading wiretap channels

open access: yes, 2016
We consider a fading wiretap channel model where the transmitter has only statistical channel state information, and the legitimate receiver and eavesdropper have perfect channel state information.
Ling, Cong   +2 more
core   +4 more sources

Local Approximation of Secrecy Capacity

open access: yes2024 32nd European Signal Processing Conference (EUSIPCO)
Submitted to EUSIPCO ...
Athanasakos, Emmanouil-Marios   +2 more
openaire   +3 more sources

Lived and Care Experiences of Chronic Musculoskeletal Shoulder Pain in Australian Adults: A Qualitative Study

open access: yesArthritis Care &Research, EarlyView.
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy