Results 71 to 80 of about 133,625 (274)
Secrecy Through Synchronization Errors
In this paper, we propose a transmission scheme that achieves information theoretic security, without making assumptions on the eavesdropper's channel. This is achieved by a transmitter that deliberately introduces synchronization errors (insertions and ...
Castiglione, Jason, Kavcic, Aleksandar
core +1 more source
ABSTRACT Objective Super‐Refractory Status Epilepticus (SRSE) is a rare, life‐threatening neurological emergency with unclear etiology in many cases. Mitochondrial dysfunction, often due to disease‐causing genetic variants, is increasingly recognized as a cause, with each gene producing distinct pathophysiological mechanisms.
Pouria Mohammadi +2 more
wiley +1 more source
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and informed wire-tapper who receives a degraded version of the signal at the ...
Tekin, Ender, Yener, Aylin
core +3 more sources
ABSTRACT Objective To investigate the value of constructing models based on habitat radiomics and pathomics for predicting the risk of progression in high‐grade gliomas. Methods This study conducted a retrospective analysis of preoperative magnetic resonance (MR) images and pathological sections from 72 patients diagnosed with high‐grade gliomas (52 ...
Yuchen Zhu +14 more
wiley +1 more source
Robust Secure Authentication and Data Storage with Perfect Secrecy
We consider an authentication process that makes use of biometric data or the output of a physical unclonable function (PUF), respectively, from an information theoretical point of view.
Sebastian Baur, Holger Boche
doaj +1 more source
Broadcast Channels with Privacy Leakage Constraints
The broadcast channel (BC) with one common and two private messages with leakage constraints is studied, where leakage rate refers to the normalized mutual information between a message and a channel symbol string.
Goldfeld, Ziv +2 more
core +1 more source
Clustering Algorithm Reveals Dopamine‐Motor Mismatch in Cognitively Preserved Parkinson's Disease
ABSTRACT Objective To explore the relationship between dopaminergic denervation and motor impairment in two de novo Parkinson's disease (PD) cohorts. Methods n = 249 PD patients from Parkinson's Progression Markers Initiative (PPMI) and n = 84 from an external clinical cohort.
Rachele Malito +14 more
wiley +1 more source
Almost universal codes for fading wiretap channels
We consider a fading wiretap channel model where the transmitter has only statistical channel state information, and the legitimate receiver and eavesdropper have perfect channel state information.
Ling, Cong +2 more
core +4 more sources
Local Approximation of Secrecy Capacity
Submitted to EUSIPCO ...
Athanasakos, Emmanouil-Marios +2 more
openaire +3 more sources
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli +8 more
wiley +1 more source

