Results 51 to 60 of about 1,240,487 (287)

Engineering Osteoimmune Responses with Functionalized Orthopedic Implants for Post‐Operative Osteosarcoma Treatment

open access: yesAdvanced Science, EarlyView.
Osteosarcoma is the most common primary bone tumor with limited treatment options and a terrible prognosis. This review provides a comprehensive summary of the recent development of osteoimmunomodulatory implants for post‐operative osteosarcoma treatment, of which the potential utility in evoking durable anti‐osteosarcoma immunity and accelerating bone
Yilong Dong   +6 more
wiley   +1 more source

Harpocrate au secret. De quelques anamorphoses d’Horus l’Enfant

open access: yesPallas, 2018
In 1755, the Marquise de Pompadour commissioned a marble statue of Eros-Harpocrates withthe right index finger resting on its lips, to decorate the hôtel d’Évreux, the future Palais de l’Élysée. This gesture of the little Horus, which in Egypt was simply
Laurent Bricault
doaj   +1 more source

Du rat-toto fils du porc-épic, de la panthère et de la nandinie

open access: yesRevue d'ethnoécologie, 2020
The origin of the most beautiful and most complete expression of the Guro art, that of the Zamble mask and its masquerade, combine poetry of tales and precision of encyclopedic knowledge.Taking at its words the animal nicknames given by the Guro of ...
Claudie Haxaire
doaj   +1 more source

J’accepte: Jacques Derrida’s Cryptic Love by Unsealed Writing [PDF]

open access: yesAvant, 2017
This article focuses on the autobiographical ghost that dwells in “Envois” and the multiple ways he/she/it interferes in Derrida’s concept of écriture. Read through love letters sent as postcards with the image representing Socrates writing in front of ...
Michał Krzykawski
doaj   +1 more source

On alternative approach for verifiable secret sharing [PDF]

open access: yes, 2002
Secret sharing allows split/distributed control over the secret (e.g. master key). Verifiable secret sharing (VSS) is the secret sharing extended by verification capacity. Usually verification comes at the price.
Kotulski, Zbigniew   +2 more
core   +2 more sources

Efficient sharing of a continuous-variable quantum secret

open access: yes, 2003
We propose an efficient scheme for sharing a continuous variable quantum secret using passive optical interferometry and squeezers: this efficiency is achieved by showing that a maximum of two squeezers is required to replicate the secret state, and we ...
Rowe, David J.   +2 more
core   +1 more source

A Perspective on Interactive Theorem Provers in Physics

open access: yesAdvanced Science, EarlyView.
Into an interactive theorem provers (ITPs), one can write mathematical definitions, theorems and proofs, and the correctness of those results is automatically checked. This perspective goes over the best usage of ITPs within physics and motivates the open‐source community run project PhysLean, the aim of which is to be a library for digitalized physics
Joseph Tooby‐Smith
wiley   +1 more source

Métrica y secreto en Lope de Vega: el endecasílabo encadenado en la Parte XI (El amigo hasta la muerte y El mayordomo de la duquesa de Amalfi)

open access: yesCriticón, 2014
Lope de Vega used the (blank endecasyllables with internal rhyme) in 16 of his plays, two of which can be found in the Parte XI of his comedias (1618). This article reviews the existing information on this metrical form and analyzes how Lope used it in ...
Antonio Sánchez Jiménez
doaj   +1 more source

Study of Free‐Space Optical Quantum Network: Review and Prospectives

open access: yesAdvanced Science, EarlyView.
Free from the constraints of fiber connections, free‐space quantum network enables longer and more flexible quantum network connections. This review summarizes and comparatively analyzes free‐space quantum network experiments based on ground stations, satellites, and mobile platforms.
Hua‐Ying Liu, Zhenda Xie, Shining Zhu
wiley   +1 more source

How to share a quantum secret

open access: yes, 1999
We investigate the concept of quantum secret sharing. In a ((k,n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k-1 or fewer shares contains ...
A. Karlsson   +23 more
core   +1 more source

Home - About - Disclaimer - Privacy