Results 41 to 50 of about 4,787 (231)

Secure Single-Server Nearly-Identical Image Deduplication [PDF]

open access: yes2020 29th International Conference on Computer Communications and Networks (ICCCN), 2020
Cloud computing is often utilized for file storage. Clients of cloud storage services want to ensure the privacy of their data, and both clients and servers want to use as little storage as possible. Cross-user deduplication is one method to reduce the amount of storage a server uses.
Takeshita, Jonathan   +2 more
openaire   +2 more sources

Revisiting Target‐Aware de novo Molecular Generation with TarPass: Between Rational Design and Texas Sharpshooter

open access: yesAdvanced Science, EarlyView.
TarPass provides a rigorous benchmark for target‐aware de novo molecular generation by jointly evaluating protein‐ligand interactions, molecular plausibility, and drug‐likeness on 18 well‐studied targets. Results show that current models often fail to consistently surpass random baseline in target‐specific enrichment, while post hoc multi‐tier virtual ...
Rui Qin   +11 more
wiley   +1 more source

Secure Encrypted Data With Authorized Deduplication in Cloud

open access: yesIEEE Access, 2019
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and ...
Jinbo Xiong   +4 more
doaj   +1 more source

Large Language Model in Materials Science: Roles, Challenges, and Strategic Outlook

open access: yesAdvanced Intelligent Discovery, EarlyView.
Large language models (LLMs) are reshaping materials science. Acting as Oracle, Surrogate, Quant, and Arbiter, they now extract knowledge, predict properties, gauge risk, and steer decisions within a traceable loop. Overcoming data heterogeneity, hallucinations, and poor interpretability demands domain‐adapted models, cross‐modal data standards, and ...
Jinglan Zhang   +4 more
wiley   +1 more source

Do drugs approved via expedited approval pathways have therapeutic advantages? A systematic review and meta‐analysis

open access: yesBritish Journal of Clinical Pharmacology, EarlyView.
Regulators use expedited approval pathways to speed market approval and patient access to promising new drugs. However, there is uncertainty about whether these pathways are successful in approving drugs with significant therapeutic advantages. This systematic review aims to examine the safety, effectiveness and cost‐effectiveness of drugs approved via
Ashleigh Hooimeyer   +4 more
wiley   +1 more source

A novel approach to data integrity auditing in PCS: Minimising any Trust on Third Parties (DIA-MTTP).

open access: yesPLoS ONE, 2021
Data Integrity Auditing (DIA) is a security service for verifying the integrity of outsourced data in Public Cloud Storage (PCS) by users or by Third-Party Auditors (TPAs) on behalf of the users. This paper proposes a novel DIA framework, called DIA-MTTP.
Reem Almarwani   +2 more
doaj   +1 more source

A Reliability-Aware Approach for Resource Efficient Virtual Network Function Deployment [PDF]

open access: yes, 2018
OAPA Network function virtualization (NFV) is a promising technique aimed at reducing capital expenditures (CAPEX) and operating expenditures (OPEX), and improving the flexibility and scalability of an entire network.
Chang, V   +7 more
core   +1 more source

Systematic review and scoring‐based selection of pharmacokinetic models for precision dosing of vancomycin in neonates and children

open access: yesBritish Journal of Clinical Pharmacology, EarlyView.
This systematic review identified 112 population pharmacokinetic models of vancomycin in neonates and children. To support rational model selection for model‐informed precision, we developed and applied expert‐driven, transparent criteria that integrate both methodological rigour and clinical relevance.
Zoë Vander Elst   +8 more
wiley   +1 more source

Sigmoid(x): secure distributed network storage [PDF]

open access: yes, 2011
Secure data storage is a serious problem for computer users today, particularly in enterprise environments. As data requirements grow, traditional approaches of secured silos are showing their limitations. They represent a single – or at least, limited –
Goo, Swee Keow   +2 more
core  

Why do people choose to enter and exit the teaching profession? An interdisciplinary quantitative synthesis

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Many nations experience recurring shortages of teachers in particular subjects, prompting concerns that pupils' education is suffering as a result. Researchers have responded by generating a sizable literature on the reasons for which people enter and exit the teaching profession.
Sam Sims   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy