Results 71 to 80 of about 1,481,271 (291)

30 yıl sonra Nazım Hikmet [PDF]

open access: yes, 1993
Taha Toros Arşivi, Dosya Adı: Nazım Hikmet. Not: Gazetenin “Bir Bakıma” köşesinde yayımlanmıştır.İstanbul Kalkınma Ajansı (TR10/14/YEN/0033) İstanbul Development Agency (TR10/14/YEN ...
Tanilli, Server
core  

Is the Web ready for HTTP/2 Server Push?

open access: yes, 2018
HTTP/2 supersedes HTTP/1.1 to tackle the performance challenges of the modern Web. A highly anticipated feature is Server Push, enabling servers to send data without explicit client requests, thus potentially saving time.
Borgnat P.   +4 more
core   +1 more source

Blinatumomab Utilization in Pediatric B‐Cell Acute Lymphoblastic Leukemia: Experience From the Mountain West

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Blinatumomab is a bispecific T‐cell engager approved for the treatment of pediatric B‐cell acute lymphoblastic leukemia (B‐ALL). Outpatient home infusion reduces hospitalization burden and optimizes resource utilization, but is logistically challenging.
Angela Parra del Riego   +10 more
wiley   +1 more source

Assessing Cognitive Functioning in Children With Brain Tumors: Interaction of Neighborhood Social Determinants of Health and Neurological Risk

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich   +5 more
wiley   +1 more source

Infection Control Practices for Vascular Access Management in Hemodialysis: Results From a Nationwide Survey of Japanese National University Hospitals

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Bloodstream infections due to repeated vascular access (VA) puncture and circuit connections remain major concerns in hemodialysis. Therefore, we examined current practices for glove, disinfectant, and personal protective equipment (PPE) use according to VA type in national university hospitals in Japan.
Aiko Yamada   +6 more
wiley   +1 more source

Revealing the structure of land plant photosystem II: the journey from negative‐stain EM to cryo‐EM

open access: yesFEBS Letters, EarlyView.
Advances in cryo‐EM have revealed the detailed structure of Photosystem II, a key protein complex driving photosynthesis. This review traces the journey from early low‐resolution images to high‐resolution models, highlighting how these discoveries deepen our understanding of light harvesting and energy conversion in plants.
Roman Kouřil
wiley   +1 more source

Non-interactive fuzzy private matching [PDF]

open access: yes, 2007
Two fuzzy private matching protocols are introduced to allow a client to securely compare a list of words to a server list, and discover only those words on the server list that are similar to his, while the server learns nothing.
Doumen, J.M.
core   +1 more source

Lengthening and Extending Binary Private Information Retrieval Codes

open access: yes, 2018
It was recently shown by Fazeli et al. that the storage overhead of a traditional $t$-server private information retrieval (PIR) protocol can be significantly reduced using the concept of a $t$-server PIR code.
Lin, Hsuan-Yin, Rosnes, Eirik
core   +1 more source

Organoids in pediatric cancer research

open access: yesFEBS Letters, EarlyView.
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley   +1 more source

PERFORMANCE REQUIRED FOR COMMON-USE COMPONENTS OF COMPUTER NETWORKS

open access: yesJournal of Engineering Science (Chişinău)
Sometimes, in practice, simple solutions of quick preliminary estimation of basic characteristics of a computer network are needed.In this aim, the backbone subnet and server set of wide area computer networks are examined.
BOLUN, Ion
doaj   +1 more source

Home - About - Disclaimer - Privacy