Results 21 to 30 of about 600,761 (285)

The oscillatory distribution of distances in random tries

open access: yes, 2005
We investigate \Delta_n, the distance between randomly selected pairs of nodes among n keys in a random trie, which is a kind of digital tree.
Christophi, Costas A., Mahmoud, Hosam M.
core   +2 more sources

Approximation with Error Bounds in Spark

open access: yes, 2018
We introduce a sampling framework to support approximate computing with estimated error bounds in Spark. Our framework allows sampling to be performed at the beginning of a sequence of multiple transformations ending in an aggregation operation.
Hu, Guangyan   +3 more
core   +1 more source

Key elements of bioanalytical method validation for small molecules [PDF]

open access: yesThe AAPS Journal, 2007
Method validation is a process that demonstrates that a method will successfully meet or exceed the minimum standards recommended in the Food and Drug Administration (FDA) guidance for accuracy, precision, selectivity, sensitivity, reproducibility, and stability.
Surendra, Bansal, Anthony, DeStefano
openaire   +2 more sources

TeeJam: Sub-Cache-Line Leakages Strike Back

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
The microarchitectural behavior of modern CPUs is mostly hidden from developers and users of computer software. Due to a plethora of attacks exploiting microarchitectural behavior, developers of security-critical software must, e.g., ensure their code ...
Florian Sieck   +5 more
doaj   +1 more source

Min-entropy and quantum key distribution: Nonzero key rates for “small” numbers of signals [PDF]

open access: yesPhysical Review A, 2011
10 pages, 6 figures, changed plots due to the erratum of L. Sheridan and V. Scarani, Phys. Rev. A 83, 039901 (2011)
Bratzik, Sylvia   +3 more
openaire   +2 more sources

Chaos-Based Physical Unclonable Functions

open access: yesApplied Sciences, 2019
The concept presented in this paper fits into the current trend of highly secured hardware authentication designs utilizing Physically Unclonable Functions (PUFs) or Physical Obfuscated Keys (POKs).
Krzysztof Gołofit, Piotr Z. Wieczorek
doaj   +1 more source

Effect of Shear Keys on the Quasi-Isolated Behavior of Small-to-Medium-Span Girder Bridges

open access: yesBuildings, 2023
Small-to-medium-span girder bridges equipped with shear keys play a significant role in the Chinese highway bridge system. However, shear key failure was observed during the 2008 Wenchuan earthquake, which resulted in excessive superstructure ...
Kefeng Yue   +4 more
doaj   +1 more source

Dataset for Aedes aegypti (diptera: Culicidae) and Culex quinquefasciatus (diptera: Culicidae) collections from key West, Florida, USA, 2010–2020

open access: yesData in Brief, 2022
The Florida Keys Mosquito Control District began deploying Biogents® BG Sentinel traps to monitor Aedes aegypti (Diptera: Culicidae) populations in Key West during a small autochthonous dengue outbreak that began in November 2009.
Catherine A. Pruszynski
doaj   +1 more source

Magnetic Properties of Ab initio Model for Iron-Based Superconductors LaFeAsO

open access: yes, 2010
By using variational Monte Carlo method, we examine an effective low-energy model for LaFeAsO derived from an ab initio downfolding scheme. We show that quantum and many-body fluctuations near a quantum critical point largely reduce the antiferromagnetic
Aichhorn M.   +36 more
core   +1 more source

A Quality Improvement Initiative to Standardize Pneumocystis jirovecii Pneumonia Prophylaxis in Pediatric Patients With Solid Tumors

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Pediatric patients with extracranial solid tumors (ST) receiving chemotherapy are at an increased risk for Pneumocystis jirovecii pneumonia (PJP). However, evidence guiding prophylaxis practices in this population is limited. A PJP‐related fatality at our institution highlighted inconsistent prescribing approaches and concerns about
Kriti Kumar   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy