Results 41 to 50 of about 1,107,668 (334)

Exponentiation of the Drell-Yan cross section near partonic threshold in the DIS and MSbar schemes [PDF]

open access: yes, 2003
It has been observed that in the DIS scheme the refactorization of the Drell-Yan cross section leading to exponentiation of threshold logarithms can also be used to organize a class of constant terms, most of which arise from the ratio of the timelike ...
A. Sen   +28 more
core   +2 more sources

Function‐driven design of a surrogate interleukin‐2 receptor ligand

open access: yesFEBS Letters, EarlyView.
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang   +9 more
wiley   +1 more source

An ideal multi-secret sharing scheme based on minimal privileged coalitions [PDF]

open access: yes, 2012
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342], namely to design an ...
Li, Zhihui, Song, Yun
core   +1 more source

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

A Recursive Threshold Visual Cryptography Scheme [PDF]

open access: yes, 2008
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter ...
Kak, Subhash, Parakh, Abhishek
core   +1 more source

Efficient rare event simulation for failure problems in random media [PDF]

open access: yes, 2014
In this paper we study rare events associated to solutions of elliptic partial differential equations with spatially varying random coefficients. The random coefficients follow the lognormal distribution, which is determined by a Gaussian process.
Liu, Jingchen, Lu, Jianfeng, Zhou, Xiang
core   +1 more source

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

Provably secure secret sharing scheme based on bilinear maps

open access: yesTongxin xuebao, 2008
A method to construct provable secure secret sharing scheme using bilinear pairing was recommended.Firstly,the semantic security definition for secret sharing scheme is given,which is developed from the standard definition of semantic security for the ...
LI Hui-xian1, PANG Liao-jun2
doaj  

Communication Optimization Schemes for Accelerating Distributed Deep Learning Systems

open access: yesApplied Sciences, 2020
In a distributed deep learning system, a parameter server and workers must communicate to exchange gradients and parameters, and the communication cost increases as the number of workers increases.
Jaehwan Lee   +4 more
doaj   +1 more source

A threshold secure data sharing scheme for federated clouds

open access: yes, 2012
Cloud computing allows users to view computing in a new direction, as it uses the existing technologies to provide better IT services at low-cost.
Padmavathamma, M., Venkataramana, K.
core   +1 more source

Home - About - Disclaimer - Privacy