Results 41 to 50 of about 1,107,668 (334)
Exponentiation of the Drell-Yan cross section near partonic threshold in the DIS and MSbar schemes [PDF]
It has been observed that in the DIS scheme the refactorization of the Drell-Yan cross section leading to exponentiation of threshold logarithms can also be used to organize a class of constant terms, most of which arise from the ratio of the timelike ...
A. Sen +28 more
core +2 more sources
Function‐driven design of a surrogate interleukin‐2 receptor ligand
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang +9 more
wiley +1 more source
An ideal multi-secret sharing scheme based on minimal privileged coalitions [PDF]
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342], namely to design an ...
Li, Zhihui, Song, Yun
core +1 more source
Time after time – circadian clocks through the lens of oscillator theory
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo +2 more
wiley +1 more source
A Recursive Threshold Visual Cryptography Scheme [PDF]
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter ...
Kak, Subhash, Parakh, Abhishek
core +1 more source
Efficient rare event simulation for failure problems in random media [PDF]
In this paper we study rare events associated to solutions of elliptic partial differential equations with spatially varying random coefficients. The random coefficients follow the lognormal distribution, which is determined by a Gaussian process.
Liu, Jingchen, Lu, Jianfeng, Zhou, Xiang
core +1 more source
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley +1 more source
Provably secure secret sharing scheme based on bilinear maps
A method to construct provable secure secret sharing scheme using bilinear pairing was recommended.Firstly,the semantic security definition for secret sharing scheme is given,which is developed from the standard definition of semantic security for the ...
LI Hui-xian1, PANG Liao-jun2
doaj
Communication Optimization Schemes for Accelerating Distributed Deep Learning Systems
In a distributed deep learning system, a parameter server and workers must communicate to exchange gradients and parameters, and the communication cost increases as the number of workers increases.
Jaehwan Lee +4 more
doaj +1 more source
A threshold secure data sharing scheme for federated clouds
Cloud computing allows users to view computing in a new direction, as it uses the existing technologies to provide better IT services at low-cost.
Padmavathamma, M., Venkataramana, K.
core +1 more source

