Results 61 to 70 of about 528,126 (280)

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Analysis and construction for threshold signature scheme based on game theory

open access: yesTongxin xuebao, 2015
The concept of “rational player” is introduced to make threshold signature system more general.In this new primitive,all players are regarded as rational individuals in the sense that they always try to maximize their profits as the goal at any phases ...
ANGJie W, AIYong-quan C, IANYou-liang T
doaj   +2 more sources

Carrier Transport in Magnesium Diboride: Role of Nano-inclusions

open access: yes, 2017
Anisotropic-gap and two-band effects smear out the superconducting transition (Tc) in literature reported thermal conductivity of MgB2, where large electronic contributions also suppress anomaly-manifestation in their negligible phononic-parts.
Albisetti, A. Figini   +5 more
core   +1 more source

Theory of charge density wave depinning by electromechanical effect [PDF]

open access: yes, 2017
We discuss the first theory for the depinning of low dimensional, incommensurate, charge density waves (CDWs) in the strong electron-phonon (e-p) regime.
Quemerais, P.
core   +3 more sources

Pre‐analytical optimization of cell‐free DNA and extracellular vesicle‐derived DNA for mutation detection in liquid biopsies

open access: yesMolecular Oncology, EarlyView.
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen   +11 more
wiley   +1 more source

Dynamic-FROST: Schnorr threshold signatures with a flexible committee

open access: yesJournal of Mathematical Cryptology
Threshold signatures enable any subgroup of predefined cardinality tt out of a committee of nn participants to generate a valid, aggregated signature.
Cimatti Annalisa   +7 more
doaj   +1 more source

Strangeness and Quark--Gluon Plasma

open access: yes, 2011
I review the foundational motivation which led us to the ultra relativistic heavy ion collision research at SPS, RHIC and now LHC: the quantum vacuum structure; the deconfined nature of quark-gluon plasma (QGP) phase filling the Universe for the first 30$
Rafelski, Jan
core   +1 more source

EDNRB‐dependent endothelin signaling reduces proliferation and promotes proneural‐to‐mesenchymal transition in gliomas

open access: yesMolecular Oncology, EarlyView.
Glioma cells mainly express the endothelin receptor EDNRB, while EDNRA is restricted to a perivascular tumor subpopulation. Endothelin signaling reduces glioma cell proliferation while promoting migration and a proneural‐to‐mesenchymal transition associated with poor prognosis. This pathway activates Ca2+, K+, ERK, and STAT3 signalings and is regulated
Donovan Pineau   +36 more
wiley   +1 more source

Efficiency identity-based threshold group signature scheme

open access: yesTongxin xuebao, 2009
Threshold group signature was used to guarantee the security of the collective decision.To improve the efficiency,a new identity-based cryptography threshold group signature scheme was proposed basing on bilinear pairing and secret sharing.In this scheme,
LIU Hong-wei 1   +3 more
doaj   +2 more sources

Security of signed ELGamal encryption [PDF]

open access: yes, 2005
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core  

Home - About - Disclaimer - Privacy