Results 61 to 70 of about 160,167 (287)
Virtual machine (VM) measurements data in IaaS cloud play a crucial role in integrity evaluation and decision making. Hence, the secure storage for these data has attracted more attention recently.
Bo Zhao, Peiru Fan, Mingtao Ni
doaj +1 more source
Structure and Sequence Aligned Code Summarization with Prefix and Suffix Balanced Strategy
Source code summarization focuses on generating qualified natural language descriptions of a code snippet (e.g., functionality, usage and version). In an actual development environment, descriptions of the code are missing or not consistent with the code
Jianhui Zeng, Zhiheng Qu, Bo Cai
doaj +1 more source
Delivery of content to mobile devices gains increasing importance in industrial environments to support employees in the field. An important application are e-mail push services like the fashionable Blackberry.
Kuntze, Nicolai, Schmidt, Andreas U.
core +2 more sources
Overview of molecular signatures of senescence and associated resources: pros and cons
Cells can enter a stress response state termed cellular senescence that is involved in various diseases and aging. Detecting these cells is challenging due to the lack of universal biomarkers. This review presents the current state of senescence identification, from biomarkers to molecular signatures, compares tools and approaches, and highlights ...
Orestis A. Ntintas +6 more
wiley +1 more source
Rlaph: a lightweight and dynamic proactive defense method in cloud-edge collaboration
In cloud-edge collaboration scenarios, attackers pose significant security risks by compromising computational nodes and using them to infiltrate other nodes and networks.
Yingbo Li +6 more
doaj +1 more source
Cycle ORAM: A Practical Protection for Access Pattern in Untrusted Storage
Oblivious RAM (ORAM) is a cryptographic primitive to hide memory access pattern in untrusted storage, but the cost remains prohibitively expensive. This paper proposes cycle ORAM, an improvement of Ring ORAM for small client setting.
Bo Zhao, Zhihong Chen, Hai Lin
doaj +1 more source
Citizen Electronic Identities using TPM 2.0
Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access ...
Asokan, N. +2 more
core +1 more source
In this study, we developed a deep learning method for mitotic figure counting in H&E‐stained whole‐slide images and evaluated its prognostic impact in 13 external validation cohorts from seven different cancer types. Patients with more mitotic figures per mm2 had significantly worse patient outcome in all the studied cancer types except colorectal ...
Joakim Kalsnes +32 more
wiley +1 more source
The food and agriculture sector is a cornerstone of critical infrastructure (CI), underpinning global food security, public health, and economic stability.
Chengliang Zheng +9 more
doaj +1 more source
Digital twins to accelerate target identification and drug development for immune‐mediated disorders
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley +1 more source

