Results 11 to 20 of about 1,105,319 (208)

Exploring the genetic diversity of the IPK Medicago germplasm collection using GBS. [PDF]

open access: yesPlant Biol (Stuttg)
Genotyping‐by‐sequencing of 1234 accessions from the Medicago collection of the Leibniz Institute of Plant Genetics and Crop Plant Research (IPK) revealed broad genetic diversity across 40 species, providing one of the first genus‐wide insights into relationships between both cultivated and wild species of Medicago.
Devabhakthini N   +6 more
europepmc   +2 more sources

Revealing the unseen: how to expose cloud usage while protecting user privacy [PDF]

open access: yes, 2017
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use.
Kellaris, Georgios, Turk, Ata, Varia, M.
core   +2 more sources

EasyUC: using EasyCrypt to mechanize proofs of universally composable security [PDF]

open access: yes, 2019
We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of cryptographic schemes and protocols) to mechanize proofs of security of cryptographic protocols ...
Canetti, Ran   +2 more
core   +2 more sources

Moving in next door: Network flooding as a side channel in cloud environments [PDF]

open access: yes, 2016
The final publication is available at http://link.springer.com/chapter/10.1007/978-3-319-48965-0_56Co-locating multiple tenants' virtual machines (VMs) on the same host underpins public clouds' affordability, but sharing physical hardware also exposes ...
Agarwal, Yatharth   +4 more
core   +2 more sources

User-centric distributed solutions for privacy-preserving analytics [PDF]

open access: yes, 2017
How can cryptography empower users with sensitive data to access large-scale computing platforms in a privacy-preserving manner?
Bestavros, Azer   +2 more
core   +1 more source

Modeling species co-occurrence effects to inform invasive barred owl management and recovery of the northern spotted owl. [PDF]

open access: yesEcol Appl
Abstract Robust estimation of wildlife populations represents a cornerstone of wildlife research and provides critical information to guide management, including identifying at‐risk species, setting harvest rates, and evaluating predator and invasive species control programs.
Srivastava V, Van Lanen NJ, Parshad RD.
europepmc   +2 more sources

DEMO: integrating MPC in big data workflows [PDF]

open access: yes, 2016
Secure multi-party computation (MPC) allows multiple parties to perform a joint computation without disclosing their private inputs. Many real-world joint computation use cases, however, involve data analyses on very large data sets, and are implemented ...
Bestavros, Azer   +4 more
core   +3 more sources

Acute abdomen due to spontaneous splenic rupture as the first presentation of lung malignancy: a case report [PDF]

open access: yes, 2011
Introduction Spontaneous splenic rupture is well recognized in the context of hematological malignancies (lymphoproliferative and myeloproliferative disorders); a few case reports have also linked solid tumors, such as pancreatic and liver ...
Angelos Kyriacou   +2 more
core   +1 more source

The security of NTP's datagram protocol [PDF]

open access: yes, 2017
For decades, the Network Time Protocol (NTP) has been used to synchronize computer clocks over untrusted network paths. This work takes a new look at the security of NTP’s datagram protocol.
Gardner, Jonathan   +5 more
core   +2 more sources

An Exploration of the Role of Principal Inertia Components in Information Theory

open access: yes, 2014
The principal inertia components of the joint distribution of two random variables $X$ and $Y$ are inherently connected to how an observation of $Y$ is statistically related to a hidden variable $X$.
Calmon, Flavio du Pin   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy