Results 41 to 50 of about 192,432 (282)
Multi-Verifier Signatures [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Roeder, Tom +2 more
openaire +2 more sources
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie +4 more
wiley +1 more source
Incentivizing Verifiable Privacy-Protection Mechanisms for Offline Crowdsensing Applications
Incentive mechanisms of crowdsensing have recently been intensively explored. Most of these mechanisms mainly focus on the standard economical goals like truthfulness and utility maximization.
Jiajun Sun, Ningzhong Liu
doaj +1 more source
Verifiable conditions of $\ell_1$-recovery of sparse signals with sign restrictions
We propose necessary and sufficient conditions for a sensing matrix to be "s-semigood" -- to allow for exact $\ell_1$-recovery of sparse signals with at most $s$ nonzero entries under sign restrictions on part of the entries.
A. Bruckstein +12 more
core +3 more sources
Gaining assurance in a voter-verifiable voting system [PDF]
The literature on e-voting systems has many examples of discussion of the correctness of the computer and communication algorithms of such systems, as well as discussions of their vulnerabilities.
Alberdi, E. +5 more
core +3 more sources
ABSTRACT Background An international Delphi panel of experts developed consensus statements to delineate the circumstances where the risks of dexamethasone as an antiemetic do and do not outweigh its benefits. Procedure Experts in supportive care of pediatric patients were invited to participate.
Negar Shavandi +20 more
wiley +1 more source
Verifiable Random Functions (VRFs) [PDF]
A Verifiable Random Function (VRF) is the public-key version of a keyed cryptographic hash. Only the holder of the private key can compute the hash, but anyone with public key can verify the correctness of the hash.
Goldberg, Sharon +3 more
core
Generalized couplings and ergodic rates for SPDEs and other Markov models [PDF]
We establish verifiable general sufficient conditions for exponential or subexponential ergodicity of Markov processes that may lack the strong Feller property.
Butkovsky, Oleg +2 more
core +2 more sources
ABSTRACT Blinatumomab has been shown to be highly effective for patients with pediatric B‐ALL and has recently become standard of care therapy. Due to its past use in the clinical trial setting, there is limited information available about real‐world administration.
Katelyn Oranges +12 more
wiley +1 more source
A Secure and Verifiable Blockchain-Based Framework for Personal Data Validation
The online services provided by the Service Provider (SP) have brought significant convenience to people’s lives. Nowadays, people have grown accustomed to obtaining diverse services via the Internet. However, some SP utilize or even tamper with personal
Junyan Yu, Ximing Li, Yubin Guo
doaj +1 more source

