Results 61 to 70 of about 192,432 (282)
Verifiable special threshold secret sharing scheme based on eigenvalue
Utilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots,the secret distributor distributes two different sub-keys to each participant,and these two sub-keys satisfy two conditions:linear independent and ...
Yanshuo ZHANG +4 more
doaj
Verifying environmental relationships [PDF]
In two experiments, subjects first learned the locations of objects in a 21 x 21 ft room and then were timed as they verified, from memory, statements about the spatial relationships of the objects to certain features (e.g., the outside walls, the center of the room, subdividing partitions).
R C, Sherman, C, Oliver, W, Titus
openaire +2 more sources
ABSTRACT Background and Aims Wilms tumour (WT) has excellent event‐free and overall survival (OS). However, small differences exist between countries participating in the same international study. This led us to examine variation in adherence to protocol recommendations as a potential contributing factor.
Suzanne Tugnait +23 more
wiley +1 more source
Computer-aided cryptography, with particular emphasis on formal verification, promises an interesting avenue to establish strong guarantees about cryptographic primitives. The appeal of formal verification is to replace the error-prone pen-and-paper proofs with a proof that was checked by a computer and, therefore, does not need to be ...
Sabine Oechsner +2 more
openaire +2 more sources
ABSTRACT Arteriovenous malformations (AVMs) are rare, high‐flow, vascular anomalies that can occur either sporadically or as part of a genetic syndrome. AVMs can progress with serious morbidity and even mortality if left unchecked. Sirolimus is an mTOR inhibitor that is effective in low‐flow vascular malformations; however, its role in AVMs is unclear.
Will Swansson +3 more
wiley +1 more source
Revocable Attribute-Based Encryption with Efficient and Secure Verification in Smart Health Systems
By leveraging Internet of Things (IoT) technology, patients can utilize medical devices to upload their collected personal health records (PHRs) to the cloud for analytical processing or transmission to doctors, which embodies smart health systems and ...
Zhou Chen, Lidong Han, Baokun Hu
doaj +1 more source
Verifying liveness properties by verifying safety properties [PDF]
Conventional techniques for automatically verifying liveness properties of circuits involve explicitly modeling infinite behaviors with either infinite paths through a Kripke structure or with strings in an ω-regular language. This paper describes how timed trace structures [2, 3] can be used to convert liveness properties (including unbounded liveness
openaire +1 more source
ABSTRACT Objective To evaluate the diagnostic yield and utility of universal paired tumor–normal multigene panel sequencing in newly diagnosed pediatric solid and central nervous system (CNS) tumor patients and to compare the detection of germline pathogenic/likely pathogenic variants (PV/LPVs) against established clinical referral criteria for cancer ...
Natalie Waligorski +9 more
wiley +1 more source
Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment
The verifiable computation paradigm has been studied extensively as a means to verifying the result of outsourced computation. In said scheme, the verifier requests computation from the prover and verifies the result by checking the output and proof ...
Junghee Lee +4 more
doaj +1 more source
Intravitreal GD2‐Specific Chimeric Antigen Receptor T‐Cell Therapy for Refractory Retinoblastoma
ABSTRACT Effective treatments for advanced, treatment‐resistant retinoblastoma (RB) remain limited. GD2‐specific chimeric antigen receptor (CAR) T cells show potent antitumor activity with minimal toxicity but have not previously been evaluated in RB.
Subongkoch Subhadhirasakul +13 more
wiley +1 more source

