Results 61 to 70 of about 192,432 (282)

Verifiable special threshold secret sharing scheme based on eigenvalue

open access: yesTongxin xuebao, 2018
Utilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots,the secret distributor distributes two different sub-keys to each participant,and these two sub-keys satisfy two conditions:linear independent and ...
Yanshuo ZHANG   +4 more
doaj  

Verifying environmental relationships [PDF]

open access: yesMemory & Cognition, 1980
In two experiments, subjects first learned the locations of objects in a 21 x 21 ft room and then were timed as they verified, from memory, statements about the spatial relationships of the objects to certain features (e.g., the outside walls, the center of the room, subdividing partitions).
R C, Sherman, C, Oliver, W, Titus
openaire   +2 more sources

Adherence to Protocol Recommendations for Children With Wilms Tumour in Two Consecutive Studies in the United Kingdom and Ireland—Does Variation Matter?

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background and Aims Wilms tumour (WT) has excellent event‐free and overall survival (OS). However, small differences exist between countries participating in the same international study. This led us to examine variation in adherence to protocol recommendations as a potential contributing factor.
Suzanne Tugnait   +23 more
wiley   +1 more source

Who Verifies the Verifiers?

open access: yesIACR Communications in Cryptology
Computer-aided cryptography, with particular emphasis on formal verification, promises an interesting avenue to establish strong guarantees about cryptographic primitives. The appeal of formal verification is to replace the error-prone pen-and-paper proofs with a proof that was checked by a computer and, therefore, does not need to be ...
Sabine Oechsner   +2 more
openaire   +2 more sources

Sirolimus for Extracranial Arteriovenous Malformations: A Scoping Review of the Evidence in Syndromic and Non‐Syndromic Cases

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Arteriovenous malformations (AVMs) are rare, high‐flow, vascular anomalies that can occur either sporadically or as part of a genetic syndrome. AVMs can progress with serious morbidity and even mortality if left unchecked. Sirolimus is an mTOR inhibitor that is effective in low‐flow vascular malformations; however, its role in AVMs is unclear.
Will Swansson   +3 more
wiley   +1 more source

Revocable Attribute-Based Encryption with Efficient and Secure Verification in Smart Health Systems

open access: yesMathematics
By leveraging Internet of Things (IoT) technology, patients can utilize medical devices to upload their collected personal health records (PHRs) to the cloud for analytical processing or transmission to doctors, which embodies smart health systems and ...
Zhou Chen, Lidong Han, Baokun Hu
doaj   +1 more source

Verifying liveness properties by verifying safety properties [PDF]

open access: yes, 1991
Conventional techniques for automatically verifying liveness properties of circuits involve explicitly modeling infinite behaviors with either infinite paths through a Kripke structure or with strings in an ω-regular language. This paper describes how timed trace structures [2, 3] can be used to convert liveness properties (including unbounded liveness
openaire   +1 more source

Evaluating the Utility of Paired Tumor and Germline Targeted DNA Sequencing for Pediatric Oncology Patients: A Single Institution Report

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate the diagnostic yield and utility of universal paired tumor–normal multigene panel sequencing in newly diagnosed pediatric solid and central nervous system (CNS) tumor patients and to compare the detection of germline pathogenic/likely pathogenic variants (PV/LPVs) against established clinical referral criteria for cancer ...
Natalie Waligorski   +9 more
wiley   +1 more source

Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment

open access: yesIEEE Access, 2020
The verifiable computation paradigm has been studied extensively as a means to verifying the result of outsourced computation. In said scheme, the verifier requests computation from the prover and verifies the result by checking the output and proof ...
Junghee Lee   +4 more
doaj   +1 more source

Intravitreal GD2‐Specific Chimeric Antigen Receptor T‐Cell Therapy for Refractory Retinoblastoma

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Effective treatments for advanced, treatment‐resistant retinoblastoma (RB) remain limited. GD2‐specific chimeric antigen receptor (CAR) T cells show potent antitumor activity with minimal toxicity but have not previously been evaluated in RB.
Subongkoch Subhadhirasakul   +13 more
wiley   +1 more source

Home - About - Disclaimer - Privacy