Results 81 to 90 of about 192,432 (282)
Secure Collaborative Publicly Verifiable Computation
Publicly Verifiable Computation (PVC) enables computationally weak trusted sources to outsource several computations to some more powerful public untrusted clouds.
Qiang Wang +4 more
doaj +1 more source
ABSTRACT Purpose Pediatric central nervous system (CNS) tumors often recur despite multimodality therapy. Although re‐irradiation (re‐RT) has historically been limited by concerns for severe late toxicities, modern techniques have renewed interest in this approach. Proton therapy provides dosimetric advantages that may enable curative re‐treatment with
Jin‐Ho Song +15 more
wiley +1 more source
Secure Dynamic Big Graph Data: Scalable, Low-Cost Remote Data Integrity Checking
As a special type of big data, the big graph has wide applications. The remote data integrity checking (RDIC) scheme enables public clouds to efficiently convince the clients that their graph data are stored properly, without the need of retrieving the ...
Yu Lu, Fei Hu
doaj +1 more source
Verifiable and Non-Verifiable Anonymous Mechanisms for Regulating a Polluting Monopolist [PDF]
Optimal regulation of a polluting natural monopolist must correct for both external damages and market power to achieve a social optimum. Existing non-Bayesian regulatory methods require knowledge of the demand function, while Bayesian schemes require ...
James E. Prieger, Nicholas J. Sanders
core
Joe and his cartoon-character friends began populating advertisements for the Camel brand in the United States in 1988 and continued doing so for the next decade (figure 1). As described in a fawning retrospective produced for RJ Reynolds: “Between 1988 and 1997, the Joe Camel campaign was one of the most recognized ad campaigns in America, and that ...
openaire +2 more sources
ABSTRACT Background Gastrointestinal graft‐versus‐host disease (GI GVHD) following hematopoietic stem cell transplant is typically managed with medical therapy, but surgery and angioembolization may be warranted in selected cases with life‐threatening complications.
Gaia Brunetti +12 more
wiley +1 more source
Shorter lattice-based verifiable encryption using bimodal Gaussian
Verifiable encryption enables the decryption to be taken on properly generated ciphertexts, by making the encryptor provide a zero-knowledge proof. To meet the quantum-safe application requirements, such as key escrow, Lyubashevsky et al.
Dong Fang +5 more
doaj +1 more source
ABSTRACT In pediatric patients, T‐cell lymphoblastic lymphoma (T‐LBL) survival exceeds 80%. Relapse remains associated with limited curative options. Frontline treatment is largely extrapolated from T‐cell acute lymphoblastic leukemia (T‐ALL) treatment, reflecting the ongoing debate, whether both entities represent distinct diseases or variants within ...
Marie C. Heider +4 more
wiley +1 more source
This Is Not a Myeloproliferative Neoplasm…
Pediatric Blood &Cancer, EarlyView.
Stephanie Juané Kennedy
wiley +1 more source
ABSTRACT Background Neuromyelitis optica spectrum disorder (NMOSD) is a relapsing autoimmune disease of the central nervous system. High‐dose intravenous methylprednisolone (IVMP) is the standard first‐line therapy for acute attacks, although some patients remain refractory.
Wataru Horiguchi +5 more
wiley +1 more source

