Results 61 to 70 of about 38,400 (270)
Verifiable Stream Computation and Arthur--Merlin Communication [PDF]
Summary: In the setting of streaming interactive proofs (SIPs), a client (verifier) needs to compute a given function on a massive stream of data, arriving online, but is unable to store even a small fraction of the data. It outsources the processing to a third party service (prover) but is unwilling to blindly trust answers returned by this service ...
Chakrabarti, Amit +4 more
openaire +4 more sources
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie +4 more
wiley +1 more source
Verifiable Subgraph Matching With Cryptographic Accumulators in Cloud Computing
Due to the rapid development of social networks, bio-informatics, internet-of-things etc., subgraph matching query can be found in various applications.
Yixiao Zhu +3 more
doaj +1 more source
ABSTRACT Background An international Delphi panel of experts developed consensus statements to delineate the circumstances where the risks of dexamethasone as an antiemetic do and do not outweigh its benefits. Procedure Experts in supportive care of pediatric patients were invited to participate.
Negar Shavandi +20 more
wiley +1 more source
We propose a secure computation solution for blockchain networks. The correctness of computation is verifiable even under malicious majority condition using information-theoretic Message Authentication Code (MAC), and the privacy is preserved using ...
Chen, Jiang +3 more
core +1 more source
ABSTRACT Blinatumomab has been shown to be highly effective for patients with pediatric B‐ALL and has recently become standard of care therapy. Due to its past use in the clinical trial setting, there is limited information available about real‐world administration.
Katelyn Oranges +12 more
wiley +1 more source
Benchmarking of quantum protocols
Quantum network protocols offer new functionalities such as enhanced security to communication and computational systems. Despite the rapid progress in quantum hardware, it has not yet reached a level of maturity that enables execution of many quantum ...
Chin-Te Liao +3 more
doaj +1 more source
How proofs are prepared at Camelot
We study a design framework for robust, independently verifiable, and workload-balanced distributed algorithms working on a common input. An algorithm based on the framework is essentially a distributed encoding procedure for a Reed--Solomon code, which ...
Freivalds R., Gao S., Nešetřil J.
core +1 more source
Clinical Insights Into Hypercalcemia of Malignancy in Childhood
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley +1 more source
Verifiable Multiparty Delegated Quantum Computation
Multiparty delegated quantum computation (MDQC) allows multiple clients with limited quantum capability to jointly complete a quantum computational task with the aid of an untrusted quantum server. But in existing MDQC protocols, the verifiability that clients should verify whether the server executed the protocol correctly and gave correct results was
Qin Li +4 more
openaire +1 more source

