Results 71 to 80 of about 38,400 (270)

Survival Outcomes and Complications Among Canadian Children With Retinoblastoma: A Population‐Based Report From CYP‐C

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Retinoblastoma (RB) is the most common pediatric ocular cancer, yet population‐based data on survival and risk factors remain limited. This study aimed to describe survival in a large national RB cohort and identify predictors of death and complications.
Samuel Sassine   +14 more
wiley   +1 more source

Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination

open access: yes网络与信息安全学报
With the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. While verifiable computing brings convenience to users, there are also security challenges: data privacy ...
Tianpeng ZHANG, Zhiyu REN, Xuehui DU, Haichao WANG
doaj   +5 more sources

Personalized Selumetinib Dosing in Pediatric Neurofibromatosis Type 1: Insights From a Pilot Therapeutic Drug Monitoring Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate selumetinib exposure using therapeutic drug monitoring (TDM) in pediatric patients with neurofibromatosis type 1 (NF1) and plexiform neurofibromas (PN), assess interpatient pharmacokinetic variability, and explore the relationship between drug exposure, clinical response, and adverse effects.
Janka Kovács   +8 more
wiley   +1 more source

Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation

open access: yesCryptography, 2023
In this paper, we introduce secure groups as a cryptographic scheme representing finite groups together with a range of operations, including the group operation, inversion, random sampling, and encoding/decoding maps.
Berry Schoenmakers, Toon Segers
doaj   +1 more source

ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges

open access: yes, 2017
Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces ...
Chen, Guihai   +4 more
core   +1 more source

Multi-Client Non-interactive Verifiable Computation [PDF]

open access: yes, 2013
Gennaro et al. (Crypto 2010) introduced the notion of non-interactive verifiable computation, which allows a computationally weak client to outsource the computation of a function f on a series of inputs x(1),... to a more powerful but untrusted server.
Choi, Seung Geol   +3 more
openaire   +8 more sources

Rigidity of quantum steering and one-sided device-independent verifiable quantum computation

open access: yesNew Journal of Physics, 2017
The relationship between correlations and entanglement has played a major role in understanding quantum theory since the work of Einstein et al (1935 Phys. Rev. https://doi.org/10.1103/PhysRev.47.777 47 https://doi.org/10.1103/PhysRev.47.777 ). Tsirelson
Alexandru Gheorghiu   +2 more
doaj   +1 more source

Adherence to Protocol Recommendations for Children With Wilms Tumour in Two Consecutive Studies in the United Kingdom and Ireland—Does Variation Matter?

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background and Aims Wilms tumour (WT) has excellent event‐free and overall survival (OS). However, small differences exist between countries participating in the same international study. This led us to examine variation in adherence to protocol recommendations as a potential contributing factor.
Suzanne Tugnait   +23 more
wiley   +1 more source

Client-friendly continuous-variable blind and verifiable quantum computing

open access: yes, 2018
We present a verifiable and blind protocol for assisted universal quantum computing on continuous-variable (CV) platforms. This protocol is highly experimentally-friendly to the client, as it only requires Gaussian-operation capabilities from the latter.
Aolita, Leandro   +4 more
core   +1 more source

Verified lifting of stencil computations [PDF]

open access: yesProceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2016
This paper demonstrates a novel combination of program synthesis and verification to lift stencil computations from low-level Fortran code to a high-level summary expressed using a predicate language. The technique is sound and mostly automated, and leverages counter-example guided inductive synthesis (CEGIS) to find provably correct translations ...
Kamil, Shoaib   +3 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy