Results 71 to 80 of about 38,400 (270)
ABSTRACT Purpose Retinoblastoma (RB) is the most common pediatric ocular cancer, yet population‐based data on survival and risk factors remain limited. This study aimed to describe survival in a large national RB cohort and identify predictors of death and complications.
Samuel Sassine +14 more
wiley +1 more source
With the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. While verifiable computing brings convenience to users, there are also security challenges: data privacy ...
Tianpeng ZHANG, Zhiyu REN, Xuehui DU, Haichao WANG
doaj +5 more sources
ABSTRACT Objective To evaluate selumetinib exposure using therapeutic drug monitoring (TDM) in pediatric patients with neurofibromatosis type 1 (NF1) and plexiform neurofibromas (PN), assess interpatient pharmacokinetic variability, and explore the relationship between drug exposure, clinical response, and adverse effects.
Janka Kovács +8 more
wiley +1 more source
Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation
In this paper, we introduce secure groups as a cryptographic scheme representing finite groups together with a range of operations, including the group operation, inversion, random sampling, and encoding/decoding maps.
Berry Schoenmakers, Toon Segers
doaj +1 more source
ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges
Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces ...
Chen, Guihai +4 more
core +1 more source
Multi-Client Non-interactive Verifiable Computation [PDF]
Gennaro et al. (Crypto 2010) introduced the notion of non-interactive verifiable computation, which allows a computationally weak client to outsource the computation of a function f on a series of inputs x(1),... to a more powerful but untrusted server.
Choi, Seung Geol +3 more
openaire +8 more sources
Rigidity of quantum steering and one-sided device-independent verifiable quantum computation
The relationship between correlations and entanglement has played a major role in understanding quantum theory since the work of Einstein et al (1935 Phys. Rev. https://doi.org/10.1103/PhysRev.47.777 47 https://doi.org/10.1103/PhysRev.47.777 ). Tsirelson
Alexandru Gheorghiu +2 more
doaj +1 more source
ABSTRACT Background and Aims Wilms tumour (WT) has excellent event‐free and overall survival (OS). However, small differences exist between countries participating in the same international study. This led us to examine variation in adherence to protocol recommendations as a potential contributing factor.
Suzanne Tugnait +23 more
wiley +1 more source
Client-friendly continuous-variable blind and verifiable quantum computing
We present a verifiable and blind protocol for assisted universal quantum computing on continuous-variable (CV) platforms. This protocol is highly experimentally-friendly to the client, as it only requires Gaussian-operation capabilities from the latter.
Aolita, Leandro +4 more
core +1 more source
Verified lifting of stencil computations [PDF]
This paper demonstrates a novel combination of program synthesis and verification to lift stencil computations from low-level Fortran code to a high-level summary expressed using a predicate language. The technique is sound and mostly automated, and leverages counter-example guided inductive synthesis (CEGIS) to find provably correct translations ...
Kamil, Shoaib +3 more
openaire +4 more sources

