Results 41 to 50 of about 638,600 (248)
An experimental evaluation and possible extensions of SyPet [PDF]
Program synthesis is an automated programming technique that automatically constructs a program which satisfies given specifications. SyPet is a recently published novel component-based synthesis tool that assembles a straight-line Java method body that ...
Yang, Zijiang, active 21st century
core +1 more source
This study constructs a proteomic atlas of esophageal squamous cell carcinoma (ESCC) progression using esophageal biopsy samples. It identifies moderate dysplasia as the critical turning stage and a seven‐protein panel for early detection. Functionally, GBP6 loss promotes ESCC progression via cell cycle and epithelial‐mesenchymal transition (EMT ...
Xumiao Li +12 more
wiley +1 more source
Confidentiality of XML documents by pool encryption [PDF]
The eXtensible Markup Language (XML) is a widely adopted format for documents containing structured information. Structured information contains both the content (words, images etc.) and the ‘markup’ which indicates the role of the content, e.g. ‘section’
Geuer-Pollmann, Christian
core +1 more source
Provenance Circuits for Trees and Treelike Instances (Extended Version) [PDF]
Query evaluation in monadic second-order logic (MSO) is tractable on trees and treelike instances, even though it is hard for arbitrary instances. This tractability result has been extended to several tasks related to query evaluation, such as counting ...
B Kimelfeld +3 more
core +2 more sources
A modular eight‐legged robot exploits anisotropically oriented soft I‐beam backbones to transmit vibration from a single unbalanced‐mass actuator, producing frequency‐dependent multimodal gaits. A pseudo‐rigid‐body model enables high‐fidelity MuJoCo simulation, while Bayesian parameter identification and reinforcement learning yield robust control ...
Yiğit Yaman +4 more
wiley +1 more source
Abstract Basking sharks, Cetorhinus maximus (Gunnerus, Brugden [Squalus maximus], Det Kongelige Norske Videnskabers Selskabs Skrifter, 1765, vol. 3, pp. 33–49), feed by gaping their mouths and gill slits, greatly reorienting their cranial skeletons to filter food from water.
Tairan Li +12 more
wiley +1 more source
Abstract Acoustic cameras, or imaging sonars, are often used to monitor marine energy sites in regions where the water is too dark or turbid for optical sensing. To do so more effectively, scientists are investigating automated detection methodologies to use on these data.
Theodore Nowak +2 more
wiley +1 more source
Survey on XML encryption [PDF]
Every transaction on the Internet involves some kind of data. Data can be transferred in various modes. Now a days, XML is widely used for transferring and storing the data. There must be some mechanism to protect these data.
Sah, S K
core
TopSig: Topology Preserving Document Signatures [PDF]
Performance comparisons between File Signatures and Inverted Files for text retrieval have previously shown several significant shortcomings of file signatures relative to inverted files.
De Vries, Christopher M., Geva, Shlomo
core +4 more sources
Abstract Background Strangles (Streptococcus equi infection) remains endemic in the UK, with ~300 laboratory diagnoses annually. Sub‐clinically infected long‐term carriers are considered a key driver of endemicity. Analysing genomes of circulating strains could provide valuable transmission insights of this pathogen.
Abigail A. McGlennon +8 more
wiley +1 more source

