Showing 1 - 20 results of 637 for search 'sources presentation protocol', query time: 0.12s Refine Results
  1. 1

    Security Proof of Single-Source Shortest Distance Protocols Built on Secure Multiparty Computation Protocols by Mohammad Anagreh, Peeter Laud

    Published 2024-12-01
    “…Secure secret-sharing Single-Source Shortest Distance (SSSD) protocols, based on secure multiparty computation (SMC), offer a promising solution for securely distributing and managing sensitive information among multiple parties. …”
    Get full text
    Article
  2. 2

    Analysis of provably secure on-demand source routing in MANET by MAO Li-qiang1, MA Jian-feng1, LI Xing-hua1

    Published 2009-01-01
    “…A formal model tailored to the security analysis of on-demand source routing protocols in MANET was analyzed, and the improper manipulations such as mergence of the adjacent adversarial nodes in the model and the flaw in the proof for endairA were indicated. …”
    Get full text
    Article
  3. 3

    Hardware Communications: An Open-Source Ethernet Switch Implementing the Parallel Redundancy Protocol by André Torres, Rodrigo Piedade, Filipe Moutinho, Luis Gomes

    Published 2025-03-01
    “…Upon packet reception, it will be verified if it is new or has been received before, being discarded if it is duplicated. This paper presents an open-source Ethernet switch, the REDSwitch, capable of implementing the PRP protocol, besides working as a regular switch. …”
    Get full text
    Article
  4. 4

    An open-source platform for structured annotation and computational workflows in digital pathology research by Luca Lianas, Mauro Del Rio, Luca Pireddu, Oskar Aspegren, Francesca Giunchi, Michelangelo Fiorentino, Simone Leo, Renata Zelic, Per Henrik Vincent, Nicolas Destefanis, Daniela Zugna, Lorenzo Richiardi, Andreas Pettersson, Olof Akre, Francesca Frexia

    Published 2025-08-01
    “…In this work we present the CRS4 Digital Pathology Platform (CDPP), an open-source system for research studies that manages WSI collections and focuses on high-quality, structured annotations, gathered according to well-defined protocols. …”
    Get full text
    Article
  5. 5
  6. 6

    Protocol for open-source automated universal high-content multiplex fluorescence for RNA in situ analysis by Jean Descarpentrie, Florian Bernard, Wilfried Souleyreau, Lucie Brisson, Thomas Mathivet, Ioannis S. Pateras, Océane C.B. Martin, Maria Lopez Chiloeches, Teresa Frisan

    Published 2024-12-01
    “…Summary: In situ hybridization visualizes RNA in cells, but image analysis is complex. We present a protocol based on open-source software for automated high-content multiplex fluorescence in situ transcriptomics analysis. …”
    Get full text
    Article
  7. 7

    Automation for lateral flow rapid tests: Protocol for an open-source fluid handler and applications to dengue and African swine fever tests. by Rohan Laurent, Benjamin Hinnant, Michael D Talbott, Kenneth Kim

    Published 2024-01-01
    “…Here we review dengue virus and African swine fever virus rapid tests, and present a novel protocol that employs an open-source fluid handler to automate the execution of up to 42 RTs per run. …”
    Get full text
    Article
  8. 8

    PCR-based detection of pathogens in improved water sources: a scoping review protocol of the evidence in low-income and middle-income countries by Yonatal Mesfin Tefera, Negasa Eshete Soboksa, Sirak Robele Gari, Shibabaw Tadesse Gemeda, Adey Feleke Desta

    Published 2022-05-01
    “…A grey literature search will be conducted in Google and ProQuest.Ethics and dissemination The College of Natural and Computational Science Institution Review Board of Addis Ababa University gave formal ethical approval to this study protocol. The findings of this study will be disseminated to the concerned body through peer-reviewed publications, presentations and summaries.…”
    Get full text
    Article
  9. 9

    Utility of respiratory viral testing in the risk stratification of young febrile infants presenting to emergency care settings: a protocol for systematic review and meta-analysis by Thomas Waterfield, Hannah Mitchell, Etimbuk Umana, Jordan Evans, Lisa McFetridge, Clare Mills, Hannah Norman-Bruce, Jennie Roe

    Published 2024-10-01
    “…We will follow the Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines to disseminate the study results through publication and conference presentations.PROSPERO registration number This protocol is registered in PROSPERO—ID number: CRD42023433716.…”
    Get full text
    Article
  10. 10

    Secret Key Rates and Optimization of BB84 and Decoy State Protocols Over Time-Varying Free-Space Optical Channels by Xiaole Sun, Ivan B. Djordjevic, Mark A. Neifeld

    Published 2016-01-01
    “…We first optimize BB84 and decoy state-based QKD protocols for different channel transmittances. We then present our adaptation method, to overcome scintillation effects, of changing the source intensity based on channel state predictions from a linear autoregressive model while ensuring the security against the eavesdropper. …”
    Get full text
    Article
  11. 11

    IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions by ZHENG Yonghui, ZHAO Dongliang, GU Chunxiang, ZHANG Xieli

    Published 2024-08-01
    “…Given the complex protocol logic, security vulnerabilities in the implementation of the IKE protocol are inevitably present. …”
    Get full text
    Article
  12. 12

    Undiagnosed Systemic Lupus Erythematosus Presenting as Hemophagocytic Lymphohistiocytosis by Ahmad K. Rahal, Justin Fernandez, Christopher Dakhil

    Published 2015-01-01
    “…Hemophagocytosis was present on bone marrow biopsy. All workup for a source of infection was negative. …”
    Get full text
    Article
  13. 13

    A Tertiary Study on Open-Source Software Research by Saima Imtiaz, Salma Imtiaz, Ahmad Almadhor, Rastislav Kulhanek

    Published 2024-01-01
    “…Open-source software (OSS) development has become prominent in the software industry over the last 20 years. …”
    Get full text
    Article
  14. 14
  15. 15

    A protocol for organoids from the gynecomastia patients by Fangjian Shang, Zihao Li, Ji Feng, Qi Wang, Mengyang An, Zengren Zhao, Bo Liu

    Published 2025-08-01
    “…Notably, ERα protein levels were reduced in organoids, while ESR1 mRNA expression remained stable, suggesting post-transcriptional regulation related to culture conditions.ConclusionOur study presents a practical and reproducible protocol for generating gynecomastia-derived organoids and highlights their utility as a disease-relevant platform for future research in male breast pathology and hormone-related mechanisms.…”
    Get full text
    Article
  16. 16

    Ephemeral Node Identifiers for Enhanced Flow Privacy by Gregor Tamati Haywood, Saleem Noel Bhatti

    Published 2025-04-01
    “…The Internet Protocol (IP) uses numerical address values carried in IP packets at the network layer to allow correct forwarding of packets between source and destination. …”
    Get full text
    Article
  17. 17

    Dioxazolones as electrophilic amide sources in copper-catalyzed and -mediated transformations by Seungmin Lee, Minsuk Kim, Hyewon Han, Jongwoo Son

    Published 2025-01-01
    “…Over the past decade, dioxazolones have been widely used as N-acylamide sources in amidation processes of challenging substrates, typically employing precious transition metals. …”
    Get full text
    Article
  18. 18

    Open-Source FPGA Implementation of an I3C Controller by Jorge André Gastmaier Marques, Sergiu Arpadi, Maximiliam Luppe

    Published 2025-01-01
    “…Only a few processing systems contain I3C Controllers, each with its own partial implementation of the specification, and there are no open-source controller cores. Thus, this work presents an open-source I3C Controller HDL framework that operates at the maximum specified SDR frequency and is compatible with the Linux kernel. …”
    Get full text
    Article
  19. 19
  20. 20

    Transition into distance education: A scoping review protocol. by Roxana Schweighart, Michael Hast, Caroline Trautwein

    Published 2024-01-01
    “…The findings derived from the scoping review will provide conceptual clarification, summarize the given theoretical and empirical knowledge in the field and offer practical implications for designing the initial phase in distance education. This article presents the a-priori study protocol that provides a detailed outline of the planned methodology for conducting the Scoping Review.…”
    Get full text
    Article