نتایج جستجو برای: abe

تعداد نتایج: 1907  

Journal: :Blood 2011
Anton Matafonov Suryakala Sarilla Mao-fu Sun John P Sheehan Vladimir Serebrov Ingrid M Verhamme David Gailani

The prothrombinase complex converts prothrombin to α-thrombin through the intermediate meizothrombin (Mz-IIa). Both α-thrombin and Mz-IIa catalyze factor (F) XI activation to FXIa, which sustains α-thrombin production through activation of FIX. The interaction with FXI is thought to involve thrombin anion binding exosite (ABE) I. α-Thrombin can undergo additional proteolysis to β-thrombin and γ...

2013
Mingwu Zhang Wei Shi Chunzhi Wang Zhenhua Chen Yi Mu

Traditionally, in attribute-based encryption (ABE), an access structure is constructed from a linear secret sharing scheme (LSSS), a boolean formula or an access tree. In this work, we encode the access structure as their minimal sets, which is equivalent to the existence of a smallest monotonic span program for the characteristic function of the same access structure. We present two leakage-re...

Journal: :The Journal of experimental biology 2000
D A Scholnick T T Gleeson

During recovery from even a brief period of exercise, metabolic rate remains elevated above resting levels for extended periods. The intensity and duration of exercise as well as body temperature and hormone levels can influence this excess post-exercise oxygen consumption (EPOC). We examined the influence of activity before exercise (ABE), commonly termed warm-up in endotherms, on EPOC in the ...

Journal: :Journal of Systems and Software 2009
Yan-Fu Li Min Xie Thong Ngee Goh

0164-1212/$ see front matter 2008 Elsevier Inc. A doi:10.1016/j.jss.2008.06.001 * Corresponding author. Tel.: +65 83442816. E-mail address: [email protected] (Y.F. Li). A number of software cost estimation methods have been presented in literature over the past decades. Analogy based estimation (ABE), which is essentially a case based reasoning (CBR) approach, is one of the most popular techni...

Journal: :IACR Cryptology ePrint Archive 2018
Jie Chen Junqing Gong Lucas Kowalczyk Hoeteck Wee

We present simpler and improved constructions of unbounded attribute-based encryption (ABE) schemeswith constant-size public parameters under static assumptions in bilinear groups. Concretely, we obtain: – a simple and adaptively secure unbounded ABE scheme in composite-order groups, improving upon a previousconstruction of Lewko and Waters (Eurocrypt ’11) which only achieves selective ...

2014
Victor Ujor Ashok Kumar Bharathidasan Katrina Cornish Thaddeus Chukwuemeka Ezeji

Readily available inexpensive substrate with high product yield is the key to restoring acetone-butanol-ethanol (ABE) fermentation to economic competitiveness. Lactose-replete cheese whey tends to favor the production of butanol over acetone. In the current study, we investigated the fermentability of milk dust powder with high lactose content, for ABE production by Clostridium acetobutylicum a...

2015
Hannu Pulakka Ville Myllylä Anssi Rämö Paavo Alku

Artificial bandwidth extension (ABE) methods have been developed to enhance the quality and intelligibility of bandlimited speech transmitted over a telephone connection. Subjective listening tests are the most reliable way of evaluating the quality of ABE, but listening tests are time-consuming and expensive to arrange. Instrumental measures have also been used to estimate the subjective quali...

Journal: :Inf. Sci. 2014
Hua Deng Qianhong Wu Bo Qin Josep Domingo-Ferrer Lei Zhang Jianwei Liu Wenchang Shi

Attribute-based encryption (ABE) systems allow encrypting to uncertain receivers by means of an access policy specifying the attributes that the intended receivers should possess. ABE promises to deliver fine-grained access control of encrypted data. However, when data are encrypted using an ABE scheme, key management is difficult if there is a large number of users from various backgrounds. In...

Journal: :Ceskoslovenska patologie 2005
M Zámecník A Skrivánek

A case of adenoid basal epithelioma (ABE) of the uterine cervix in 21-year-old woman is reported. The patient's age appears to be lowest among cases of ABE reported to date. The tumor showed typical histologic features of ABE and was associated with CIN3. In addition, rare tumor cells had surface cilia-appearing structures suggesting tubal differentiation. Immunohistochemically, the tumor was r...

2010
Achim D. Brucker Helmut Petritsch Stefan G. Weber

Attribute-based Encryption (ABE) allows for implementing fine-grained decentralized access control based on properties or attributes a user has. Thus, there is no need for writing detailed, user-based policies in advance. This makes ABE in particular interesting for implementing security mechanisms in dynamic environments such as ubiquitous computing, disaster management, or health-care. For su...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید