نتایج جستجو برای: sensitive synthetic schemes side

تعداد نتایج: 715793  

2017
Jac A. Nickoloff

Targeted cancer therapies have excellent potential for increasing longterm patient survival while minimizing shortand long-term side effects of therapy including neurological problems and secondary cancers. DNA repair systems suppress genome instability that drives the acquisition of tumorigenic mutations. Most cancer therapeutics cause DNA damage, yet despite having DNA repair defects, tumors ...

Journal: :international journal of smart electrical engineering 2013
mohammad-hossein shariatkhah mahmoud-reza haghifam mohammad-kazem sheikh-el-eslami

real-time pricing schemes make the customers to feel the energy price volatility and improve their load profiles. however, these schemes have no significant effect on demand-side uncertainty reduction. in this paper, considering smart grid infrastructures and smart building energy management system (ems), a new real-time pricing scheme is presented to reduce the uncertainty of demand-side. in t...

2007
Neil A. Dodgson Malcolm A. Sabin Richard Southern

Our objective is to create subdivision schemes with limit surfaces which are surfaces useful in engineering (spheres, cylinders, cones etc.) without resorting to special cases. The basic idea explored by Sabin et al. [1] in the curve case is that if the property that all vertices lie on an object of the required class can be preserved through the subdivision refinement, it will be preserved int...

Journal: :CoRR 2015
Chong Huang Lalitha Sankar Anand D. Sarwate

Businesses (retailers) often wish to offer personalized advertisements (coupons) to individuals (consumers), but run the risk of strong reactions from consumers who want a customized shopping experience but feel their privacy has been violated. Existing models for privacy such as differential privacy or information theory try to quantify privacy risk but do not capture the subjective experience...

2015
Chong Huang Lalitha Sankar Anand D. Sarwate

Businesses (retailers) often wish to offer personalized advertisements (coupons) to individuals (consumers), but run the risk of strong reactions from consumers who want a customized shopping experience but feel their privacy has been violated. Existing models for privacy such as differential privacy or information theory try to quantify privacy risk but do not capture the subjective experience...

Journal: :Journal of virology 2003
Dean H Hamer Sven Bocklandt Louise McHugh Tae-Wook Chun Peter M Blumberg Dina M Sigano Victor E Marquez

Drugs that induce human immunodeficiency virus type 1 (HIV-1) replication could be used in combination with highly active antiretroviral therapy (HAART) to reduce the size of the latent reservoir that is in part responsible for viral persistence. Protein kinase C (PKC) is a logical target for such drugs because it activates HIV-1 transcription through multiple mechanisms. Here we show that HIV-...

Journal: :Des. Codes Cryptography 2013
Alexis Bonnecaze Pierre Liardet Alexandre Venelli

Masking schemes to secure AES implementations against side-channel attacks is a topic of ongoing research. The most sensitive part of the AES is the nonlinear SubBytes operation, in particular, the inversion in GF(2), the Galois field of 2 elements. In hardware implementations, it is well known that the use of the tower of extensions GF(2) ⇢ GF(2) ⇢ GF(2) ⇢ GF(2) leads to a more efficient inver...

Journal: :Proceedings of the ... AAAI Conference on Artificial Intelligence 2023

Time or money? That is a question! In this paper, we consider dilemma in the pricing regime, which try to find optimal scheme for identical items with heterogenous time-sensitive buyers. We characterize revenue-optimal solution and propose an efficient algorithm it Bayesian setting. Our results also demonstrate tight ratio between value of wasted time seller's revenue, as well that two common-u...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید