These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

117 related articles for article (PubMed ID: 38785656)

  • 1. Minimizing Computation and Communication Costs of Two-Sided Secure Distributed Matrix Multiplication under Arbitrary Collusion Pattern.
    Li J; Liu N; Kang W
    Entropy (Basel); 2024 May; 26(5):. PubMed ID: 38785656
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Straggler- and Adversary-Tolerant Secure Distributed Matrix Multiplication Using Polynomial Codes.
    Byrne E; Gnilke OW; Kliewer J
    Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832632
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Hybrid Quantum Protocols for Secure Multiparty Summation and Multiplication.
    Sutradhar K; Om H
    Sci Rep; 2020 Jun; 10(1):9097. PubMed ID: 32499534
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Secure Outsourced Matrix Computation and Application to Neural Networks.
    Jiang X; Kim M; Lauter K; Song Y
    Conf Comput Commun Secur; 2018 Oct; 2018():1209-1222. PubMed ID: 31404438
    [TBL] [Abstract][Full Text] [Related]  

  • 5. An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay.
    Wang X; Huang J; Qi C; Peng Y; Zhang S
    PeerJ Comput Sci; 2023; 9():e1349. PubMed ID: 37346720
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Acceleration of Approximate Matrix Multiplications on GPUs.
    Okuyama T; Röhm A; Mihana T; Naruse M
    Entropy (Basel); 2023 Jul; 25(8):. PubMed ID: 37628160
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Efficient edit distance with duplications and contractions.
    Pinhas T; Zakov S; Tsur D; Ziv-Ukelson M
    Algorithms Mol Biol; 2013 Oct; 8(1):27. PubMed ID: 24168705
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services.
    Yu L; He M; Liang H; Xiong L; Liu Y
    Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772304
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A small microring array that performs large complex-valued matrix-vector multiplication.
    Cheng J; Zhao Y; Zhang W; Zhou H; Huang D; Zhu Q; Guo Y; Xu B; Dong J; Zhang X
    Front Optoelectron; 2022 Apr; 15(1):15. PubMed ID: 36637556
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Optimization of Communication Network Topology in Distributed Control Systems Subject to Prescribed Decay Rate.
    Gaeini N; Moradi Amani A; Jalili M; Yu X
    IEEE Trans Cybern; 2021 Aug; 51(8):4277-4285. PubMed ID: 31329150
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Fingerprint multicast in secure video streaming.
    Zhao HV; Liu KJ
    IEEE Trans Image Process; 2006 Jan; 15(1):12-29. PubMed ID: 16435533
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A two-pronged progress in structured dense matrixvector multiplication.
    De Sa C; Gu A; Puttagunta R; Ré C; Rudra A
    Proc Annu ACM SIAM Symp Discret Algorithms; 2018 Jan; 2018():1060-1079. PubMed ID: 31130802
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Secure anonymous mutual authentication for star two-tier wireless body area networks.
    Ibrahim MH; Kumari S; Das AK; Wazid M; Odelu V
    Comput Methods Programs Biomed; 2016 Oct; 135():37-50. PubMed ID: 27586478
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Communication and Computing Task Allocation for Energy-Efficient Fog Networks.
    Kopras B; Idzikowski F; Bossy B; Kryszkiewicz P; Bogucka H
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679792
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Seriation of asymmetric matrices using integer linear programming.
    Brusco MJ
    Br J Math Stat Psychol; 2001 Nov; 54(Pt 2):367-75. PubMed ID: 11817100
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Network Coding Approaches for Distributed Computation over Lossy Wireless Networks.
    Fan B; Tang B; Qu Z; Ye B
    Entropy (Basel); 2023 Feb; 25(3):. PubMed ID: 36981318
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Distributed Graph Hashing.
    Wang S; Li C; Shen HL
    IEEE Trans Cybern; 2019 May; 49(5):1896-1908. PubMed ID: 29993995
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Commutative law for products of infinitely large isotropic random matrices.
    Burda Z; Livan G; Swiech A
    Phys Rev E Stat Nonlin Soft Matter Phys; 2013 Aug; 88(2):022107. PubMed ID: 24032775
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage.
    Hussien HM; Yasin SM; Udzir NI; Ninggal MIH
    Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918266
    [TBL] [Abstract][Full Text] [Related]  

  • 20. cuSCNN: A Secure and Batch-Processing Framework for Privacy-Preserving Convolutional Neural Network Prediction on GPU.
    Bai Y; Liu Q; Wu W; Feng Y
    Front Comput Neurosci; 2021; 15():799977. PubMed ID: 35002664
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.