Learn More
We introduce algebraic geometric techniques in secret sharing and in secure multi-party computation (MPC) in particular. The main result is a linear secret sharing scheme (LSSS) de ned over a nite eld Fq, with the following properties. 1. It is ideal. The number of players n can be as large as #C(Fq), where C is an algebraic curve C of genus g de ned over(More)
Many significant engineering and scientific problems involve optimization of some criteria over a combinatorial configuration space. The two methods most often used to solve these problems effectively—simulated annealing (SA) and genetic algorithms (GA)—do not easily lend themselves to massive parallel implementations. Simulated annealing is a naturally(More)
Halophytes are plants that can naturally tolerate high concentrations of salt in the soil, and their tolerance to salt stress may occur through various evolutionary and molecular mechanisms. Eutrema salsugineum is a halophytic species in the Brassicaceae that can naturally tolerate multiple types of abiotic stresses that typically limit crop productivity,(More)
BACKGROUND Endogenous microRNAs (miRNAs) are potent negative regulators of gene expression in plants and animals. Artificial miRNAs (amiRNAs)-designed to target one or several genes of interest-provide a new and highly specific approach for effective post-transcriptional gene silencing (PTGS) in plants. METHODOLOGY We devised an amiRNA-based strategy for(More)
Bladder cancer is one of the most common cancers worldwide, with transitional cell carcinoma (TCC) being the predominant form. Here we report a genomic analysis of TCC by both whole-genome and whole-exome sequencing of 99 individuals with TCC. Beyond confirming recurrent mutations in genes previously identified as being mutated in TCC, we identified(More)
Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure computation is that security is maintained even in the presence of an adversary who corrupts a quorum of the processors and who exercises full, malicious control over them. One of the(More)
Chromosomal gains and losses comprise an important type of genetic change in tumors, and can now be assayed using microarray hybridization-based experiments. Most current statistical models for DNA copy number estimate total copy number, which do not distinguish between the underlying quantities of the two inherited chromosomes. This latter information,(More)
It is known that quantum error correction can be achieved using classical binary codes or additive codes over (see [2], [3], [9]). In [1] and [4], asymptotically good quantum codes from algebraic-geometry codes were constructed and, in [1], a bound on ( ) was computed from the Tsfasman–Vlăduţ–Zink bound of the theory of classical algebraic-geometry codes.(More)
Despite progress in the diagnostics and treatment of hepatocellular carcinoma (HCC), its prognosis remains poor. In this study, we globally assessed long noncoding RNAs (lncRNA) for contributions to HCC using publicly available microarray data, in vitro and in vivo assays. Here, we report that ZFAS1, encoding a lncRNA that is frequently amplified in HCC, is(More)
AIM To conduct a meta-analysis comparing laparoscopic (LGD2) and open D2 gastrectomies (OGD2) for the treatment of advanced gastric cancer (AGC). METHODS Randomized controlled trials (RCTs) and non-RCTs comparing LGD2 with OGD2 for AGC treatment, published between 1 January 2000 and 12 January 2013, were identified in the PubMed, Embase, and Cochrane(More)