31 research outputs found

    Sexto reporte de eventos adversos con tratamientos biol贸gicos en Argentina. Informe del registro BIOBADASAR

    Get PDF
    Objetivo: actualizar los resultados del registro BIOBADASAR sobre seguridad, duraci贸n y causas de interrupci贸n del tratamiento luego de 8 a帽os de seguimiento. M茅todos: BIOBADASAR es un registro de seguridad de terapias biol贸gicas establecido por la Sociedad Argentina de Reumatolog铆a. Se presenta la descripci贸n de BIOBADASAR 3.0, una cohorte compuesta por 53 centros de Argentina seguidos prospectivamente desde agosto de 2010 hasta enero de 2018

    Construction of optimal order nonlinear solvers using inverse interpolation

    Get PDF
    Applied Mathematics and Computation, 217, (2010), 2448-2455.The article of record as published may be located at http://dx.doi.org/10.1016/j.amc.2010.07.045There is a vast literature on finding simple roots of nonlinear equations by iterative meth- ods. These methods can be classified by order, by the information used or by efficiency. There are very few optimal methods, that is methods of order 2m requiring m + 1 function evaluations per iteration. Here we give a general way to construct such methods by using inverse interpolation and any optimal two-point method. The presented optimal multi- point methods are tested on numerical examples and compared to existing methods of the same order of convergence

    Error estimates of interpolation and numerical integration using circular complex functions

    No full text
    SIGLETIB: in RN 6361 (1985,3) / FIZ - Fachinformationszzentrum Karlsruhe / TIB - Technische InformationsbibliothekDEGerman

    On an open problem Inclusion isotonicity of Taylor's circular form of a polynomial

    No full text
    TIB: in RN 6361 (1985,9) / FIZ - Fachinformationszzentrum Karlsruhe / TIB - Technische InformationsbibliothekSIGLEDEGerman

    Properties of interval operators. Interval risk analysis of real estate investment: A non-Monte Carlo approach. Error estimates of interpolation and numerical integration using circular complex functions. On the simultaneous method of the second order for finding polynomial complex zeros in circular arithmetic

    No full text
    Krawczyk, R.: Properties of interval operators. Moore, A.S.: Interval risk analysis of real estate investment: A non-Monte Carlo approach. Petkovic, L.D.; Petkovic, M.S.: Error estimates of interpolation and numerical integration using circular complex functions. Petkovic, M.S.; Stefanovic, L.V.: On the simultaneous method of second order for finding polynomial complex zeros in circular arithmeticSIGLECopy held by FIZ Karlsruhe; available from UB/TIB Hannover / FIZ - Fachinformationszzentrum Karlsruhe / TIB - Technische InformationsbibliothekDEGerman

    A representation of random variables by the probable intervals

    No full text
    SIGLETechnische Informationsbibliothek Hannover: in RN 6361 (1980,10) / FIZ - Fachinformationszzentrum Karlsruhe / TIB - Technische InformationsbibliothekDEGerman

    On the simultaneous method of the second order for finding polynomial complex zeros in circular arithmetric

    No full text
    SIGLETIB: in RN 6361 (1985,3) / FIZ - Fachinformationszzentrum Karlsruhe / TIB - Technische InformationsbibliothekDEGerman

    An encryption scheme for a secure policy updating

    No full text
    Ciphertext policy attribute based encryption is an encryption technique where the data is encrypted according to an access policy over attributes. Users who have a secret key associated with a set of attributes which satisfy the access policy can decrypt the encrypted data. However, one of the drawbacks of the CP-ABE is that it does not support updating access control policies without decrypting the encrypted data.We present a new variant of the CP-ABE scheme called ciphertext policy attribute based proxy re-encryption (CP-ABPRE). The proposed scheme allows to update the access control policy of the encrypted data without decrypting the ciphertext. The scheme uses a semitrusted entity called proxy to re-encrypt the encrypted data according to a new access control policy such that only users who satisfy the new policy can decrypt the data. The construction of our scheme is based on prime order bilinear groups. We give a formal definition for semantic security and provide a security proof in the generic group model
    corecore