Results 81 to 90 of about 5,009,966 (344)

Competing Sudakov Veto Algorithms [PDF]

open access: yes, 2016
We present a way to analyze the distribution produced by a Monte Carlo algorithm. We perform these analyses on several versions of the Sudakov veto algorithm, adding a cutoff, a second variable and competition between emission channels.
Kleiss, Ronald, Verheyen, Rob
core   +3 more sources

A large‐scale retrospective study in metastatic breast cancer patients using circulating tumour DNA and machine learning to predict treatment outcome and progression‐free survival

open access: yesMolecular Oncology, EarlyView.
There is an unmet need in metastatic breast cancer patients to monitor therapy response in real time. In this study, we show how a noninvasive and affordable strategy based on sequencing of plasma samples with longitudinal tracking of tumour fraction paired with a statistical model provides valuable information on treatment response in advance of the ...
Emma J. Beddowes   +20 more
wiley   +1 more source

Multidimensional OMICs reveal ARID1A orchestrated control of DNA damage, splicing, and cell cycle in normal‐like and malignant urothelial cells

open access: yesMolecular Oncology, EarlyView.
Loss of the frequently mutated chromatin remodeler ARID1A, a subunit of the SWI/SNF cBAF complex, results in less open chromatin, alternative splicing, and the failure to stop cells from progressing through the cell cycle after DNA damage in bladder (cancer) cells. Created in BioRender. Epigenetic regulators, such as the SWI/SNF complex, with important
Rebecca M. Schlösser   +11 more
wiley   +1 more source

Algorithmic polynomials [PDF]

open access: yesProceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018
The approximate degree of a Boolean function $f(x_{1},x_{2},\ldots,x_{n})$ is the minimum degree of a real polynomial that approximates $f$ pointwise within $1/3$. Upper bounds on approximate degree have a variety of applications in learning theory, differential privacy, and algorithm design in general.
openaire   +4 more sources

Targeting the AKT/mTOR pathway attenuates the metastatic potential of colorectal carcinoma circulating tumor cells in a murine xenotransplantation model

open access: yesMolecular Oncology, EarlyView.
Dual targeting of AKT and mTOR using MK2206 and RAD001 reduces tumor burden in an intracardiac colon cancer circulating tumor cell xenotransplantation model. Analysis of AKT isoform‐specific knockdowns in CTC‐MCC‐41 reveals differentially regulated proteins and phospho‐proteins by liquid chromatography coupled mass spectrometry. Circulating tumor cells
Daniel J. Smit   +19 more
wiley   +1 more source

Algorithms, Algorithms, Algorithms [PDF]

open access: yesComputer, 2020
James Bret Michael, Jeffrey Voas
openaire   +2 more sources

Beware the algorithm

open access: yeseLife, 2021
Spliced peptides present on tumor cells can help to mount an immune response, but algorithms offer limited help in predicting which ones actually exist and perform this role in vivo.
openaire   +4 more sources

Algorithms with Predictions

open access: yesCommunications of the ACM, 2020
Seeking a new approach that goes beyond worst-case analysis.
Michael Mitzenmacher   +1 more
openaire   +3 more sources

Phylogenetic inference's algorithms [PDF]

open access: yes, 2016
Phylogenetic inference consist in the search of an evolutionary tree to explain the best way possible genealogical relationships of a set of species.
Fernández Rovira, Alicia   +1 more
core  

Time, the final frontier

open access: yesMolecular Oncology, EarlyView.
This article advocates integrating temporal dynamics into cancer research. Rather than relying on static snapshots, researchers should increasingly consider adopting dynamic methods—such as live imaging, temporal omics, and liquid biopsies—to track how tumors evolve over time.
Gautier Follain   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy