Results 91 to 100 of about 695,630 (383)

Bioengineered Pancreatic Cancer Immunosuppressive Microenvironment Models for Screening Immunotherapies

open access: yesAdvanced Healthcare Materials, EarlyView.
Bioengineering tumor‐stroma pancreatic cancer models with potential to emulate the native immunosuppressive tumor microenvironment. Cancer‐on‐a‐bead models exhibited higher relevance for screening immunotherapies and modulating the protumoral PDAC microenvironment. ABSTRACT Pancreatic cancer is notably resistant to treatment, primarily due to its dense
Maria V. Monteiro   +4 more
wiley   +1 more source

An anonymity layer for JXTA service [PDF]

open access: yes, 2011
Open Access ...
Arnedo Moreno, Joan   +1 more
core  

A Sacrificial 3D Printed Vessel‐on‐Chip Demonstrates a Versatile Approach to Model Granulation Tissue

open access: yesAdvanced Healthcare Materials, EarlyView.
A novel method that combines 3D printing and organ‐on‐chip technology enables the creation of hollow channels lined with endothelial cells through a fibroblast‐populated connective tissue matrix. The model supports stable metabolic culture conditions, angiogenic sprouting, and immune cell migration, thereby demonstrating an easy and versatile method to
Jonas Jäger   +7 more
wiley   +1 more source

Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

open access: yesApplied Sciences, 2016
Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality.
Chun-I Fan, Vincent Shi-Ming Huang
doaj   +1 more source

Information-Sharing Behavior on WeChat Moments: The Role of Anonymity, Familiarity, and Intrinsic Motivation

open access: yesFrontiers in Psychology, 2019
Information-sharing behavior is affected by identity recognition perception. The current study aims to delve into the impact of familiarity and anonymity on information-sharing behavior, and the mediating role of intrinsic motivations on WeChat Moments ...
Xi Chen, M. Sun, Donglian Wu, Xiao Song
semanticscholar   +1 more source

Spherical Skin Model: Stratified Co‐Culture of Fibroblasts and Keratinocytes on Spherical Beads Toward Compound Screening

open access: yesAdvanced Healthcare Materials, EarlyView.
Models of the human skin must combine the relevant biological contents and suitable biomaterials with the correct spatial organization. Performing compound screening on such in vitro models also requires fast and reproducible production methods of the models.
Elisa Lenzi   +7 more
wiley   +1 more source

Cloud security and authentication vulnerabilities in SOAP protocol: addressing XML-based attacks

open access: yesFrontiers in Computer Science
IntroductionThis research addresses the security weaknesses in SOAP-based web services, with a particular focus on authentication vulnerabilities resulting from XML-based attacks, such as Signature Wrapping or Replay Attacks. With an emphasis on the fact
Mozamel M. Saeed
doaj   +1 more source

Multiphysics‐Driven Assembly of Biomimetic Vesicles

open access: yesAdvanced Materials, EarlyView.
Artificial extracellular vesicles, derived from cell membranes, are manufactured using a multiphysics‐integrated microfluidic platform that combines nanoknife membrane rupture, herringbone chaotic mixing, and acoustothermal modulation. This standardizable workflow enables the predictable control of vesicle formation and therapeutic loading, while ...
Timofei Solodko   +16 more
wiley   +1 more source

Problems of Archiving Oral History Interviews. The Example of the Archive "German Memory"

open access: yesForum: Qualitative Social Research, 2000
The largest collection of oral history interviews in Germany at present is to be found in the archive of the "Institute for History and Biography". Under the name "German Memory" ("Deutsches Gedächtnis"), approximately 1,500 life history interviews with ...
Almut Leh
doaj  

Understanding online anonymity

open access: yesMedia Culture and Society, 2019
Whenever we navigate the Web, we leave a trace through our IP address, which can in turn be used to establish our identity – for instance, by cross-checking it with a user’s Internet subscription.
Thaís Sardá   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy