Results 111 to 120 of about 695,630 (383)
ITGB1 Regulates Triple‐Negative Breast Cancer Development by Modulating the Tumor Microenvironment
ABSTRACT Tumorigenesis and metastasis are frequently attributed to the intricate interplay between cancer cells and the tumor microenvironment (TME). Comprehending the mechanisms and key regulators of cancer‐immune crosstalk in the TME is imperative for developing efficacious immunotherapy.
Nuozi Song +12 more
wiley +1 more source
Jonathan Schwartz is dealing with the problem of anonymity in anthropological research asking: why is the falsification imperative so important in anthropological “ethics”?
Jonathan M. Schwartz
doaj +1 more source
Q-anonymous social welfare relations on infinite utility streams [PDF]
This paper studies a class of social welfare relations (SWRs) on the set of infinite utility streams. In particular, we examine the SWRs satisfying Q-Anonymity, an impartiality axiom stronger than Finite Anonymity, as well as Strong Pareto and a certain ...
Kamaga, Kohei, Kojima, Takashi
core
Anonymity In Cyberspace: Judicial and Legislative Regulations [PDF]
Historically, the scope of constitutional protections for fundamental rights has evolved to keep pace with new social norms and new technology. Internet speech is on the rise. The First Amendment protects an individual’s right to speak anonymously, but
Qasir, Sophia
core +1 more source
Anonymous Authors, Anonymous Referees [PDF]
J, Moossy, Y R, Moossy
openaire +2 more sources
A large‐scale multiomic dataset (proteomic and metabolomic) comprising 3,060 plasma samples were analyzed to identify proteins, metabolites, pathways, and protein‐associated drugs linked to Alzheimer’s Disease (AD) independently of apolipoprotein E (APOE). AD was associated with a distinct molecular signature that captures.
Fuhai Li +22 more
wiley +1 more source
Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks
Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network.
Javier Portela +4 more
doaj +1 more source
On the leximin and utilitarian overtaking criteria with extended anonymity [PDF]
This paper studies the extensions of the infinte-horizon variants of the leximin principle and utilitarianism on the set of infinite utility streams. We especially examine those extensions which satisfy the axiom of Preference-continuity (or Consistency)
Kamaga, Kohei, Kojima, Takashi
core
Active Force Dynamics in Red Blood Cells Under Non‐Invasive Optical Tweezers
A non‐invasive method combines low‐power optical tweezers with high‐speed microscopy to simultaneously monitor local membrane forces and displacements in single human red blood cells. This dual‐channel approach reveals a mechano‐dynamic signature that correlates the cell's metabolic state with its mechanical activity. This energetic framework serves as
Arnau Dorn +5 more
wiley +1 more source
Security analysis on a kind of group signatures
In 1998, Lee and Chang proposed a group signature scheme based on the discrete logarithm problem.Tseng, Jan and Ao gave respectively new improved scheme based on Lee-Chang scheme.
SI Tao-zhi1 +3 more
doaj

