Results 51 to 60 of about 168,901 (241)

Identifying transcription factors controlling the basal expression of human MRP4 highlights a substantial role for Sp1

open access: yesFEBS Open Bio, EarlyView.
The MRP4 transporter exports several drugs and signaling molecules. Here, we identified key promoter elements regulating basal MRP4 expression. Using reporter assays, we defined a conserved region with essential Sp1 and contributory Ets sites, which controlled basal MRP4 expression.
Debora Singer   +7 more
wiley   +1 more source

Mutant NPM1 in Acute Myeloid Leukemia Initiation and Maintenance

open access: yesAging and Cancer, EarlyView.
NPM1 mutations drive acute myeloid leukemia by acting as neomorphic transcriptional regulators that cooperate with Menin–MLL and XPO1 to sustain HOX/MEIS1 expression and block differentiation. Targeting these mutant‐specific transcriptional dependencies provides a rational therapeutic strategy for NPM1‐mutated AML.
Yanan Jiang   +3 more
wiley   +1 more source

Effective Bug Assortment Using Data Reduction Techniques [PDF]

open access: yes, 2016
Software companies spend over 48% of their total cost to fix the bugs. An effective way to automatically fix the bugs to the correct developer is called Bug Triage or Bug Assortment.
Jain, S. (Swati), Wilson, S. R. (Swapna)
core  

Long‐Term Follow‐Up of Chemotherapy‐Associated Biological Aging in Women With Early Breast Cancer

open access: yesAging and Cancer, EarlyView.
Women threated with adjuvant chemotherapy for early breast cancer have sustained long‐term increase in p16INK4a,, a robust marker of cell senescence, suggesting a chemotherapy‐associated age acceleration. p16INK4a as well as other biomarkers may identify patients at greatest risk for senescence‐related diseases of aging.
Hyman B. Muss   +12 more
wiley   +1 more source

Effective Bug Triage based on Historical Bug-Fix Information [PDF]

open access: yes, 2014
International audienceFor complex and popular software, project teams could receive a large number of bug reports. It is often tedious and costly to manually assign these bug reports to developers who have the expertise to fix the bugs.
Hu, Hao   +3 more
core   +2 more sources

Functional Connectivity Linked to Cognitive Recovery After Minor Stroke

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Patients with minor stroke exhibit slowed processing speed and generalized alterations in functional connectivity involving frontoparietal cortex (FPC). The pattern of connectivity evolves over time. In this study, we examine the relationship of functional connectivity patterns to cognitive performance, to determine ...
Vrishab Commuri   +7 more
wiley   +1 more source

Rediscovery Datasets: Connecting Duplicate Reports

open access: yes, 2017
The same defect can be rediscovered by multiple clients, causing unplanned outages and leading to reduced customer satisfaction. In the case of popular open source software, high volume of defects is reported on a regular basis.
Bener, Ayse Basar   +2 more
core   +1 more source

Discovery and Targeted Proteomic Studies Reveal Striatal Markers Validated for Huntington's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Clinical trials for Huntington's disease (HD) enrolling persons before clinical motor diagnosis (CMD) lack validated biomarkers. This study aimed to conduct an unbiased discovery analysis and a targeted examination of proteomic biomarkers scrutinized by clinical validation. Methods Cerebrospinal fluid was obtained from PREDICT‐HD and
Daniel Chelsky   +8 more
wiley   +1 more source

Feature Learning via Correlation Analysis for Effective Duplicate Detection

open access: yesApplied Sciences
With the growing reliance on software, the frequency of software bugs has increased significantly. To address these issues, users or developers typically submit bug reports, which developers analyze and resolve.
Geunseok Yang, Jinfeng Ji, Taemin Kim
doaj   +1 more source

Predicting the Effectiveness of Blockchain Bug Bounty Programs

open access: yesProceedings of the International Florida Artificial Intelligence Research Society Conference, 2023
Bug bounty programs have proven to be an effective means for organizations to incentivize ethical hackers to report security vulnerabilities in their software.
Ed Marcavage, Jake Mason, Chen Zhong
doaj   +1 more source

Home - About - Disclaimer - Privacy