Results 101 to 110 of about 597,262 (308)
The LEXOVE prospective study evaluated plasma cell‐free extracellular vesicle (cfEV) dynamics using Bradford assay and dynamic light scattering in metastatic non‐small cell lung cancer patients undergoing first‐line treatments, correlating a ∆cfEV < 20% with improved median progression‐free survival in responders versus non‐responders.
Valerio Gristina+17 more
wiley +1 more source
Mining Domain Models in Ethereum DApps using Code Cloning [PDF]
This research study explores the use of near-miss clone detection to support the characterization of domain models of smart contracts for each of the popular domains in which smart contracts are being rapidly adopted. In this paper, we leverage the code clone detection techniques to detect similarities in functions of the smart contracts deployed onto ...
arxiv
Representation, Analysis, and Refactoring Techniques to Support Code Clone Maintenance [PDF]
The existence of code cloning, which represents identical or near identical sections of code, has been documented to occur frequently in software systems.
Tairas, Robert Ambrosius
core +1 more source
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić+31 more
wiley +1 more source
Detecting Java Code Clones Based on Bytecode Sequence Alignment
When the source code is copied and pasted or modified, there will be a lot of identical or similar code snippets in the software system, which are called code clones.
Dongjin Yu+3 more
doaj +1 more source
The authors applied joint/mixed models that predict mortality of trifluridine/tipiracil‐treated metastatic colorectal cancer patients based on circulating tumor DNA (ctDNA) trajectories. Patients at high risk of death could be spared aggressive therapy with the prospect of a higher quality of life in their remaining lifetime, whereas patients with a ...
Matthias Unseld+7 more
wiley +1 more source
Comparing Assembler Procedures by Analyzing Sequences of Opcodes
Static analysis of executables for the purpose of comparing them can be made more difficult if the binaries are created using different compilers. In order to compensate for the noise introduced by the compilers, the arguments of the instructions are ...
N. Pejić+2 more
doaj +1 more source
Code Clone Detection, which aims to retrieve functionally similar programs from large code bases, has been attracting increasing attention. Modern software often involves a diverse range of programming languages.
Du, Yangkai+4 more
core
Tumor microenvironment drives cancer formation and progression. We analyzed the role of human cancer‐associated adipocytes from patients with renal cell carcinoma (RCC) stratified as lean, overweight, or obese. RNA‐seq demonstrated that, among the most altered genes involved in the tumor–stroma crosstalk, are ADAM12 and CYP1B1, which were proven to be ...
Sepehr Torabinejad+13 more
wiley +1 more source
The Survey of the Code Clone Detection Techniques and Process with Types (I, II, III and IV) [PDF]
In software upgradation code clones are regularly utilized. So, we can contemplate on code location strategies goes past introductory code. In condition of-craftsmanship on clone programming study, we perceived the absence of methodical overview.
, Gundeep Kaur, Er. Sumit Sharma
core +1 more source