Results 141 to 150 of about 597,262 (308)

Cloneless: Code Clone Detection via Program Dependence Graphs with Relaxed Constraints [PDF]

open access: yes, 2019
Code clones are pieces of code that have the same functionality. While some clones may structurally match one another, others may look drastically different.
Simko, Thomas J
core   +1 more source

Multidimensional OMICs reveal ARID1A orchestrated control of DNA damage, splicing, and cell cycle in normal‐like and malignant urothelial cells

open access: yesMolecular Oncology, EarlyView.
Loss of the frequently mutated chromatin remodeler ARID1A, a subunit of the SWI/SNF cBAF complex, results in less open chromatin, alternative splicing, and the failure to stop cells from progressing through the cell cycle after DNA damage in bladder (cancer) cells. Created in BioRender. Epigenetic regulators, such as the SWI/SNF complex, with important
Rebecca M. Schlösser   +11 more
wiley   +1 more source

An Improvement Method for Program Structure Using Code Clone Detection, Impact Analysis, and Refactoring Formats

open access: yesSICE Journal of Control, Measurement, and System Integration, 2017
This paper proposes a method that aggregates similar portions (code clones) in the developed program and redesigns the current program structure to an adequate program structure.
Masakazu Takahashi   +3 more
doaj   +1 more source

Germline variants in CDKN2A wild‐type melanoma prone families

open access: yesMolecular Oncology, EarlyView.
Among melanoma‐prone families, wild‐type for CDKN2A and CDK4, some have pathogenic variants in genes not usually linked to melanoma. Furthermore, rare XP‐related variants and variants in MC1R are enriched in such families. Germline pathogenic variants in CDKN2A are well established as an underlying cause of familial malignant melanoma. While pathogenic
Gjertrud T. Iversen   +5 more
wiley   +1 more source

The relationship of software quality characteristics to code clones [PDF]

open access: yes, 2013
Duplicate or similar fragments of code are referred to as code clones and are normally created by copying and pasting. Such duplication allows code to be reused; however, these copied code fragments can cause severe problems for software maintainers ...
Beard, Matthew D.
core   +1 more source

Escape from TGF‐β‐induced senescence promotes aggressive hallmarks in epithelial hepatocellular carcinoma cells

open access: yesMolecular Oncology, EarlyView.
Chronic TGF‐β exposure drives epithelial HCC cells from a senescent state to a TGF‐β resistant mesenchymal phenotype. This transition is characterized by the loss of Smad3‐mediated signaling, escape from senescence, enhanced invasiveness and metastatic potential, and upregulation of key resistance modulators such as MARK1 and GRM8, ultimately promoting
Minenur Kalyoncu   +11 more
wiley   +1 more source

ShcD adaptor protein drives invasion of triple negative breast cancer cells by aberrant activation of EGFR signaling

open access: yesMolecular Oncology, EarlyView.
We identified adaptor protein ShcD as upregulated in triple‐negative breast cancer and found its expression to be correlated with reduced patient survival and increased invasion in cell models. Using a proteomic screen, we identified novel ShcD binding partners involved in EGFR signaling pathways.
Hayley R. Lau   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy