Results 121 to 130 of about 4,221,254 (369)
On the Effectiveness of Automatic Code Generation for Synthetic Dataset Creation
This paper compares synthetic and real-world code datasets for machine learning applications in cybersecurity by examining the relationships between machine code and Low-Level Virtual Machine Intermediate Representation (LLVM IR).
Josh Mitchell +2 more
doaj +1 more source
Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung +17 more
wiley +1 more source
SSFuzz:State-sensitive Greybox Fuzzing for Network Protocol Services [PDF]
The vulnerability of network protocol services,as the interface for personal devices to interact with the Internet,poses a serious threat to users’ privacy and information security.The state-of-the-art network protocol grey-box fuzzy testing tools ...
LIN Jiahan, RAN Meng, PENG Jianshan
doaj +1 more source
Enhanced Cellular Coverage and Throughput Using Rateless Codes [PDF]
Amogh Rajanna, Martin Haenggi
openalex +1 more source
A general model for analysis of linear and hyperbolic enzyme inhibition mechanisms
We developed a general enzyme kinetic model that integrates these six basic inhibition mechanism onto a single one. From this model, we deduced a general enzyme kinetic equation that through modulation of simple parameters, γ (the relative inhibitor affinity for two binding sites) and β (the reactivity of the enzyme–substrate–inhibitor complex), is ...
Rafael S. Chagas, Sandro R. Marana
wiley +1 more source
Cat-and-mouse over the French nukes
French nuclear tests and the controversial draft Pacific logging code of practice drew most of the media coverage at the Madang South Pacific Forum meeting. But logging was almost brushed aside by the host country.
Ekonia Peni
doaj +1 more source
Control flow graphs and code coverage [PDF]
Control flow graphs and code coverageThe control flow of programs can be represented by directed graphs. In this paper we provide a uniform and detailed formal basis for control flow graphs combining known definitions and results with new aspects. Two graph reductions are defined using only syntactical information about the graphs, but no semantical ...
openaire +1 more source
Comparative analysis of chloroplast genomes from 14 genera of Thymelaeaceae revealed variation in gene content, ranging from 128 to 142 genes, primarily influenced by IR expansion/contraction events and pseudogenization of ndhF, ndhI, and ndhG. Two large inversions were detected within the large single‐copy region, including a synapomorphic inversion ...
Abdullah +8 more
wiley +1 more source

