Results 121 to 130 of about 4,221,254 (369)

On the Effectiveness of Automatic Code Generation for Synthetic Dataset Creation

open access: yesIEEE Access
This paper compares synthetic and real-world code datasets for machine learning applications in cybersecurity by examining the relationships between machine code and Low-Level Virtual Machine Intermediate Representation (LLVM IR).
Josh Mitchell   +2 more
doaj   +1 more source

Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity

open access: yesMolecular Oncology, EarlyView.
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung   +17 more
wiley   +1 more source

SSFuzz:State-sensitive Greybox Fuzzing for Network Protocol Services [PDF]

open access: yesJisuanji kexue
The vulnerability of network protocol services,as the interface for personal devices to interact with the Internet,poses a serious threat to users’ privacy and information security.The state-of-the-art network protocol grey-box fuzzy testing tools ...
LIN Jiahan, RAN Meng, PENG Jianshan
doaj   +1 more source

A general model for analysis of linear and hyperbolic enzyme inhibition mechanisms

open access: yesFEBS Open Bio, EarlyView.
We developed a general enzyme kinetic model that integrates these six basic inhibition mechanism onto a single one. From this model, we deduced a general enzyme kinetic equation that through modulation of simple parameters, γ (the relative inhibitor affinity for two binding sites) and β (the reactivity of the enzyme–substrate–inhibitor complex), is ...
Rafael S. Chagas, Sandro R. Marana
wiley   +1 more source

Cat-and-mouse over the French nukes

open access: yesPacific Journalism Review, 1995
French nuclear tests and the controversial draft Pacific logging code of practice drew most of the media coverage at the Madang South Pacific Forum meeting. But logging was almost brushed aside by the host country.
Ekonia Peni
doaj   +1 more source

Control flow graphs and code coverage [PDF]

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2010
Control flow graphs and code coverageThe control flow of programs can be represented by directed graphs. In this paper we provide a uniform and detailed formal basis for control flow graphs combining known definitions and results with new aspects. Two graph reductions are defined using only syntactical information about the graphs, but no semantical ...
openaire   +1 more source

Evolutionary dynamics of the chloroplast genome in Daphne (Thymelaeaceae): comparative analysis with related genera and insights into phylogenetics

open access: yesFEBS Open Bio, EarlyView.
Comparative analysis of chloroplast genomes from 14 genera of Thymelaeaceae revealed variation in gene content, ranging from 128 to 142 genes, primarily influenced by IR expansion/contraction events and pseudogenization of ndhF, ndhI, and ndhG. Two large inversions were detected within the large single‐copy region, including a synapomorphic inversion ...
Abdullah   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy