Results 61 to 70 of about 26,866 (284)
Soybean Auxin Transporter PIN3 Regulates Nitrate Acquisition to Improve Nitrogen Use and Seed Traits
Xu et al. discovers that switching off auxin transporters in soybean, PIN3a and PIN3b, disrupts auxin flow; this triggers ARF‐STF3/4 signal cascade to activate the nitrate importer NPF2.13 and soil nitrogen acquisition. Multi‐year field trials show edited soybeans maintain yield with higher oil content, offering a potential genetic route to improve ...
Huifang Xu +16 more
wiley +1 more source
There are various types of Android apps, such as entertainment apps, health and fitness apps, travel apps, educational apps, business apps, and so on. Android apps can contain business logic, maintain sensitive personal information, and act as a bridge ...
Byoungchul Kim +3 more
doaj +1 more source
Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore +20 more
wiley +1 more source
Multi‐View Biomedical Foundation Models for Molecule‐Target and Property Prediction
Molecular foundation models can provide accurate predictions for a large set of downstream tasks. We develop MMELON, an approach that integrates pre‐trained graph, image, and text foundation models and validate our multi‐view model on over 120 tasks, including GPCR binding.
Parthasarathy Suryanarayanan +17 more
wiley +1 more source
Sphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation [PDF]
Sphinx, a hardware-software co-design architecture for binary code and runtime obfuscation. The Sphinx architecture uses binary code diversification and self-reconfigurable processing elements to maintain application functionality while obfuscating the ...
Ehret, Alan +3 more
core +1 more source
Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity
To protect programs from unauthorized analysis, virtualize the code based on Virtual Machine (VM) technologies is emerging as a feasible method for accomplishing code obfuscation.
Wei Wang +9 more
doaj +1 more source
Vectorization, Obfuscation and P4 LLVM Tool-chain [PDF]
This thesis broadly focuses on three different areas: Loop Vectorization, Code Obfuscation, and P4LLVM compiler. The work in Loop vectorization starts with a comparison of Auto-vectorization of GCC, ICC and LLVM compilers and show their strengths and ...
Kumar, Dangeti Tharun +1 more
core
Stress‐Induced Melting Controlled Failure Mechanisms of Methane Hydrate
We study methane hydrate via nanoindentation and nuclear magnetic resonance (NMR), finding its regional melting and mechanical properties, challenging existing views on hydrogen‐bonded crystals. Abstract Methane hydrate, a kind of nonstoichiometric crystalline, attracted worldwide attentions as a promising substitute energy. Its Dissociation is thought
Yanlong Li +9 more
wiley +1 more source
ABSTRACT The Cordillera Administrative Region in the Philippines is home to terraced rice embedded in centuries of cultural heritage. However, weak market incentives threaten sustained production, jeopardizing indigenous communities' cultural heritage and the in situ biodiversity of rice genetic resources.
Kofi Britwum, Matty Demont
wiley +1 more source
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin +4 more
doaj +1 more source

