Results 61 to 70 of about 26,866 (284)

Soybean Auxin Transporter PIN3 Regulates Nitrate Acquisition to Improve Nitrogen Use and Seed Traits

open access: yesAdvanced Science, EarlyView.
Xu et al. discovers that switching off auxin transporters in soybean, PIN3a and PIN3b, disrupts auxin flow; this triggers ARF‐STF3/4 signal cascade to activate the nitrate importer NPF2.13 and soil nitrogen acquisition. Multi‐year field trials show edited soybeans maintain yield with higher oil content, offering a potential genetic route to improve ...
Huifang Xu   +16 more
wiley   +1 more source

RomaDroid: A Robust and Efficient Technique for Detecting Android App Clones Using a Tree Structure and Components of Each App’s Manifest File

open access: yesIEEE Access, 2019
There are various types of Android apps, such as entertainment apps, health and fitness apps, travel apps, educational apps, business apps, and so on. Android apps can contain business logic, maintain sensitive personal information, and act as a bridge ...
Byoungchul Kim   +3 more
doaj   +1 more source

Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53

open access: yesAdvanced Science, EarlyView.
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore   +20 more
wiley   +1 more source

Multi‐View Biomedical Foundation Models for Molecule‐Target and Property Prediction

open access: yesAdvanced Science, EarlyView.
Molecular foundation models can provide accurate predictions for a large set of downstream tasks. We develop MMELON, an approach that integrates pre‐trained graph, image, and text foundation models and validate our multi‐view model on over 120 tasks, including GPCR binding.
Parthasarathy Suryanarayanan   +17 more
wiley   +1 more source

Sphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation [PDF]

open access: yes, 2018
Sphinx, a hardware-software co-design architecture for binary code and runtime obfuscation. The Sphinx architecture uses binary code diversification and self-reconfigurable processing elements to maintain application functionality while obfuscating the ...
Ehret, Alan   +3 more
core   +1 more source

Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity

open access: yesIEEE Access, 2019
To protect programs from unauthorized analysis, virtualize the code based on Virtual Machine (VM) technologies is emerging as a feasible method for accomplishing code obfuscation.
Wei Wang   +9 more
doaj   +1 more source

Vectorization, Obfuscation and P4 LLVM Tool-chain [PDF]

open access: yes, 2018
This thesis broadly focuses on three different areas: Loop Vectorization, Code Obfuscation, and P4LLVM compiler. The work in Loop vectorization starts with a comparison of Auto-vectorization of GCC, ICC and LLVM compilers and show their strengths and ...
Kumar, Dangeti Tharun   +1 more
core  

Stress‐Induced Melting Controlled Failure Mechanisms of Methane Hydrate

open access: yesAdvanced Science, EarlyView.
We study methane hydrate via nanoindentation and nuclear magnetic resonance (NMR), finding its regional melting and mechanical properties, challenging existing views on hydrogen‐bonded crystals. Abstract Methane hydrate, a kind of nonstoichiometric crystalline, attracted worldwide attentions as a promising substitute energy. Its Dissociation is thought
Yanlong Li   +9 more
wiley   +1 more source

Staging an Experience of Cultural Heritage Preservation: Consumers' Willingness to Pay for Heirloom Rice in the Philippines

open access: yesAgribusiness, EarlyView.
ABSTRACT The Cordillera Administrative Region in the Philippines is home to terraced rice embedded in centuries of cultural heritage. However, weak market incentives threaten sustained production, jeopardizing indigenous communities' cultural heritage and the in situ biodiversity of rice genetic resources.
Kofi Britwum, Matty Demont
wiley   +1 more source

A Framework to Quantify the Quality of Source Code Obfuscation

open access: yesApplied Sciences
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy