Results 21 to 30 of about 1,304,365 (227)
Crypto-Verifying Protocol Implementations in ML [PDF]
We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational ...
Bhargavan, K., Corin, R.J., Fournet, C.
core +2 more sources
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman +2 more
wiley +1 more source
Computational study of structural and elastic properties of random AlGaInN alloys
In this work we present a detailed computational study of structural and elastic properties of cubic AlGaInN alloys in the framework of Keating valence force field model, for which we perform accurate parametrization based on state of the art DFT ...
Ambacher O +9 more
core +1 more source
Higher-order interference in extensions of quantum theory [PDF]
Quantum interference lies at the heart of several quantum computational speed-ups and provides a striking example of a phenomenon with no classical counterpart. An intriguing feature of quantum interference arises in a three slit experiment.
Lee, Ciarán M., Selby, John H.
core +3 more sources
Cell wall target fragment discovery using a low‐cost, minimal fragment library
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan +5 more
wiley +1 more source
Emergent Power-Law Phase in the 2D Heisenberg Windmill Antiferromagnet: A Computational Experiment
In an extensive computational experiment, we test Polyakov's conjecture that under certain circumstances an isotropic Heisenberg model can develop algebraic spin correlations.
Chandra, Premala +3 more
core +1 more source
The integral equation approach to kinematic dynamo theory and its application to dynamo experiments in cylindrical geometry [PDF]
The conventional magnetic induction equation that governs hydromagnetic dynamo action is transformed into an equivalent integral equation system. An advantage of this approach is that the computational domain is restricted to the region occupied by the ...
Beltrami +42 more
core +1 more source
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira +14 more
wiley +1 more source
A synthetic benzoxazine dimer derivative targets c‐Myc to inhibit colorectal cancer progression
Benzoxazine dimer derivatives bind to the bHLH‐LZ region of c‐Myc, disrupting c‐Myc/MAX complexes, which are evaluated from SAR analysis. This increases ubiquitination and reduces cellular c‐Myc. Impairing DNA repair mechanisms is shown through proteomic analysis.
Nicharat Sriratanasak +8 more
wiley +1 more source
Computer Experiment in Teaching Mathematics
Abstract A mathematical experiment has always been a key source for a mathematical discovery. Over the past 50 years, thanks to digital technologies, its role in mathematical research has grown significantly. Digital technologies have opened up fundamentally new opportunities for experimentation in mathematics education,
G. B. Shabat, A. L. Semenov
openaire +1 more source

