Results 91 to 100 of about 3,424,284 (379)

Enhancer Extrachromosomal Circular DNA ANKRD28 Elicits Drug Resistance via POU2F2‐Mediated Transcriptional Network in Multiple Myeloma

open access: yesAdvanced Science, EarlyView.
Enhancer eccANKRD28‐manipulated MM cells have been demonstrated to facilitate drug resistance and promote MM progression by activating the key transcription factor, POU2F2. POU2F2 interacts with sequence‐specific eccANKRD28 as well as RUNX1 and RUNX2 motifs to form the protein complex, which activates the promoter of oncogenes (IRF4, JUNB, IKZF3, et al.
Binzhen Chen   +12 more
wiley   +1 more source

Computational Complexity Results for Genetic Programming and the Sorting Problem [PDF]

open access: yes, 2011
Genetic Programming (GP) has found various applications. Understanding this type of algorithm from a theoretical point of view is a challenging task. The first results on the computational complexity of GP have been obtained for problems with isolated ...
Neumann, Frank, Wagner, Markus
core  

A Model of Cooperative Threads [PDF]

open access: yes, 2008
We develop a model of concurrent imperative programming with threads. We focus on a small imperative language with cooperative threads which execute without interruption until they terminate or explicitly yield control.
Gordon D. Plotkin and Matija Pretnar   +9 more
core   +9 more sources

Semantic computing in multimedia [PDF]

open access: yesProceedings of the 19th ACM international conference on Multimedia, 2011
This short overview describes the contents of the tutorial Semantic computing in multimedia, which was offered to the participants of ACM Multimedia 2011. Given the impossibility of summarizing properly the contents of the tutorial in just two pages, the purpose of this overview is mainly to introduce the reader to the relevant bibliography.
openaire   +2 more sources

Synchrotron Radiation‐Based Tomography of an Entire Mouse Brain with Sub‐Micron Voxels: Augmenting Interactive Brain Atlases with Terabyte Data

open access: yesAdvanced Science, EarlyView.
Extended‐field acquisition enables sub‐micron X‐ray imaging of a full mouse brain. The 3.3‐teravoxel volume is reconstructed, registered to a reference atlas, and stored in hierarchical format to augment currently available atlases and improve resolution in the third dimension by an order of magnitude.
Mattia Humbel   +8 more
wiley   +1 more source

Constraint-based computational semantics : a comparison between LTAG and LRS [PDF]

open access: yes, 2006
This paper compares two approaches to computational semantics, namely semantic unification in Lexicalized Tree Adjoining Grammars (LTAG) and Lexical Resource Semantics (LRS) in HPSG.
Kallmeyer, Laura, Richter, Frank
core  

SECURE SEMANTIC COMPUTING [PDF]

open access: yesInternational Journal of Semantic Computing, 2011
This paper explores the integration of semantic computing technologies with security technologies. Past and current research on the application of semantic web technologies for policy management and inference control, the application of data mining technologies for intrusion and malware detection, and programming language-based approaches to mobile ...
Kevin W. Hamlen, Bhavani Thuraisingham
openaire   +2 more sources

A Novel Dual‐Network Approach for Real‐Time Liveweight Estimation in Precision Livestock Management

open access: yesAdvanced Science, EarlyView.
A novel dual‐network framework is proposed for real‐time, non‐contact liveweight estimation of pigs. By extracting contour information instead of segmented images, the method achieves high accuracy (R2 = 0.993) and an exceptional speed of 1131.6 FPS. This approach enhances automation in livestock farming, providing a scalable and efficient solution for
Ximing Dong   +6 more
wiley   +1 more source

Multifidelity Comparison of Supersonic Wave Drag Prediction Methods Using Axisymmetric Bodies

open access: yesAerospace
Low-fidelity analytic and computational wave drag prediction methods assume linear aerodynamics and small perturbations to the flow. Hence, these methods are typically accurate for only very slender geometries.
Troy Abraham   +2 more
doaj   +1 more source

Privacy-Preserved Approximate Classification Based on Homomorphic Encryption

open access: yesMathematical and Computational Applications, 2019
Privacy is a crucial issue for outsourcing computation, which means that clients utilize cloud infrastructure to perform online prediction without disclosing sensitive information.
Xiaodong Xiao   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy