Results 71 to 80 of about 392,476 (333)

Individual emergence in contextual analysis [PDF]

open access: yes, 2007
Located within the tradition of Hermeneutic Dialectics (HD) this paper offers an approach which can further an analysis of a fit between information and organizational systems.
Bednar, Peter
core  

Recurrent cancer‐associated ERBB4 mutations are transforming and confer resistance to targeted therapies

open access: yesMolecular Oncology, EarlyView.
We show that the majority of the 18 analyzed recurrent cancer‐associated ERBB4 mutations are transforming. The most potent mutations are activating, co‐operate with other ERBB receptors, and are sensitive to pan‐ERBB inhibitors. Activating ERBB4 mutations also promote therapy resistance in EGFR‐mutant lung cancer.
Veera K. Ojala   +15 more
wiley   +1 more source

二阶矩可靠性指标的计算机辅助公差优化装配尺寸链设计模型

open access: yesJixie chuandong, 2008
Optimum tolerance design is one of important steps in the process of machine design and manufacture and in the application of computer,and model-building is an important step.Thus a kind of computer aided optimum tolerance design model is built,by the ...
张帆
doaj  

Declarative Modeling and Bayesian Inference of Dark Matter Halos

open access: yes, 2013
Probabilistic programming allows specification of probabilistic models in a declarative manner. Recently, several new software systems and languages for probabilistic programming have been developed on the basis of newly developed and improved methods ...
Kronberger, Gabriel
core   +1 more source

Crucial parameters for precise copy number variation detection in formalin‐fixed paraffin‐embedded solid cancer samples

open access: yesMolecular Oncology, EarlyView.
This study shows that copy number variations (CNVs) can be reliably detected in formalin‐fixed paraffin‐embedded (FFPE) solid cancer samples using ultra‐low‐pass whole‐genome sequencing, provided that key (pre)‐analytical parameters are optimized.
Hanne Goris   +10 more
wiley   +1 more source

On Optimal Binary One-Error-Correcting Codes of Lengths $2^m-4$ and $2^m-3$

open access: yes, 2011
Best and Brouwer [Discrete Math. 17 (1977), 235-245] proved that triply-shortened and doubly-shortened binary Hamming codes (which have length $2^m-4$ and $2^m-3$, respectively) are optimal.
Krotov, Denis S.   +2 more
core   +1 more source

Phenotypic and genotypic characterization of single circulating tumor cells in the follow‐up of high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Single circulating tumor cells (sCTCs) from high‐grade serous ovarian cancer patients were enriched, imaged, and genomically profiled using WGA and NGS at different time points during treatment. sCTCs revealed enrichment of alterations in Chromosomes 2, 7, and 12 as well as persistent or emerging oncogenic CNAs, supporting sCTC identity.
Carolin Salmon   +9 more
wiley   +1 more source

Liquefaction mechanism induced by dynamic excitation modeled in Plaxis AE with the use of UBC and MOHR–coulomb constitutive relationships

open access: yesStudia Geotechnica et Mechanica, 2016
Computer Aided Engineering (CAE) is commonly used in modern design of the various types of structures. There are two main issues/aspects that should be consider while using CAE in Geotechnics: the basic theory and material model.
Borowiec Anna, Stanuszek Michał
doaj   +1 more source

Computer-Aided Instruction in Law: Theories, Techniques, and Trepidations

open access: yesAmerican Bar Foundation Research Journal, 1978
Legal education is only beginning to make use of the technological capabilities of computers as a medium for instructional design. In this article the authors show the applicability of computer-assisted instruction to law through programmed instructional techniques. They trace the two decades of development of computer-assisted instruction (CAI) in law,
Park, Roger C., Burris, Russell
openaire   +2 more sources

Home - About - Disclaimer - Privacy