Results 171 to 180 of about 10,600,895 (351)
Iterative partitioning and labelling of point cloud data [PDF]
Over the past few years the acquisition of 3D point information representing the structure of real-world objects has become common practice in many areas.
Computer Science Annual Workshop CSAW’12+1 more
core
Circulating tumor DNA (ctDNA) offers a possibility for different applications in early and late stage breast cancer management. In early breast cancer tumor informed approaches are increasingly used for detecting molecular residual disease (MRD) and early recurrence. In advanced stage, ctDNA provides a possibility for monitoring disease progression and
Eva Valentina Klocker+14 more
wiley +1 more source
In this explorative biomarker analysis, we assessed serial sampling of circulating tumor cells (CTCs) with CellSearch in two randomized trials testing immune checkpoint inhibitors (ICIs) in metastatic breast cancer. Our data demonstrate a prognostic potential of CTCs, most apparent 4 weeks into ICI therapy.
Nikolai Kragøe Andresen+13 more
wiley +1 more source
Atlas Computer Laboratory, National Institute for Research in Nuclear Science : Dr. J. Howlett [PDF]
openalex +1 more source
Enabling usage of cloud-based applications when offline [PDF]
The Internet is ubiquitous. Office and home environments are increasingly making use of cloud computing platforms to facilitate day to day tasks. The main cloud related challenges highlighted by academia include: server consolidation, energy management ...
Computer Science Annual Workshop CSAW’14+1 more
core
Circulating tumor cells: advancing personalized therapy in small cell lung cancer patients
Small cell lung cancer (SCLC) is an aggressive form of lung cancer that spreads rapidly to secondary sites such as the brain and liver. Cancer cells circulating in the blood, “circulating tumor cells” (CTCs), have demonstrated prognostic value in SCLC, and evaluating biomarkers on CTCs could guide treatment decisions such as for PARP inhibitors ...
Prajwol Shrestha+6 more
wiley +1 more source
Panel on computer education for the management, behavioral, and biological sciences (Session M1) [PDF]
Alex Orden
openalex +1 more source
Novel attack resilience by fusing events related to objectives [PDF]
Research in intrusion detection systems (IDS) is mainly restricted to the misuse and anomaly detection dichotomy, and therefore to their limitations. Web attack detectors are a case in point, where ones that perform misuse detection are prone to miss ...
Computer Science Annual Workshop CSAW’12+1 more
core
Computational Science and Innovation
10 pages; INPC 2010 conference ...
openaire +3 more sources
A comparative study of circulating tumor cell isolation and enumeration technologies in lung cancer
Lung cancer cells were spiked into donor blood to evaluate the recovery rates of the following circulating tumor cell (CTC) enrichment technologies: CellMag™, EasySep™, RosetteSep™, Parsortix® PR1, and Parsortix® Prototype systems. Each method's advantages and disadvantages are described.
Volga M Saini+11 more
wiley +1 more source