Results 71 to 80 of about 4,181 (243)

EFECTOS DEL TLCN EN MEXICO: UNA INTERPRETACIÓN

open access: yesAportes para la Integración Latinoamericana, 2017
No sería posible, creo, ni en un libro extensivo, hacer un balance definitivo de los efectos del TLCAN (Tratado de Libre Comercio de América del Norte) en México.
JAMES M. CYPHER
doaj  

Market competition for high‐density residential land

open access: yesInternational Journal of Strategic Property Management, 2010
We investigate the potential competition between multifamily and condominium developers for raw land throughout the U.S. When considering the entire sample period, we find evidence that condominium developers paid, on average, more for land than their ...
Matthew L. Cypher, Darren K. Hayunga
doaj   +1 more source

Function‐driven design of a surrogate interleukin‐2 receptor ligand

open access: yesFEBS Letters, EarlyView.
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang   +9 more
wiley   +1 more source

Life Cycle Fluoropolymer Management in Proton Exchange Membrane Electrolysis

open access: yesHydrogen
Concerns over the life cycle impacts of fluoropolymers have led to their inclusion in broad product restriction proposals for per- and poly-fluorinated alkyl substances (PFAS), despite their non-bioavailable properties and low exposure potential in ...
Parikhit Sinha, Sabrine M. Cypher
doaj   +1 more source

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

Veblen y el origen de la hipótesis del catching-up

open access: yesProblemas del Desarrollo, 2012
La economía del desarrollo se conoce como un fenómeno de la posguerra, no tiene antecedentes. No obstante la contribución de Veblen a la economía del desarrollo ya se había reconocido y diseminado anteriormente.
James M. Cypher
doaj  

Multiple ETS family transcription factors bind mutant p53 via distinct interaction regions

open access: yesFEBS Letters, EarlyView.
Mutant p53 gain‐of‐function is thought to be mediated by interaction with other transcription factors. We identify multiple ETS transcription factors that can bind mutant p53 and found that this interaction can be promoted by a PXXPP motif. ETS proteins that strongly bound mutant p53 were upregulated in ovarian cancer compared to ETS proteins that ...
Stephanie A. Metcalf   +6 more
wiley   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Refining Text2Cypher on Small Language Model with Reinforcement Learning Leveraging Semantic Information

open access: yesApplied Sciences
Text2Cypher is a text-to-text task that converts natural language questions into Cypher queries. Recent research by Neo4j on Text2Cypher demonstrates that fine-tuning a baseline language model (a pretrained and instruction-tuned generative model) using a
Quoc-Bao-Huy Tran   +3 more
doaj   +1 more source

Cypher as a Service [PDF]

open access: yes, 2018
A día de hoy es difícil imaginarse el futuro de la tecnología informática sin los conceptos de computación en la nube y ciberseguridad. El primero nos otorga una mayor capacidad de almacenamiento y una enorme potencia de procesamiento. El segundo, a través de técnicas como la encriptación, mantiene nuestras comunicaciones y datos sensibles en secreto ...
Dabbagh Escalante, Kurosh   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy