Results 71 to 80 of about 37,658,670 (280)

Do Android App Developers Accurately Report Collection of Privacy-Related Data? [PDF]

open access: yesarXiv
Many Android applications collect data from users. The European Union's General Data Protection Regulation (GDPR) requires vendors to faithfully disclose which data their apps collect. This task is complicated because many apps use third-party code for which the same information is not readily available.
arxiv  

Sorted Range Reporting Revisited [PDF]

open access: yesarXiv, 2013
We consider the two-dimensional sorted range reporting problem. Our data structure requires O(n lglg n) words of space and O(lglg n + k lglg n) query time, where k is the number of points in the query range. This data structure improves a recent result of Nekrich and Navarro [8] by a factor of O(lglg n) in query time, and matches the state of the art ...
arxiv  

Making tau amyloid models in vitro: a crucial and underestimated challenge

open access: yesFEBS Letters, EarlyView.
This review highlights the challenges of producing in vitro amyloid assemblies of the tau protein. We review how accurately the existing protocols mimic tau deposits found in the brain of patients affected with tauopathies. We discuss the important properties that should be considered when forming amyloids and the benchmarks that should be used to ...
Julien Broc, Clara Piersson, Yann Fichou
wiley   +1 more source

Unraveling Mycobacterium tuberculosis acid resistance and pH homeostasis mechanisms

open access: yesFEBS Letters, EarlyView.
Mycobacterium tuberculosis exhibits a remarkable resilience to acid stress. In this Review, we discuss some of the molecular mechanisms and metabolic pathways used by the tubercle bacilli to adapt and resist host‐mediated acid stress. Mycobacterium tuberculosis (Mtb) is a successful pathogen that has developed a variety of strategies to survive and ...
Janïs Laudouze   +3 more
wiley   +1 more source

Towards Better Summarizing Bug Reports with Crowdsourcing Elicited Attributes [PDF]

open access: yesarXiv, 2018
Recent years have witnessed the growing demands for resolving numerous bug reports in software maintenance. Aiming to reduce the time testers/developers take in perusing bug reports, the task of bug report summarization has attracted a lot of research efforts in the literature.
arxiv  

Unconventional mRNA processing and degradation pathways for the polycistronic yrzI (spyTA) mRNA in Bacillus subtilis

open access: yesFEBS Letters, EarlyView.
The S1025 peptide is the major antidote to the YrzI toxin, which we renamed here as SpyT (Small Peptide YrzI Toxin) and SpyA (Small Peptide YrzI Antitoxin) (1). Degradation of the toxin–antitoxin spyTA mRNA, either by a translation‐dependent cleavage by the endoribonuclease Rae1 (2) or by direct attack by 3′‐exoribonucleases (3), also contributes to ...
Laetitia Gilet   +4 more
wiley   +1 more source

Better Security Bug Report Classification via Hyperparameter Optimization [PDF]

open access: yesarXiv, 2019
When security bugs are detected, they should be (a)~discussed privately by security software engineers; and (b)~not mentioned to the general public until security patches are available. Software engineers usually report bugs to bug tracking system, and label them as security bug reports (SBRs) or not-security bug reports (NSBRs), while SBRs have a ...
arxiv  

Home - About - Disclaimer - Privacy