Results 131 to 140 of about 6,963,647 (337)

Blockchain networks: Data structures of Bitcoin, Monero, Zcash, Ethereum, Ripple, and Iota. [PDF]

open access: yesWiley Interdiscip Rev Data Min Knowl Discov, 2022
Akcora CG, Gel YR, Kantarcioglu M.
europepmc   +1 more source

A storage and access manager for ill-structured data [PDF]

open access: bronze, 1991
Jeffrey E Kottemann   +2 more
openalex   +1 more source

PICALM::MLLT10 translocated leukemia

open access: yesFEBS Letters, EarlyView.
This comprehensive review of PICALM::MLLT10 translocated acute leukemia provides an in‐depth review of the structure and function of CALM, AF10, and the fusion oncoprotein (1). The multifaceted molecular mechanisms of oncogenesis, including nucleocytoplasmic shuttling (2), epigenetic modifications (3), and disruption of endocytosis (4), are then ...
John M. Cullen   +7 more
wiley   +1 more source

Performance of Linear and Spiral Hashing Algorithms

open access: yesAlgorithms
Linear Hashing is an important algorithm for many key-value stores in main memory. Spiral Storage was invented to overcome the poor fringe behavior of Linear Hashing, but after an influential study by Larson, it seems to have been discarded. Since almost
Arockia David Roy Kulandai   +1 more
doaj   +1 more source

Data structures based on k-mers for querying large collections of sequencing data sets. [PDF]

open access: yesGenome Res, 2021
Marchet C   +5 more
europepmc   +1 more source

Cell wall target fragment discovery using a low‐cost, minimal fragment library

open access: yesFEBS Letters, EarlyView.
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan   +5 more
wiley   +1 more source

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

open access: yesÌнформаційні технології в освіті, 2011
Some aspects of programming education are examined in this work. It is emphasised, based on the entertainment value, the most appropriate examples are chosen to demonstrate the different language constructions and data structures.
K. Yordzhev, H. Kostadinova
doaj  

Data-Oblivious Data Structures

open access: yes, 2014
An algorithm is called data-oblivious if its control flow and memory access pattern do not depend on its input data. Data-oblivious algorithms play a significant role in secure cloud computing, since programs that are run on secret data—as in fully homomorphic encryption or secure multi-party computation—must be data-oblivious.
Mitchell, John C., Zimmerman, Joe
openaire   +2 more sources

Data from Tumor Suppressor Activity of Klotho in Breast Cancer Is Revealed by Structure–Function Analysis

open access: gold, 2023
Hagai Ligumsky   +7 more
openalex   +1 more source

Nicotinamide N‐methyltransferase promotes drug resistance in lung cancer, as revealed by nascent proteomic profiling

open access: yesMolecular Oncology, EarlyView.
AZD9291 has shown promise in targeted cancer therapy but is limited by resistance. In this study, we employed metabolic labeling and LC–MS/MS to profile time‐resolved nascent protein perturbations, allowing dynamic tracking of drug‐responsive proteins. We demonstrated that increased NNMT expression is associated with drug resistance, highlighting NNMT ...
Zhanwu Hou   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy