Results 31 to 40 of about 496,317 (234)

β‐TrCP overexpression enhances cisplatin sensitivity by depleting BRCA1

open access: yesMolecular Oncology, EarlyView.
Low levels of β‐TrCP (Panel A) allow the accumulation of BRCA1 and CtIP, which facilitate the repair of cisplatin‐induced DNA damage via homologous recombination (HR) and promote tumor cell survival. In contrast, high β‐TrCP expression (Panel B) leads to BRCA1 and CtIP degradation, impairing HR repair, resulting in persistent DNA damage and apoptosis ...
Rocío Jiménez‐Guerrero   +8 more
wiley   +1 more source

An architecture-based dependability modeling framework using AADL [PDF]

open access: yes, 2006
For efficiency reasons, the software system designers' will is to use an integrated set of methods and tools to describe specifications and designs, and also to perform analyses such as dependability, schedulability and performance.
Kaaniche, Mohamed   +2 more
core   +1 more source

Look, Listen and Learn - A Multimodal LSTM for Speaker Identification

open access: yes, 2016
Speaker identification refers to the task of localizing the face of a person who has the same identity as the ongoing voice in a video. This task not only requires collective perception over both visual and auditory signals, the robustness to handle ...
Hu, Yongtao   +6 more
core   +1 more source

An algebraic semantics for QVT-relations check-only transformations [PDF]

open access: yes, 2012
Fundamenta Informaticae, 114 1, Juan de Lara, Esther Guerra, An algebraic semantics for QVT-relations check-only transformations, 73-101, Copyright 2012, with permission from IOS PressQVT is the standard for model transformation defined by the OMG in ...
Guerra, Esther, Lara, Juan de
core   +2 more sources

Adenosine‐to‐inosine editing of miR‐200b‐3p is associated with the progression of high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira   +14 more
wiley   +1 more source

Transforming N-ary relationships to database schemas: an old and forgotten problem [PDF]

open access: yes, 2002
The N-ary relationships, have been traditionally a source of confusion and still are. One important source of confusion is that the term cardinality in a relationship has several interpretations, two of them being very popular.
Camps Pare, Rafael
core   +1 more source

Inhibition of CDK9 enhances AML cell death induced by combined venetoclax and azacitidine

open access: yesMolecular Oncology, EarlyView.
The CDK9 inhibitor AZD4573 downregulates c‐MYC and MCL‐1 to induce death of cytarabine (AraC)‐resistant AML cells. This enhances VEN + AZA‐induced cell death significantly more than any combination of two of the three drugs in AraC‐resistant AML cells.
Shuangshuang Wu   +18 more
wiley   +1 more source

The use of UML activity diagrams and the i* language in the modeling of the balanced scorecard implantation process

open access: yesJournal of Computer Science and Technology, 2005
Business management is a complex task that can be facilitated using different methodologies and models. One of their most relevant purposes is to align the organization strategy with the daily functioning of the organization.
Mariela Haya, Xavier Franch, Enric Mayol
doaj  

Designinig Coordination among Human and Software Agents [PDF]

open access: yes, 2002
The goal of this paper is to propose a new methodology for designing coordination between human angents and software agents and, ultimately, among software agents. The methodology is based on two key ideas.
Giunchiglia, Fausto   +2 more
core  

Visual Model-Driven Design, Verification and Implementation of Security Protocols [PDF]

open access: yes, 2012
A novel visual model-driven approach to security protocol design, verification, and implementation is presented in this paper. User-friendly graphical models are combined with rigorous formal methods to enable protocol verification and sound automatic ...
Bettassa Copet, Piergiuseppe   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy