Results 61 to 70 of about 95,792 (317)

NAD⁺ Reduction in Glutamatergic Neurons Induces Lipid Catabolism and Neuroinflammation in the Brain via SARM1

open access: yesAdvanced Science, EarlyView.
NAD⁺ homeostasis maintains neuronal integrity through opposing actions of NMNAT2 and SARM1. Loss of NMNAT2 in glutamatergic neurons reprograms cortical metabolism from glucose to lipid catabolism, depletes lipid stores, and triggers inflammation and neurodegeneration.
Zhen‐Xian Niou   +9 more
wiley   +1 more source

The Management Strategy of Metadata in Large-scale Network Storage System

open access: yesMATEC Web of Conferences, 2018
The wan Internet storage system based on Distributed Hash Table uses fully distributed data and metadata management, and constructs an extensible and efficient mass storage system for the application based on Internet.
Zhong Haifeng, Xiong Jianying
doaj   +1 more source

Targeting the CMKLR1‐Mediated Signaling Rebalances Immunometabolism State in Middle‐Age Testicular Macrophages

open access: yesAdvanced Science, EarlyView.
In middle age, testicular CMKLR1⁺ macrophages exhibited a pro‐inflammatory immunometabolic profile, mediated by adipose signals associated with high BMI. However, inhibition of CMKLR1 signaling, either through Cmklr1 genetic ablation or treatment with a CMKLR1 antagonist peptide, can reverse this phenotype.
Zhendong Zhu   +10 more
wiley   +1 more source

POSITION-BASED DISTRIBUTED HASH TABLES

open access: yes, 2006
In this thesis we want to create scalable, fault-tolerant and self-configuring dictionaries that can be deployed in a wide range of networks, including highly dynamic networks with frequent membership changes, like peer-to-peer overlay networks or wireless ad hoc networks.
openaire   +4 more sources

A Secure Data Infrastructure for Personal Manufacturing Based on a Novel Key-Less, Byte-Less Encryption Method

open access: yesIEEE Access, 2020
We are witnessing the advent of personal manufacturing, where home users and small and medium enterprises manufacture products locally, at the point and time of need.
Anton Vedeshin   +4 more
doaj   +1 more source

Achieving Online and Scalable Information Integrity by Harnessing Social Spam Correlations

open access: yesIEEE Access, 2023
Malicious web links, social rumors, fraudulent advertisements, faked comments, and biased propaganda are overwhelmingly influencing online social networks. Enabling information integrity is a hot topic in both academia and industry.
Hailu Xu   +5 more
doaj   +1 more source

DiBELLA: Distributed long read to long read alignment [PDF]

open access: yes, 2019
We present a parallel algorithm and scalable implementation for genome analysis, specifically the problem of finding overlaps and alignments for data from "third generation" long read sequencers [29]. While long sequences of DNA offer enormous advantages
Buluç, A   +4 more
core   +2 more sources

Reference‐Guided Chromosome‐by‐Chromosome de novo Assembly at Scale Using Low‐Coverage High‐Fidelity Long‐Reads with HiFiCCL

open access: yesAdvanced Science, EarlyView.
HiFiCCL, as the first assembly framework specifically designed for low‐coverage high‐fidelity reads, improves the assembly quality of existing assemblers and also enhances downstream applications such as large structural variant (SV) detection (>10 000 bp), synteny analysis, pangenome graph construction, and graph‐based individual‐specific germline SVs
Zhongjun Jiang   +9 more
wiley   +1 more source

Design and Implementation of DHT Algorithm for NDN

open access: yesDianxin kexue, 2014
A novel distributed Hash table(DHT)algorithm under named data networking(NDN), which was called ndnDHT, was proposed. The algorithm brings the DHT to NDN for the first time. A new binary method using the structure of NDN was designed.
Kai Lei, Meng Yuan
doaj   +2 more sources

Packet Classification Using GPU and One-Level Entropy-Based Hashing

open access: yesIEEE Access, 2020
The demand for on-line analyzing of internet traffic for both security and QoS consideration directly increases as a function of using diverse applications and as malicious attacks increase.
Shlomo Greenberg   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy