Results 151 to 160 of about 4,693,341 (291)
Research on a Particle Filtering Multi-Target Tracking Algorithm for Distributed Systems. [PDF]
Han B, Ge Z, Su Z, Hao J.
europepmc +1 more source
Access Control for Emerging Distributed Systems. [PDF]
Hu VC, Richard Kuhn D, Ferraiolo DF.
europepmc +1 more source
Dimethyl fumarate (DMF) reduces growth of HPV‐positive cervical cancer spheroids and induces ferroptosis in cervical cancer cells via blocking SLC7A11/Glutathione (GSH) axis. Combination of subcytotoxic doses of DMF and cisplatin (CDDP) further suppresses spheroid growth and drives cell death in 2D culture models.
Carolina Punziano +6 more
wiley +1 more source
Fault tolerance in distributed systems using deep learning approaches. [PDF]
Assiri B, Sheneamer A.
europepmc +1 more source
Epidemiology-based Task Assignment Algorithm for Distributed Systems. [PDF]
Brahmbhatt P, Camorlinga SG.
europepmc +1 more source
Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra +6 more
wiley +1 more source
Temporal Logical Attention Network for Log-Based Anomaly Detection in Distributed Systems. [PDF]
Liu Y, Ren S, Wang X, Zhou M.
europepmc +1 more source
Efficient string similarity join in multi-core and distributed systems. [PDF]
Yan C, Zhao X, Zhang Q, Huang Y.
europepmc +1 more source
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
No free lunch for avoiding clustering vulnerabilities in distributed systems. [PDF]
Chitnelawong P +4 more
europepmc +1 more source

