Results 111 to 120 of about 4,948 (274)
This study presents the first telomere‐to‐telomere genomes and population resources for Diaporthe pathogens, uncovering the largest known fungal repertoire of secondary metabolite gene clusters. Structural variations and horizontal gene transfer drive cluster diversification, while specific rapidly evolving clusters control virulence, offering novel ...
Kainan Li +9 more
wiley +1 more source
Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore +20 more
wiley +1 more source
An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage [PDF]
Symmetric searchable encryption for cloud storage enables users to retrieve the documents they want in a privacy-preserving way, which has become a hotspot of research.
Xiuxiu Jiang +5 more
doaj
Unraveling the Molecular Mechanisms Underlying Spontaneous Multipolar Mitosis Through CIN‐seq
Multipolar mitosis, a hallmark of chromosomal instability (CIN), drives tumor heterogeneity but is challenging to study in live cells. Using CIN‐seq, a single‐cell multiomics method, we profiled rare CIN events and identified mechanisms associated with viable multipolar mitosis, including PTEN attenuation, Rho GTPase‐driven cytokinesis failure, and ...
Pin‐Rui Su +10 more
wiley +1 more source
This study discovered a new pathway that tells fruit flies when to stop eating. It found that rising blood sugar (fructose) is detected by a sensor called GR43a. This triggers a chain reaction involving the satiety signal sulfakinin and its receptor, ultimately activating a final satiety signal, ILP5.
Hong‐Fei Li +7 more
wiley +1 more source
With the widespread deployment of video surveillance systems, effective access control is essential to enhance the accuracy and security of video anomaly detection. This paper proposes a Searchable and Revocable Attribute-Based Encryption scheme (ABE-RS)
Lu Jiang +4 more
doaj +1 more source
Dynamic Searchable Encryption with Small Client Storage
Ioannis Demertzis +3 more
openaire +1 more source
This work introduces an open‐source all‐optical platform for functional phenotyping of human stem cell‐derived neurons. The system integrates optogenetics, calcium imaging, automated acquisition, and analysis to resolve single‐cell and network activity, enabling longitudinal measurements, disease modeling, and pharmacological screening in preclinical ...
Wardiya Afshar‐Saber +12 more
wiley +1 more source
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases
Comment: 23pages, 13 figures, will be published in USENIX Security ...
Liu, Dongli +5 more
openaire +3 more sources
Software Grand Exposure: SGX Cache Attacks Are Practical
Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns.
Brasser, Ferdinand +5 more
core

