Results 81 to 90 of about 525,882 (299)
Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller +17 more
wiley +1 more source
Monitoring circulating tumor DNA (ctDNA) in patients with operable breast cancer can reveal disease relapse earlier than radiology in a subset of patients. The failure to detect ctDNA in some patients with recurrent disease suggests that ctDNA could serve as a supplement to other monitoring approaches.
Kristin Løge Aanestad +35 more
wiley +1 more source
ATF4‐mediated stress response as a therapeutic vulnerability in chordoma
We screened 5 chordoma cell lines against 100+ inhibitors of epigenetic and metabolic pathways and kinases and identified halofuginone, a tRNA synthetase inhibitor. Mechanistically halofuginone induces an integrated stress response, with eIF2alpha phosphorylation, activation of ATF4 and its target genes CHOP, ASNS, INHBE leading to cell death ...
Lucia Cottone +11 more
wiley +1 more source
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg +43 more
wiley +1 more source
Intervals in Generalized Effect Algebras and their Sub-generalized Effect Algebras
We consider subsets G of a generalized effect algebra E with 0∈G and such that every interval [0, q]G = [0, q]E ∩ G of G (q ∈ G , q ≠ 0) is a sub-effect algebra of the effect algebra [0, q]E.
Zdenka Riečanová, Michal Zajac
doaj
Digital Content Security by Butterfly and Elliptic Curve Cryptography with Channel Optimization [PDF]
As more and more services and solutions are utilizing digital data, it becomes imperative to provide strong security mechanisms to safeguard sensitive content with a rapidly growing number of users.
Kartikey Pandey, Deepmala Sharma
doaj +1 more source
Learning bilingual word embeddings with (almost) no bilingual data [PDF]
Mikel Artetxe +2 more
openalex +1 more source
Fabrication of silicotungstic acid immobilized on Ce-based MOF and embedded in Zr-based MOF matrix for green fatty acid esterification [PDF]
Qiuyun Zhang +7 more
openalex +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hromkovic, J. +3 more
openaire +2 more sources

