Results 61 to 70 of about 3,157,454 (357)
Alectinib resistance in ALK+ NSCLC depends on treatment sequence and EML4‐ALK variants. Variant 1 exhibited off‐target resistance after first‐line treatment, while variant 3 and later lines favored on‐target mutations. Early resistance involved off‐target alterations, like MET and NF2, while on‐target mutations emerged with prolonged therapy.
Jie Hu+11 more
wiley +1 more source
B‐cell chronic lymphocytic leukemia (B‐CLL) and monoclonal B‐cell lymphocytosis (MBL) show altered proteomes and phosphoproteomes, analyzed using mass spectrometry, protein microarrays, and western blotting. Identifying 2970 proteins and 316 phosphoproteins, including 55 novel phosphopeptides, we reveal BCR and NF‐kβ/STAT3 signaling in disease ...
Paula Díez+17 more
wiley +1 more source
QWIRE Practice: Formal Verification of Quantum Circuits in Coq [PDF]
We describe an embedding of the QWIRE quantum circuit language in the Coq proof assistant. This allows programmers to write quantum circuits using high-level abstractions and to prove properties of those circuits using Coq's theorem proving features. The
Robert Rand+2 more
semanticscholar +1 more source
Determination of ADP/ATP translocase isoform ratios in malignancy and cellular senescence
The individual functions of three isoforms exchanging ADP and ATP (ADP/ATP translocases; ANTs) on the mitochondrial membrane remain unclear. We developed a method for quantitatively differentiating highly similar human ANT1, ANT2, and ANT3 using parallel reaction monitoring. This method allowed us to assess changes in translocase levels during cellular
Zuzana Liblova+18 more
wiley +1 more source
Formal Verification of a MAC Protocol for Underwater Sensor Networks
The use of Underwater Sensor Networks (UWSN) for underwater ocean applications such as seismic event detection, target detection, marine resource monitoring, and oil bed monitoring is growing.
N. Suresh Kumar+3 more
doaj +1 more source
A formal verification tool for Ethereum VM bytecode
In this paper, we present a formal verification tool for the Ethereum Virtual Machine (EVM) bytecode. To precisely reason about all possible behaviors of the EVM bytecode, we adopted KEVM, a complete formal semantics of the EVM, and instantiated the K ...
D. Park+4 more
semanticscholar +1 more source
TRPM8 levels determine tumor vulnerability to channel agonists
TRPM8 is a Ca2+ permissive channel. Regardless of the amount of its transcript, high levels of TRPM8 protein mark different tumors, including prostate, breast, colorectal, and lung carcinomas. Targeting TRPM8 with channel agonists stimulates inward calcium currents followed by emptying of cytosolic Ca2+ stores in cancer cells.
Alessandro Alaimo+18 more
wiley +1 more source
Formal verification of a constant-time preserving C compiler
Timing side-channels are arguably one of the main sources of vulnerabilities in cryptographic implementations. One effective mitigation against timing side-channels is to write programs that do not perform secret-dependent branches and memory accesses ...
G. Barthe+6 more
semanticscholar +1 more source
In patients treated with atezolizumab as a part of the MyPathway (NCT02091141) trial, pre‐treatment ctDNA tumor fraction at high levels was associated with poor outcomes (radiographic response, progression‐free survival, and overall survival) but better sensitivity for blood tumor mutational burden (bTMB).
Charles Swanton+17 more
wiley +1 more source
Formal Verification of Linux Kernel Library Functions
The paper presents result of a study on deductive verification of 26 Linux kernel library functions with AstraVer toolset. The code includes primarily string-manipulating functions and is verified against contract specifications formalizing its ...
D. V. Efremov, M. U. Mandrykin
doaj +1 more source