Results 131 to 140 of about 2,376,801 (294)
Trade liberalisation, rent sharing and wage inequality in Tunisia, 1998-2002. [PDF]
This paper attempts to empirically explore the effects of trade liberalization process in Tunisia on average real wages and wage inequality, via industry rents.
Ghazali, Monia
core
In the present work, we have identified a transcriptional signature based on the differential expression of six genes (BCL2&MAST4, HSH2D&LAT2, METRN&PITPNM2) that would facilitate the early detection of T‐cell acute lymphoblastic leukemia (T‐ALL) patients prone to a poor treatment response and could be implemented at diagnosis, along with other risk ...
Antonio Lahera +11 more
wiley +1 more source
Beyond its role in immune evasion, this study identified that CD47 drives tumor‐intrinsic signaling in non‐small cell lung cancer (NSCLC). Transcriptomic profiling and functional studies revealed that CD47 regulates cell adhesion, migration, and metastasis through an ERK–EMT signaling axis.
Asa P.Y. Lau +8 more
wiley +1 more source
CIN85 is highly expressed in osteosarcoma, particularly in metastatic lesions. Its overexpression increases cell migration and Matrigel invasion, while silencing CIN85 suppresses these behaviors. Transcriptome analysis shows that CIN85 regulates MMP2, COL3A1, and Akt/mTOR signaling. Targeting these pathways reverses CIN85‐induced motility, highlighting
Iryna Horak +10 more
wiley +1 more source
SliceScore: A Network Function Sharing Aware and Slice-Oriented DDoS Filtering Approach
Network slicing presents new opportunities for cost-effective implementations of next-generation communication networks that target diverse service requirements. Deploying vertical use cases on shared resources is the main motivation for network slicing.
Omer Zekvan Yilmaz +2 more
doaj +1 more source
Here, we demonstrate that HS1BP3 interacts with Cortactin through a proline‐rich region (PRR3.1) and show that this interaction, and HS1BP3 itself, promote cancer cell proliferation and invasion. Inhibition of this interaction leads to build‐up of TKS5 in multivesicular endosomes and altered secretion of CD63 and CD9, providing an explanation for the ...
Arja Arnesen Løchen +9 more
wiley +1 more source
Interactive Verifiable Secret Sharing Scheme
Commitment schemes, secret sharing schemes, interactive zero-knowledge proofs which underlie the offered interactive secrete sharing schemes are considered.
O.V. Kazarin
doaj
Multisecret‐sharing scheme with two‐level security and its applications in blockchain
A (t,m)‐threshold secret sharing and multisecret‐sharing scheme based on Shamir's secret sharing scheme are introduced with two‐level security using a one‐way function. Besides, its application in a smart contract‐enabled consortium blockchain network is
Rajendra Kumar Sharma +3 more
doaj +1 more source
Responsibility and Cross-Subsidization in Cost Sharing [PDF]
We propose two axiomatic theories of cost sharing with the common premise that individual demands are comparable, though perhaps different, commodities, and that agents are responsible for their own demand. Under partial responsibility the agents are not
Moulin, Herve, Sprumont, Yves
core
A Function-Sharing Criterion for Normal Functions
In this paper, we present a function-sharing criterion for the normality of meromorphic functions. Let $f$ be a meromorphic function in the unit disc $\mathbb{D}\subset \mathbb{C}$, $ψ_1$, $ψ_2$, and $ψ_3$ be three meromorphic functions in the unit disc $\mathbb{D}$, continuous on $ \partial{\mathbb{D}}:=\{z\in\mathbb{C}\,:\,|z|=1\}$, such that $ψ_i(z)\
Datt, Gopal +2 more
openaire +2 more sources

