Results 111 to 120 of about 91,922 (250)

Interaction of TFAP2A with the Ku70/80 complex is crucial for HIF‐dependent activation of hypoxia‐inducible genes

open access: yesThe FEBS Journal, EarlyView.
Under normoxic conditions, the SUMOylated fraction of TFAP2A cannot interact with the Ku70/Ku80 complex, nor it can bind to chromatin. The unSUMOylated fraction pre‐occupies the chromatin of a subset of hypoxia‐induced genes together with the Ku70/Ku80 complex for basal euchromatin formation. Under hypoxic conditions, the SUMOylation equilibrium shifts
Amalia Kanoura   +8 more
wiley   +1 more source

A New Approach to Analyzing Robin Hood Hashing [PDF]

open access: yesarXiv, 2014
Robin Hood hashing is a variation on open addressing hashing designed to reduce the maximum search time as well as the variance in the search time for elements in the hash table. While the case of insertions only using Robin Hood hashing is well understood, the behavior with deletions has remained open.
arxiv  

Association of the gut microbiota with type 2 diabetes: Links to disease and remission in the Japanese population

open access: yesJournal of Diabetes Investigation, EarlyView.
Association of gut microbiota with type 2 diabetes and its remission was examined in a population‐based study. Specific gut microbes were significantly associated with T2D and its remission. The gut microbiota may represent a potential area for further exploration in T2D treatment and prevention.
Keita Kinoshita   +10 more
wiley   +1 more source

A Dynamic Hash Table for the GPU [PDF]

open access: yesarXiv, 2017
We design and implement a fully concurrent dynamic hash table for GPUs with comparable performance to the state of the art static hash tables. We propose a warp-cooperative work sharing strategy that reduces branch divergence and provides an efficient alternative to the traditional way of per-thread (or per-warp) work assignment and processing.
arxiv  

The effect of nurses' attitudes towards evidence‐based nursing on the level of compliance with isolation measures in nurses caring for liver transplant patients

open access: yesJournal of Evaluation in Clinical Practice, Volume 31, Issue 2, March 2025.
Abstract Objective Liver transplant recipients are at a high risk of infection during the first month. Therefore, it is crucial to implement isolation measures correctly to prevent the spread of nosocomial infections. Evidence‐based practices and proper implementation of isolation measures can significantly reduce morbidity and mortality.
Kapıkıran Gürkan   +3 more
wiley   +1 more source

The application of hash chains and hash structures to cryptography

open access: yes, 2009
In this thesis we study how hash chains and other hash structures can be used in various cryptographic applications. In particular we focus on the applications of entity authentication, signatures and key establishment. We study recursive application of hash functions to create hash chains, hash trees and other hash structures. We collate all these to
openaire   +3 more sources

Simple implementation of deletion from open-address hash table [PDF]

open access: yesarXiv, 2009
Deletion from open-address hash table is not so easy as deletion from chained hash table, because in open-address table we can't simply mark a slot containing deleted key as empty. Search for keys may become incorrect. The classical method to implement deletion is to mark slots in hash table by three values: "free", "busy", "deleted".
arxiv  

Intentionality and Attentionality Dynamics in an Institutional Change Process

open access: yesJournal of Management Studies, EarlyView.
Abstract In this article, we explore how actors' intentionality emerges, develops, and co‐evolves with institutional change. Although intentions are essential in shaping institutional change agents' motivations and actions, our understanding of their dynamics is limited and biased by the assumption that intentions are usually identifiable prior to ...
Sofiane Baba, Taïeb Hafsi, Omar Hemissi
wiley   +1 more source

Lessons from the Syria‐Hezbollah Criminal Syndicate, 1985–2005

open access: yesMiddle East Policy, EarlyView.
Abstract Hezbollah, founded with the intention of destroying Israel, has long engaged in illicit efforts to amass resources the size of some states’ coffers. The Lebanese group's long‐running global criminal syndicate with the Assad regime, initially forged in the 1980s, more recently allowed it to fight for more than a decade in the Syrian conflict ...
Iftah Burman, Yehuda Blanga
wiley   +1 more source

Home - About - Disclaimer - Privacy