Results 81 to 90 of about 13,897,575 (306)

ADN: An Information-Centric Networking Architecture for the Internet of Things

open access: yes, 2017
Forwarding data by name has been assumed to be a necessary aspect of an information-centric redesign of the current Internet architecture that makes content access, dissemination, and storage more efficient.
Afanasyev A.   +7 more
core   +1 more source

Effect of chemotherapy on passenger mutations in metastatic colorectal cancer

open access: yesMolecular Oncology, EarlyView.
Changes in passenger mutation load and predicted immunotherapy response after chemotherapy treatment. Tumor cells rich with passenger mutations have increased sensitivity to chemotherapy. Correlation of passenger mutations with neoantigen load suggests highly mutated clones promote a more effective response to immunotherapy, and therefore, first‐line ...
Marium T. Siddiqui   +6 more
wiley   +1 more source

Scholarly information architecture, 1989 - 2015

open access: yesData Science Journal, 2006
If we were to start from scratch today to design a quality-controlled archive and distribution system for scientific and technical information, it could take a very different form from what has evolved in the past decade from pre-existing print ...
P Ginsparg
doaj   +1 more source

An Integrated Enterprise Architecture Framework for Business-IT Alignment [PDF]

open access: yes, 2006
When different businesses want to integrate part of their processes and IT, they need to relate their enterprise architecture frameworks. An enterprise architecture framework (EAF) is a conceptual framework for describing the architecture of a business ...
Wieringa, Roel, Zarvic, Novica
core   +1 more source

Transcriptional network analysis of PTEN‐protein‐deficient prostate tumors reveals robust stromal reprogramming and signs of senescent paracrine communication

open access: yesMolecular Oncology, EarlyView.
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice   +16 more
wiley   +1 more source

On a model of enterprise architecture for public institutions in Romania

open access: yesResponsibility and Sustainability, 2013
This paper presents a possibility to conceive the conceptual design of a Romanian public institution using a methodology known as the “Enterprise Architecture”.
Cristian Bologa   +4 more
doaj  

Artequakt: Generating tailored biographies from automatically annotated fragments from the web [PDF]

open access: yes, 2002
The Artequakt project seeks to automatically generate narrativebiographies of artists from knowledge that has been extracted from the Web and maintained in a knowledge base.
Alani, Harith   +6 more
core  

Potential therapeutic targeting of BKCa channels in glioblastoma treatment

open access: yesMolecular Oncology, EarlyView.
This review summarizes current insights into the role of BKCa and mitoBKCa channels in glioblastoma biology, their potential classification as oncochannels, and the emerging pharmacological strategies targeting these channels, emphasizing the translational challenges in developing BKCa‐directed therapies for glioblastoma treatment.
Kamila Maliszewska‐Olejniczak   +4 more
wiley   +1 more source

INFORMATION ARCHITECTURE AND JOURNALISM CONVERGENCE:

open access: yesErgodesign & HCI, 2016
Information architecture; Digital journalism; Taxonomy, Ergodesign. This work aims to contribute, through a case study of a Brazilian newspaper, for the development of scientific literature related to online newspaper design.
Diana A. B. dos Santos, Luiz Agner
doaj   +1 more source

Janus: An Uncertain Cache Architecture to Cope with Side Channel Attacks

open access: yes, 2017
Side channel attacks are a major class of attacks to crypto-systems. Attackers collect and analyze timing behavior, I/O data, or power consumption in these systems to undermine their effectiveness in protecting sensitive information.
Darabi, Mostafa   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy