Results 71 to 80 of about 1,628,358 (345)
Trust and privacy in distributed work groups [PDF]
Proceedings of the 2nd International Workshop on Social Computing, Behavioral Modeling and PredictionTrust plays an important role in both group cooperation and economic exchange.
C Shapiro+15 more
core +1 more source
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić+31 more
wiley +1 more source
This study simultaneously investigated circulating tumor cells (CTCs) and exosomes from small‐cell lung cancer (SCLC) patients. The elevated expression of JUNB and CXCR4 in CTCs was a poor prognostic factor for SCLC patients, whereas exosomal overexpression of these biomarkers revealed a high discrimination ability of patients from healthy individuals,
Dimitrios Papakonstantinou+13 more
wiley +1 more source
Hiding Contextual Information for Defending a Global Attacker
As wireless sensor networks are mostly deployed in harsh and hostile environments, lack of human maintenance, it has become a severe challenge to offer security or privacy service, especially when facing a powerful attacker.
Qian Zhou, Xiaolin Qin, Xiaojun Xie
doaj +1 more source
Clinical significance of stratifying prostate cancer patients through specific circulating genes
We tested a specific panel of genes representative of luminal, neuroendocrine and stem‐like cells in the blood of prostate cancer patients, showing predictive value from diagnosis to late stages of disease. This approach allows monitoring of treatment responses and outcomes at specific time points in trajectories.
Seta Derderian+12 more
wiley +1 more source
Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems
Recommendation systems are information-filtering systems that tailor information to users on the basis of knowledge about their preferences. The ability of these systems to profile users is what enables such intelligent functionality, but at the same ...
Javier Parra-Arnau+2 more
doaj +1 more source
In smart systems, attackers can use botnets to launch different cyber attack activities against the Internet of Things. The traditional methods of detecting botnets commonly used machine learning algorithms, and it is difficult to detect and control ...
Li Duan+3 more
doaj +1 more source
Unilateral Invasions of Privacy [PDF]
Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used.
Ford, Roger Allan
core +2 more sources
MET variants in the N‐lobe of the kinase domain, found in hereditary papillary renal cell carcinoma, require ligand stimulation to promote cell transformation, in contrast to other RTK variants. This suggests that HGF expression in the microenvironment is important for tumor growth in such patients. Their sensitivity to MET inhibitors opens the way for
Célia Guérin+14 more
wiley +1 more source
SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors
People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station.
Tai-Hoon Kim+2 more
doaj +1 more source