Results 31 to 40 of about 848,920 (295)
Cellular Underwater Wireless Optical CDMA Network: Potentials and Challenges [PDF]
Underwater wireless optical communications is an emerging solution to the expanding demand for broadband links in oceans and seas. In this paper, a cellular underwater wireless optical code division multiple-access (UW-OCDMA) network is proposed to ...
Akhoundi, Farhad +5 more
core +2 more sources
The Chronus Quantum (ChronusQ) Software Package [PDF]
The Chronus Quantum (ChronusQ) software package is an open source (under the GNU General Public License v2) software infrastructure which targets the solution of challenging problems that arise in ab initio electronic structure theory.
DePrince III, A. Eugene +14 more
core +2 more sources
Trusted Execution Environments: Applications and Organizational Challenges
A lack of trust in the providers is still a major barrier to cloud computing adoption – especially when sensitive data is involved. While current privacy-enhancing technologies, such as homomorphic encryption, can increase security, they come with a ...
Tim Geppert +3 more
doaj +1 more source
Design and Implementation of a Zero Trust Access Control Model Driven by Session Lifecycle
In modern network security management, access control is a crucial defense mechanism. However, traditional static definitions and software-defined approaches face security risks such as authorization and revocation delays, as well as difficulties in ...
Pan Chang, Gang Xu
doaj +1 more source
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee +3 more
wiley +1 more source
Towards Product Lining Model-Driven Development Code Generators [PDF]
A code generator systematically transforms compact models to detailed code. Today, code generation is regarded as an integral part of model-driven development (MDD).
Roth, Alexander, Rumpe, Bernhard
core +1 more source
Multi-Party Coordination in the Context of MOWS [PDF]
Separation of concerns has been presented as a promising tool to tackle the design of complex systems in which cross-cutting properties that do not fit into the scope of a class must be satisfied.
Corchuelo Gil, Rafael +2 more
core +1 more source
Structural insights into an engineered feruloyl esterase with improved MHET degrading properties
A feruloyl esterase was engineered to mimic key features of MHETase, enhancing the degradation of PET oligomers. Structural and computational analysis reveal how a point mutation stabilizes the active site and reshapes the binding cleft, expading substrate scope.
Panagiota Karampa +5 more
wiley +1 more source
SecLLM: Enhancing Security Smell Detection in IaC With Large Language Models
The emergence and expansion of Infrastructure-as-Code (IaC) paradigms have transformed cloud provisioning methodologies, while simultaneously introducing complex security smells.
Gabriele De Vito +2 more
doaj +1 more source
We developed and validated a DNA methylation–based biomarker panel to distinguish pleural mesothelioma from other pleural conditions. Using the IMPRESS technology, we translated this panel into a clinically applicable assay. The resulting two classifier models demonstrated excellent performance, achieving high AUC values and strong diagnostic accuracy.
Janah Vandenhoeck +12 more
wiley +1 more source

