Results 91 to 100 of about 9,050,905 (317)
Research on LLM Vector Dot Product Acceleration Based on RISC-V Matrix Instruction Set Extension [PDF]
Considering the high-performance and low-power requirements of edge AI,this paper designs a specialized instruction set processor for edge AI based on the RISC-V instruction set architecture,addressing practical issues in digital signal processing for ...
CHEN Xuhao, HU Sipeng, LIU Hongchao, LIU Boran, TANG Dan, ZHAO Di
doaj +1 more source
Biomolecular condensates formed by fused in sarcoma (FUS) are dissolved by high ATP concentrations yet persist in cells. Using a reconstituted system, we demonstrate that valosin‐containing protein (VCP), an AAA+ ATPase, counteracts ATP‐driven dissolution of FUS condensates through its D2 ATPase activity.
Hitomi Kimura +2 more
wiley +1 more source
An isoform of 14‐3‐3 protein regulates transbilayer lipid movement at the plasma membrane
Loss of 14‐3‐3ζ in CHO cells confers resistance to exogenous phosphatidylserine (PS) and impairs endocytosis‐independent inward flip‐flop of fluorescent PS at the plasma membrane. RNAi‐mediated knockdown reproduces this defect, while no additive effect is seen in ATP11C‐deficient cells.
Akiko Yamaji‐Hasegawa +3 more
wiley +1 more source
Quadsim Version 2.1 Student Manual [PDF]
Quadsim is an intermediate code simulator. It allows you to "run" programs that your compiler generates in intermediate code format. Its user interface is similar to most debuggers in that you can step through your program, instruction by instruction ...
Shaban, Marwan
core +1 more source
The ubiquitin ligase RNF115 is required for the clearance of damaged lysosomes
Upon lysosomal rupture, an E3 ubiquitin ligase RNF115 translocates from the cytosol to the damaged lysosomal membrane. Moreover, RNF115 depletion impairs the clearance of damaged lysosomes, identifying it as a key regulator of lysosomal quality control.
Sae Nakanaga +3 more
wiley +1 more source
Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity
To protect programs from unauthorized analysis, virtualize the code based on Virtual Machine (VM) technologies is emerging as a feasible method for accomplishing code obfuscation.
Wei Wang +9 more
doaj +1 more source
An efficient implementation of Slater-Condon rules [PDF]
Slater-Condon rules are at the heart of any quantum chemistry method as they allow to simplify $3N$-dimensional integrals as sums of 3- or 6-dimensional integrals.
Giner, Emmanuel, Scemama, Anthony
core
DiVM: Model Checking with LLVM and Graph Memory
In this paper, we introduce the concept of a virtual machine with graph-organised memory as a versatile backend for both explicit-state and abstraction-driven verification of software. Our virtual machine uses the LLVM IR as its instruction set, enriched
Barnat, Jiří +3 more
core +1 more source
ERRFI1, a neural crest (NC)‐associated gene, was upregulated in melanoma and negatively correlated with the expression of melanocytic differentiation markers and the susceptibility of melanoma cells toward BRAF inhibitors (BRAFi). Knocking down ERRFI1 significantly increased the sensitivity of melanoma cells to BRAFi.
Nina Wang +8 more
wiley +1 more source
PROBLEMATIKA GURU MATA PELAJARAN BIOLOGI KELAS SEPULUH SMA NEGERI SEKOTA KEDIRI TAHUN AJARAN 2007/2008 DALAM PELAKSANAAN KURIKULUM TINGKAT SATUAN PENDIDIKAN (KTSP) [PDF]
Type Research the used is descriptive research with approach qualitative. Subject of this research is set of problem instruction of biology faced by teacher in executing KTSP, and him of is biological subject teacher of class of X (ten) High School in ...
PUSPITASARI, DIANA
core

