Results 101 to 110 of about 1,515,607 (318)
Software Execution Acceleration Using Automatic Instruction Set Extensions [PDF]
Jednou z důležitých vlastností aplikačně specifických procesorů je jejich výkon. Aby byl co největší, musí se procesor přizpůsobit potřebám aplikace, kterou bude vykonávat.
Melo, Stanislav
core
Emerging role of ARHGAP29 in melanoma cell phenotype switching
This study gives first insights into the role of ARHGAP29 in malignant melanoma. ARHGAP29 was revealed to be connected to tumor cell plasticity, promoting a mesenchymal‐like, invasive phenotype and driving tumor progression. Further, it modulates cell spreading by influencing RhoA/ROCK signaling and affects SMAD2 activity. Rho GTPase‐activating protein
Beatrice Charlotte Tröster +3 more
wiley +1 more source
Emulating a Complex Instruction Set Computer with a Reduced Instruction Set Computer
GaAs now allows up to 30K transistors per chip. With such a limitation, can you build a 32-bit CISC on a single GaAs chip? Yes, if you build a reduced instruction set computer and emulate the 32-bit CISC on it.
McNeley, K. J., Milutinovic', V. M.
openaire +2 more sources
The distribution of amorphous computer outputs [PDF]
Fitness distributions (landscapes) of programs tend to a limit as they get bigger. Markov minorization gives upper bounds ((15.3 + 2.30m)/ log I) on the length of program run on random or average computing devices.
Langdon, W.B.
core
Modeling hepatic fibrosis in TP53 knockout iPSC‐derived human liver organoids
This study developed iPSC‐derived human liver organoids with TP53 gene knockout to model human liver fibrosis. These organoids showed elevated myofibroblast activation, early disease markers, and advanced fibrotic hallmarks. The use of profibrotic differentiation medium further amplified the fibrotic signature seen in the organoids.
Mustafa Karabicici +8 more
wiley +1 more source
Modeling of a latent fault detector in a digital system [PDF]
Methods of modeling the detection time or latency period of a hardware fault in a digital system are proposed that explain how a computer detects faults in a computational mode.
Nagel, P. M.
core +1 more source
A malware instruction set for behavior-based analysis [PDF]
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient analysis of behavior using data mining and machine learning techniques.
Holz, Thorsten +3 more
core +1 more source
This study investigated how PYCR1 inhibition in bone marrow stromal cells (BMSCs) indirectly affects multiple myeloma (MM) cell metabolism and viability. Culturing MM cells in conditioned medium from PYCR1‐silenced BMSCs impaired oxidative phosphorylation and increased sensitivity to bortezomib.
Inge Oudaert +13 more
wiley +1 more source
Quadsim Version 2.1 Student Manual [PDF]
Quadsim is an intermediate code simulator. It allows you to "run" programs that your compiler generates in intermediate code format. Its user interface is similar to most debuggers in that you can step through your program, instruction by instruction ...
Shaban, Marwan
core +1 more source
Inhibition of CDK9 enhances AML cell death induced by combined venetoclax and azacitidine
The CDK9 inhibitor AZD4573 downregulates c‐MYC and MCL‐1 to induce death of cytarabine (AraC)‐resistant AML cells. This enhances VEN + AZA‐induced cell death significantly more than any combination of two of the three drugs in AraC‐resistant AML cells.
Shuangshuang Wu +18 more
wiley +1 more source

