Results 41 to 50 of about 944,819 (280)

Perspectives in educating molecular pathologists on liquid biopsy: Toward integrative, equitable, and decentralized precision oncology

open access: yesMolecular Oncology, EarlyView.
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié   +13 more
wiley   +1 more source

Address Configuration Scheme for All-IP Vehicular Network Based on Hierarchical Mechanism [PDF]

open access: yesJisuanji gongcheng, 2020
To address the problem that the speed of vehicle nodes affects the stability of IPv6 vehicular network,this paper proposes an address configuration scheme for all-IP vehicular network.
LI Yanli, WANG Xiaonan
doaj   +1 more source

Cell surface interactome analysis identifies TSPAN4 as a negative regulator of PD‐L1 in melanoma

open access: yesMolecular Oncology, EarlyView.
Using cell surface proximity biotinylation, we identified tetraspanin TSPAN4 within the PD‐L1 interactome of melanoma cells. TSPAN4 negatively regulates PD‐L1 expression and lateral mobility by limiting its interaction with CMTM6 and promoting PD‐L1 degradation.
Guus A. Franken   +7 more
wiley   +1 more source

Mobile IP Address Efficiency

open access: yesJournal of Communications Software and Systems, 2006
In future wireless networks, Mobile IP will be widely deployed as a general mobility protocol. Currently, in theprotocol each mobile node (MN) should have one public home address to identify itself when it is away from home.
Zhen Zhen, Srinivas Sampalli
doaj  

The Value of Geographic Locations Submitted by Internet Users

open access: yesIEEE Access, 2018
Internet users may be asked to manually provide their contact details, including city or full postal address. Examples include use of trial/free applications and services, filling out on-line surveys and petitions, and membership registration to loyalty ...
Dan Komosny, Miralem Mehic
doaj   +1 more source

PARP inhibition and pharmacological ascorbate demonstrate synergy in castration‐resistant prostate cancer

open access: yesMolecular Oncology, EarlyView.
Pharmacologic ascorbate (vitamin C) increases ROS, disrupts cellular metabolism, and induces DNA damage in CRPC cells. These effects sensitize tumors to PARP inhibition, producing synergistic growth suppression with olaparib in vitro and significantly delayed tumor progression in vivo. Pyruvate rescue confirms ROS‐dependent activity.
Nicolas Gordon   +13 more
wiley   +1 more source

Fast and Scalable IP Address Lookup with Time Complexity of LogmLogm(n)

open access: yesJournal of Advances in Information Technology, 2014
Router is a device which is used to route the incoming data packets from the sender to the destination using the IP address of the destination side.
Abhishant Prakash, Alok Sagar Gautam
doaj   +1 more source

Development of security in wireless sensor network using IPv6 [PDF]

open access: yes, 2009
The Wireless Sensor Networks (WSNs) is one of core technologies expected to become a potential basis of future ever-present networks. WSN consists of multiple low cost sensor nodes, which could either, have a fixed location or randomly deployed that ...
Jayapal, Vikneswary
core  

Recurrent cancer‐associated ERBB4 mutations are transforming and confer resistance to targeted therapies

open access: yesMolecular Oncology, EarlyView.
We show that the majority of the 18 analyzed recurrent cancer‐associated ERBB4 mutations are transforming. The most potent mutations are activating, co‐operate with other ERBB receptors, and are sensitive to pan‐ERBB inhibitors. Activating ERBB4 mutations also promote therapy resistance in EGFR‐mutant lung cancer.
Veera K. Ojala   +15 more
wiley   +1 more source

De-anonymizing BitTorrent Users on Tor [PDF]

open access: yes, 2010
Some BitTorrent users are running BitTorrent on top of Tor to preserve their privacy. In this extended abstract, we discuss three different attacks to reveal the IP address of BitTorrent users on top of Tor.
Blond, Stevens Le   +6 more
core   +4 more sources

Home - About - Disclaimer - Privacy