Results 101 to 110 of about 367,191 (281)

Allogeneic Immune Cell Perfusion Inhibits the Growth of Vascularized 3D In Vitro Tumor Models, Induces Vascular Regression and Desmoplasia, but Promotes Tumor Cell Invasion

open access: yesAdvanced Science, EarlyView.
This study presents a vascularized 3D tumor model to investigate immune–stromal–tumor interactions under allogeneic PBMC perfusion. While immune cells induced tumor shrinkage, they also promoted vascular regression, stromal activation, and cancer cell invasion.
Alexandra Raab   +8 more
wiley   +1 more source

An Insulin‐Exosome‐TNFAIP8 Axis Drives Stromal Fibrosis and Therapeutic Resistance in Pancreatic Cancer

open access: yesAdvanced Science, EarlyView.
In pancreatic ductal adenocarcinoma (PDAC), insulin is associated with activation of PI3K/AKT–RAB3A signaling and enhanced secretion of TNFAIP8‐enriched exosomes from tumor cells. Uptake of these exosomes by fibroblasts is linked to TRIM21‐dependent STAT1 degradation and the emergence of myofibroblastic CAF–associated features, accompanied by increased
Zhenyu Li   +15 more
wiley   +1 more source

Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries

open access: yesTongxin xuebao, 2016
Without need for the third party and sharing key, the dummy-based privacy protection scheme enabled users to obtain the precise query result in location-based services.
Hai LIU   +3 more
doaj   +2 more sources

High‐Fidelity Synthetic Data Replicates Clinical Prediction Performance in a Million‐Patient Diabetes Cohort

open access: yesAdvanced Science, EarlyView.
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño   +5 more
wiley   +1 more source

LOCATION SHARING: PRIVACY THREATS AND PROTECTION

open access: yes, 2015
In recent years there has been a growing increase in the number of users that use smartphones,tablets, wearable technologies and other devices that users have with them constantly. The capability of these latest generation mobile devices to detect the position of the users has led to the emergence of ad-hoc services as well as geo-aware social networks
openaire   +2 more sources

An Increasing Misalignment Between Crop Distribution and Environmental Resources Under Climate Change in China

open access: yesAdvanced Science, EarlyView.
Climate change reshapes the spatial alignment between crop production and environmental resources. Using multi‐source data and a crop model, integrated climatic, water, and soil endowments for maize and wheat are quantified and compared with harvest distributions.
Zheng'e Su   +13 more
wiley   +1 more source

Implanting Life-Cycle Privacy Policies in a Context Database [PDF]

open access: yes, 2006
Ambient intelligence (AmI) environments continuously monitor surrounding individuals' context (e.g., location, activity, etc.) to make existing applications smarter, i.e., make decision without requiring user interaction.
Anciaux, Nicolas   +3 more
core   +2 more sources

Linearizing and Forecasting: A Reservoir Computing Route to Digital Twins of the Brain

open access: yesAdvanced Science, EarlyView.
A new approach uses simple neural networks to create digital twins of brain activity, capturing how different patterns unfold over time. The method generates and recovers key dynamics even from noisy data. When applied to fMRI, it predicts brain signals and reveals distinctive activity patterns across regions and individuals, opening possibilities for ...
Gabriele Di Antonio   +3 more
wiley   +1 more source

Discovery of an Adaptive Neuroimmune Response Driving Itch and Fast Tick Removal with Implications for Preventing Pathogen Transmission

open access: yesAdvanced Science, EarlyView.
Itch‐induced tick removal (IITR): An acquired neuroimmune mechanism, itch‐induced tick removal, develops after repeated tick exposure, mobilizing T cells and macrophages at the tick bite site to trigger a rapid scratching response that facilitates timely tick removal within a critical window that preces the transmission of many tick‐borne pathogens ...
Johannes S. P. Doehl   +27 more
wiley   +1 more source

Home - About - Disclaimer - Privacy