Results 51 to 60 of about 9,397,880 (350)
A Methodology for Information Flow Experiments [PDF]
Information flow analysis has largely ignored the setting where the analyst has neither control over nor a complete model of the analyzed system. We formalize such limited information flow analyses and study an instance of it: detecting the usage of data
Datta, Amit+3 more
core +1 more source
Three‐dimensional (3D) biological systems have become key tools in lymphoma research, offering reliable in vitro and ex vivo platforms to explore pathogenesis and support precision medicine. This review highlights current 3D non‐Hodgkin lymphoma models, detailing their features, advantages, and limitations, and provides a broad perspective on future ...
Carla Faria+3 more
wiley +1 more source
Microservices Validation: Methodology and Implementation [PDF]
Due to the wide spread of cloud computing, arises actual question about architecture, design and implementation of cloud applications. The microservice model describes the design and development of loosely coupled cloud applications when computing ...
Radchenko, G., Savchenko, D.
core
From omics to AI—mapping the pathogenic pathways in type 2 diabetes
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan+2 more
wiley +1 more source
iPhone forensics methodology and tools [PDF]
iPhone mobile devices are rapidly overtaking the new generation of mobile phones market, especially among the young generation. It is also gaining a lot of popularity among security specialists and fancy gadgets for collectors.
Al-Hajri, Haitham, Sansurooah, Krishnun
core +1 more source
A methodology for testing virtualisation security [PDF]
There is a growing interest in virtualisation due to its central role in cloud computing, virtual desktop environments and Green IT. Data centres and cloud computing utilise this technology to run multiple operating systems on one physical server, thus ...
Coull, Natalie+2 more
core +1 more source
The Arabidopsis mutants hls1 hlh1 and amp1 lamp1 exhibit pleiotropic developmental phenotypes. Although the functions of the causative genes remain unclear, they act in the same genetic pathway and are thought to generate non‐cell‐autonomous signals.
Takashi Nobusawa, Makoto Kusaba
wiley +1 more source
Background Athlete's heart characterized many adaptive changes in the heart in response to physical exertion. The discovery of the "heart of the athlete" phenomenon was made by Henschen already at the end of the 19th century during physical examination ...
Urszula Fałkowska+5 more
doaj +3 more sources
Economic evaluation of LIFE methodology [PDF]
Background: The LIFE project (Lifecycle Information For E-Literature) was carried out during 2004-2006 by a consortium consisting of The British Library and University College London Library Services .
Björk, B.-C.
core
BitTorrent Sync: Network Investigation Methodology
The volume of personal information and data most Internet users find themselves amassing is ever increasing and the fast pace of the modern world results in most requiring instant access to their files.
Farina, Jason+2 more
core +1 more source