Results 51 to 60 of about 9,397,880 (350)

A Methodology for Information Flow Experiments [PDF]

open access: yes, 2014
Information flow analysis has largely ignored the setting where the analyst has neither control over nor a complete model of the analyzed system. We formalize such limited information flow analyses and study an instance of it: detecting the usage of data
Datta, Amit   +3 more
core   +1 more source

Goodbye flat lymphoma biology

open access: yesFEBS Letters, EarlyView.
Three‐dimensional (3D) biological systems have become key tools in lymphoma research, offering reliable in vitro and ex vivo platforms to explore pathogenesis and support precision medicine. This review highlights current 3D non‐Hodgkin lymphoma models, detailing their features, advantages, and limitations, and provides a broad perspective on future ...
Carla Faria   +3 more
wiley   +1 more source

Microservices Validation: Methodology and Implementation [PDF]

open access: yes, 2015
Due to the wide spread of cloud computing, arises actual question about architecture, design and implementation of cloud applications. The microservice model describes the design and development of loosely coupled cloud applications when computing ...
Radchenko, G., Savchenko, D.
core  

From omics to AI—mapping the pathogenic pathways in type 2 diabetes

open access: yesFEBS Letters, EarlyView.
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan   +2 more
wiley   +1 more source

iPhone forensics methodology and tools [PDF]

open access: yes, 2008
iPhone mobile devices are rapidly overtaking the new generation of mobile phones market, especially among the young generation. It is also gaining a lot of popularity among security specialists and fancy gadgets for collectors.
Al-Hajri, Haitham, Sansurooah, Krishnun
core   +1 more source

A methodology for testing virtualisation security [PDF]

open access: yes, 2017
There is a growing interest in virtualisation due to its central role in cloud computing, virtual desktop environments and Green IT. Data centres and cloud computing utilise this technology to run multiple operating systems on one physical server, thus ...
Coull, Natalie   +2 more
core   +1 more source

The multidrug and toxin extrusion (MATE) transporter DTX51 antagonizes non‐cell‐autonomous HLS1–AMP1 signaling in a region‐specific manner

open access: yesFEBS Letters, EarlyView.
The Arabidopsis mutants hls1 hlh1 and amp1 lamp1 exhibit pleiotropic developmental phenotypes. Although the functions of the causative genes remain unclear, they act in the same genetic pathway and are thought to generate non‐cell‐autonomous signals.
Takashi Nobusawa, Makoto Kusaba
wiley   +1 more source

So-called gray zone between athlete's heart and hypertrophic cardiomyopathy- the significance of new imaging techniques in differential diagnosis

open access: yesJournal of Education, Health and Sport, 2018
Background Athlete's heart characterized many adaptive changes in the heart in response to physical exertion. The discovery of the "heart of the athlete" phenomenon was made by Henschen already at the end of the 19th century during physical examination ...
Urszula Fałkowska   +5 more
doaj   +3 more sources

Economic evaluation of LIFE methodology [PDF]

open access: yes, 2007
Background: The LIFE project (Lifecycle Information For E-Literature) was carried out during 2004-2006 by a consortium consisting of The British Library and University College London Library Services .
Björk, B.-C.
core  

BitTorrent Sync: Network Investigation Methodology

open access: yes, 2014
The volume of personal information and data most Internet users find themselves amassing is ever increasing and the fast pace of the modern world results in most requiring instant access to their files.
Farina, Jason   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy