Results 71 to 80 of about 554,031 (298)
Using graph distances for named-entity linking
We formalize entity linking as an optimization problem.The problem is NP-hard but solvable in linear time under restrictive assumptions.We propose heuristics enforcing the assumptions or optimizing similar objectives.We show how our approaches perform w.r.t. some baselines on real data. Entity-linking is a natural-language-processing task that consists
Blanco Roi, Boldi Paolo, Marino Andrea
openaire +4 more sources
This study optimizes a two‐step induction system to generate PGCLCs from chicken ESCs. The induced cells express germline markers and migrate to gonads in ovo, offering a novel approach for avian genetic resource conservation. Primordial germ cells (PGCs) are the progenitor cells of sperm and eggs.
Zeyu Li +10 more
wiley +1 more source
Given the remarkable text generation capabilities of pre-trained language models, impressive results have been realized in graph-to-text generation.
Yao Zheng +5 more
doaj +1 more source
REDEN: Named Entity Linking in Digital Literary Editions Using Linked Data Sets
This paper proposes a graph-based Named Entity Linking (NEL) algorithm named REDEN for the disambiguation of authors’ names in French literary criticism texts and scientific essays from the 19th and early 20th centuries.
Carmen Brando +2 more
doaj +1 more source
Graph Transformations and Game Theory: A Generative Mechanism for Network Formation [PDF]
Many systems can be described in terms of networks with characteristic structural properties. To better understand the formation and the dynamics of complex networks one can develop generative models.
Cavaliere, Matteo +2 more
core
HSP70 governs permeability and mechanotransduction in primary human endothelial cells
HSP70 chemical inhibition reduces endothelial cell proliferation and increases permeability, the latter supported by normal interendothelial junctional protein distribution. HSP70 also plays a role in shear stress response, a hemodynamic force naturally present in blood vessels and correlated with vessel protection.
Andrea Pinto‐Martinez +5 more
wiley +1 more source
The current static detection method of network source code vulnerabilities mainly relies on the static analysis of binary code. However, due to the failure to fully simulate the actual operating environment of programs, some vulnerabilities that trigger ...
Peng Xiao +3 more
doaj +1 more source
A graph-search framework for associating gene identifiers with documents
Background One step in the model organism database curation process is to find, for each article, the identifier of every gene discussed in the article.
Cohen William W, Minkov Einat
doaj +1 more source
Skin biopsies taken from a patient with an ultra‐rare disorder as well as controls were cultured for up to 473 days. The chunks of skin were serially transferred to a new culture plate when confluent with fibroblasts. Different generations of fibroblasts were analyzed for cell and molecular properties, proliferation, and competence for reprogramming to
Sudiksha Rathan‐Kumar +3 more
wiley +1 more source
Autophagosome marker, LC3, is released extracellularly via several distinct pathways
This study establishes a novel HiBiT‐tagging system for ultrasensitive detection of LC3, revealing multiple pathways for its extracellular secretion. It demonstrates that LC3 is released via both autophagy‐dependent and ‐independent mechanisms, including a novel route for nonlipidated LC3‐I.
Koki Saito +3 more
wiley +1 more source

