Results 81 to 90 of about 2,936,543 (297)
The current static detection method of network source code vulnerabilities mainly relies on the static analysis of binary code. However, due to the failure to fully simulate the actual operating environment of programs, some vulnerabilities that trigger ...
Peng Xiao +3 more
doaj +1 more source
A graph-search framework for associating gene identifiers with documents
Background One step in the model organism database curation process is to find, for each article, the identifier of every gene discussed in the article.
Cohen William W, Minkov Einat
doaj +1 more source
A new intrinsically knotted graph with 22 edges
A graph is called intrinsically knotted if every embedding of the graph contains a knotted cycle. Johnson, Kidwell and Michael showed that intrinsically knotted graphs have at least 21 edges.
Kim, Hyoungjun +4 more
core +1 more source
Skin biopsies taken from a patient with an ultra‐rare disorder as well as controls were cultured for up to 473 days. The chunks of skin were serially transferred to a new culture plate when confluent with fibroblasts. Different generations of fibroblasts were analyzed for cell and molecular properties, proliferation, and competence for reprogramming to
Sudiksha Rathan‐Kumar +3 more
wiley +1 more source
Explainable Reasoning over Knowledge Graphs for Recommendation
Incorporating knowledge graph into recommender systems has attracted increasing attention in recent years. By exploring the interlinks within a knowledge graph, the connectivity between users and items can be discovered as paths, which provide rich and ...
Cao, Yixin +5 more
core +1 more source
Autophagosome marker, LC3, is released extracellularly via several distinct pathways
This study establishes a novel HiBiT‐tagging system for ultrasensitive detection of LC3, revealing multiple pathways for its extracellular secretion. It demonstrates that LC3 is released via both autophagy‐dependent and ‐independent mechanisms, including a novel route for nonlipidated LC3‐I.
Koki Saito +3 more
wiley +1 more source
Graph Hybrid Summarization [PDF]
One solution to process and analysis of massive graphs is summarization. Generating a high quality summary is the main challenge of graph summarization.
N. Ashrafi Payaman, M.R. Kangavari
doaj +1 more source
Semi-automatic annotation process for procedural texts: An application on cooking recipes [PDF]
Taaable is a case-based reasoning system that adapts cooking recipes to user constraints. Within it, the preparation part of recipes is formalised as a graph.
Ber, Florence Le +4 more
core +2 more sources
We investigated the toxicity of 12 active compounds commonly found in herbal weight loss supplements (WLS) using human liver and colon cell models. Epigallocatechin‐3‐gallate was the only compound showing significant toxicity. Metabolic profiling revealed protein degradation, disrupted energy and lipid metabolism suggesting that the inclusion of EGCG ...
Emily C. Davies +3 more
wiley +1 more source
Background Named Entity Linking systems are a powerful aid to the manual curation of digital libraries, which is getting increasingly costly and inefficient due to the information overload.
Pedro Ruas +2 more
doaj +1 more source

