Results 71 to 80 of about 30,050 (262)
Using human induced pluripotent stem cells (hiPSCs)‐derived neuronal model, Tian and colleagues reveal that voltage‐gated calcium channels Cav1.2 and Cav1.3, and their mediated calcium ion influx, are essential for early morphogenesis of human neuronal development, while ECEL1 underlies human neuronal functional developmental maturation through CALM3 ...
Yue Tian +5 more
wiley +1 more source
Tis-Bad: A Time Series-Based Deobfuscation Algorithm
Location-Based Services (LBSs) have brought along many benefitsto users and service providers in terms of improved quality of existing services and a better user experience.
A Labrador +4 more
doaj +1 more source
Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore +20 more
wiley +1 more source
Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques [PDF]
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to protect their designs from the threats posed by the foundries. Few of the threats are IP piracy, counterfeiting and reverse engineering. To overcome these,
V.A. Deepak +2 more
doaj +1 more source
Obfuscation in Bitcoin: Techniques and Politics
In the cryptographic currency Bitcoin, all transactions are recorded in the blockchain - a public, global, and immutable ledger. Because transactions are public, Bitcoin and its users employ obfuscation to maintain a degree of financial privacy. Critically, and in contrast to typical uses of obfuscation, in Bitcoin obfuscation is not aimed against the ...
Narayanan, Arvind, Möser, Malte
openaire +2 more sources
A Quest for the Mechanism of Ultrahigh Resolution SEM Imaging
Using Monte Carlo simulations with explicit definitions of SE1 and SE2 align with a cascade secondary electron production model, this work shows that the 3D nanostructure modulated SE2 emission enhances other than to reduce topographical contrast via a “miniature Faraday cup” effect.
Hao Tian Chen +3 more
wiley +1 more source
Multi‐View Biomedical Foundation Models for Molecule‐Target and Property Prediction
Molecular foundation models can provide accurate predictions for a large set of downstream tasks. We develop MMELON, an approach that integrates pre‐trained graph, image, and text foundation models and validate our multi‐view model on over 120 tasks, including GPCR binding.
Parthasarathy Suryanarayanan +17 more
wiley +1 more source
Identifying obfuscated code through graph-based semantic analysis of binary code
Protecting sensitive program content is a critical concern in various situations, ranging from legitimate use cases to unethical contexts. Obfuscation is one of the most used techniques to ensure such a protection.
Roxane Cohen +3 more
doaj +1 more source
DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps
The Android packing techniques were originally used to pack and conceal important information of the apps to prevent malicious developers from deconstructing the software logic.
Caijun Sun +5 more
doaj +1 more source
5 nm HfO2 memristors exhibit a fully reversible, voltage‐controlled transition between filamentary and interfacial switching within the same device. At high voltages, a filament forms and dominates the conduction, whereas at lower voltages the device reversibly returns to interfacial mode without defect accumulation, implying a new reversible ...
Cuo Wu +8 more
wiley +1 more source

