Results 71 to 80 of about 30,050 (262)

Unraveling the Morphological and Functional Maturation Mechanisms Underlying Human Neural Development Using iPSCs‐Derived Neuronal Model

open access: yesAdvanced Science, EarlyView.
Using human induced pluripotent stem cells (hiPSCs)‐derived neuronal model, Tian and colleagues reveal that voltage‐gated calcium channels Cav1.2 and Cav1.3, and their mediated calcium ion influx, are essential for early morphogenesis of human neuronal development, while ECEL1 underlies human neuronal functional developmental maturation through CALM3 ...
Yue Tian   +5 more
wiley   +1 more source

Tis-Bad: A Time Series-Based Deobfuscation Algorithm

open access: yesInvestigación e Innovación en Ingenierías, 2015
Location-Based Services (LBSs) have  brought along many benefitsto users and service providers in terms of improved quality of existing services and a better user  experience.
A Labrador   +4 more
doaj   +1 more source

Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53

open access: yesAdvanced Science, EarlyView.
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore   +20 more
wiley   +1 more source

Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2019
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to protect their designs from the threats posed by the foundries. Few of the threats are IP piracy, counterfeiting and reverse engineering. To overcome these,
V.A. Deepak   +2 more
doaj   +1 more source

Obfuscation in Bitcoin: Techniques and Politics

open access: yes, 2017
In the cryptographic currency Bitcoin, all transactions are recorded in the blockchain - a public, global, and immutable ledger. Because transactions are public, Bitcoin and its users employ obfuscation to maintain a degree of financial privacy. Critically, and in contrast to typical uses of obfuscation, in Bitcoin obfuscation is not aimed against the ...
Narayanan, Arvind, Möser, Malte
openaire   +2 more sources

A Quest for the Mechanism of Ultrahigh Resolution SEM Imaging

open access: yesAdvanced Science, EarlyView.
Using Monte Carlo simulations with explicit definitions of SE1 and SE2 align with a cascade secondary electron production model, this work shows that the 3D nanostructure modulated SE2 emission enhances other than to reduce topographical contrast via a “miniature Faraday cup” effect.
Hao Tian Chen   +3 more
wiley   +1 more source

Multi‐View Biomedical Foundation Models for Molecule‐Target and Property Prediction

open access: yesAdvanced Science, EarlyView.
Molecular foundation models can provide accurate predictions for a large set of downstream tasks. We develop MMELON, an approach that integrates pre‐trained graph, image, and text foundation models and validate our multi‐view model on over 120 tasks, including GPCR binding.
Parthasarathy Suryanarayanan   +17 more
wiley   +1 more source

Identifying obfuscated code through graph-based semantic analysis of binary code

open access: yesApplied Network Science
Protecting sensitive program content is a critical concern in various situations, ranging from legitimate use cases to unethical contexts. Obfuscation is one of the most used techniques to ensure such a protection.
Roxane Cohen   +3 more
doaj   +1 more source

DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps

open access: yesIEEE Access, 2020
The Android packing techniques were originally used to pack and conceal important information of the apps to prevent malicious developers from deconstructing the software logic.
Caijun Sun   +5 more
doaj   +1 more source

Reversible and Controllable Transition Between Filamentary and Interfacial Resistive Switching in HfO2‐Based Memristors

open access: yesAdvanced Electronic Materials, EarlyView.
5 nm HfO2 memristors exhibit a fully reversible, voltage‐controlled transition between filamentary and interfacial switching within the same device. At high voltages, a filament forms and dominates the conduction, whereas at lower voltages the device reversibly returns to interfacial mode without defect accumulation, implying a new reversible ...
Cuo Wu   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy