Results 71 to 80 of about 11,052,815 (324)

The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity

open access: yes, 2017
Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective.
Callahan, John, Othman, Asem
core   +1 more source

Maintaining consistency in distributed systems [PDF]

open access: yes, 1991
In systems designed as assemblies of independently developed components, concurrent access to data or data structures normally arises within individual programs, and is controlled using mutual exclusion constructs, such as semaphores and monitors.
Birman, Kenneth P.
core   +3 more sources

Interplay between circadian and other transcription factors—Implications for cycling transcriptome reprogramming

open access: yesFEBS Letters, EarlyView.
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley   +1 more source

Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing

open access: yesFEBS Letters, EarlyView.
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley   +1 more source

Digital Scholarly Journals Are Poorly Preserved: A Study of 7 Million Articles

open access: yesJournal of Librarianship and Scholarly Communication
Introduction: Digital preservation underpins the persistence of scholarly links and citations through the digital object identifier (DOI) system. We do not currently know, at scale, the extent to which articles assigned a DOI are adequately preserved ...
Martin Paul Eve
doaj   +2 more sources

The role of histone modifications in transcription regulation upon DNA damage

open access: yesFEBS Letters, EarlyView.
This review discusses the critical role of histone modifications in regulating gene expression during the DNA damage response (DDR). By modulating chromatin structure and recruiting repair factors, these post‐translational modifications fine‐tune transcriptional programmes to maintain genomic stability.
Angelina Job Kolady, Siyao Wang
wiley   +1 more source

Persistent Identifiers for Instruments and Facilities: Current State, Challenges, and Opportunities

open access: yesJournal of eScience Librarianship
Objective: Persistent Identifiers (PIDs) are central to the vision of open science described in the FAIR Principles. However, the use of PIDs for scientific instruments and facilities is decentralized and fragmented.
Aditya Ranganath   +6 more
doaj   +2 more sources

Temporal Stream Algebra [PDF]

open access: yes, 2012
Data stream management systems (DSMS) so far focus on event queries and hardly consider combined queries to both data from event streams and from a database.
Brodt, Simon, Bry, François
core   +4 more sources

Mechanisms of parasite‐mediated disruption of brain vessels

open access: yesFEBS Letters, EarlyView.
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy