Results 21 to 30 of about 43,904 (233)
Unification and Matching on Compressed Terms [PDF]
Term unification plays an important role in many areas of computer science, especially in those related to logic. The universal mechanism of grammar-based compression for terms, in particular the so-called Singleton Tree Grammars (STG), have recently ...
Gascón, Adrià +2 more
core
Structured Prediction of Sequences and Trees using Infinite Contexts
Linguistic structures exhibit a rich array of global phenomena, however commonly used Markov models are unable to adequately describe these phenomena due to their strong locality assumptions.
C Zhu +4 more
core +1 more source
This study constructed the first spatiotemporal multi‐omics map of peach fruit and discovered a key candidate gene that synergistically regulates trichome development and drought tolerance through the jasmonic acid signaling pathway, providing insights into the coupling mechanism between development and stress resistance.
Zhixin Liu +9 more
wiley +1 more source
Photoreceptor Outer Segment-like Structures in Long-Term 3D Retinas from Human Pluripotent Stem Cells. [PDF]
The retinal degenerative diseases, which together constitute a leading cause of hereditary blindness worldwide, are largely untreatable. Development of reliable methods to culture complex retinal tissues from human pluripotent stem cells (hPSCs) could ...
Angueyra, Juan M +9 more
core +1 more source
Ammonia Detoxification Inhibits Liver Metastasis by Reshaping Hepatic Microenvironment
Liver metastasis diverts aspartate into hyperactive pyrimidine synthesis, disrupting urea cycling and causing pathogenic ammonia accumulation. Ammonia dually reprograms the microenvironment by: (1) activating hepatic stellate cells (HSCs) into pro‐fibrotic metastasis‐associated fibroblasts (MAFs), and (2) suppressing anti‐tumor monocytes/macrophages ...
Sumin Sun +5 more
wiley +1 more source
Multi-Factor Authentication and Fingerprint-based Debit Card System
One thing can be said to be common to all forms of debit card fraud – authentication bypass. This implies that a secure debit card transaction system can only be guaranteed by a safe and reliable authentication system.
Mubarak Adetunji Ojewale +1 more
doaj +1 more source
Chip and Skim: cloning EMV cards with the pre-play attack [PDF]
EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication
Anderson, Ross +4 more
core +1 more source
A survey of handover algorithms in DVB-H [PDF]
Digital Video Broadcasting for Handhelds (DVB-H) is a standard for broadcasting IP Datacast (IPDC) services to mobile handheld terminals. Based on the DVB-T standard, DVB-H adds new features such as time slicing, MPE-FEC, in-depth interleavers ...
Owens, TJ, Vare, J, Yang, XD
core +1 more source
Although the tumor microenvironment is known to shape immunotherapy response, its key determinants remain elusive, underscoring the critical need for single‐cell resolution analytical frameworks. We present scResponse, an efficient algorithm to quantify single‐cell responses to immunotherapy. By capturing diverse cellular subtypes and states associated
Qi Dong +21 more
wiley +1 more source
CURRENT STATE AND DEVELOPMENT PROSPECTS OF CASHLESS
In Ukraine financial sector reform, whose main objective is to reduce cash and expanse cashless payment amount by using modern remote channels, is conducted.The article discusses the theoretical foundations providing of traditional and remote banking ...
Zoryana Rudenko
doaj +1 more source

