Results 111 to 120 of about 883,754 (339)
Precision Editing of NLRS Improves Effector Recognition for Enhanced Disease Resistance
Precision engineering of plant NLR immune receptors enables rational design of enhanced pathogen resistance through mismatched pairing, domain swapping, and targeted mutagenesis. These approaches achieve multi‐fold expansion in recognition breadth while minimizing autoimmunity risks and fitness penalties.
Vinit Kumar +7 more
wiley +1 more source
Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning
Privacy policies are the primary channel through which companies inform users about their data collection and sharing practices. These policies are often long and difficult to comprehend. Short notices based on information extracted from privacy policies
Aberer, Karl +5 more
core
Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue.
Moon, Sumyung +2 more
core +1 more source
Comment on “De Novo Reconstruction of 3D Human Facial Images from DNA Sequence”
This comment examines AI‐driven DNA‐based facial reconstruction, focusing on the Difface model. While such technologies promise biomedical and forensic applications, they pose significant ethical, legal, and methodological challenges. We emphasize transparency, benchmarking, and rigorous validation to avoid misinterpretation and misuse.
Jennifer K. Wagner +3 more
wiley +1 more source
An Examination of Academic Library Privacy Policy Compliance with Professional Guidelines
Greta Valentine, Kate Barron
openalex +2 more sources
The MR‐DELTAnet model utilizes longitudinal MRI to predict treatment response after neoadjuvant chemoradiotherapy in locally rectal cancer patients, accurately identifying patients likely to achieve pathological complete response for personalized management.
Wuteng Cao +14 more
wiley +1 more source
Security Policies Approached by Value Analysis Concepts [PDF]
This paper intends to redefine the role of the end users of the Internet facilities, in the process of creation of more secure transactions on the Internet, in respect of their privacy.
Florin Buhociu +2 more
core
Using P3P in a web services-based context-aware application platform [PDF]
This paper describes a proposal for a privacy control architecture to be applied in the WASP project. The WASP project aims to develop a context-aware service platform on top of 3G networks, using web services technology.
Goncalves Filho, J. +2 more
core +1 more source
Doehl et al. discovered an adaptive neuroimmune mechanism that induces itch in tick‐exposed guinea pigs, enabling rapid tick removal. This itch‐induced tick removal (IITR) is mediated by an adaptive cellular immune response and is independent of IgG, IgE, or TRPV1.
Johannes S. P. Doehl +27 more
wiley +1 more source
COMPASS| Race, Class, and Privacy: A Critical Historical Review
This essay inspects the maldistribution of privacy rights across race and class divisions by engaging a social history of the development of these rights from their inception in American jurisprudence.
Matt Reichel
doaj +2 more sources

