Results 121 to 130 of about 747,487 (289)
Data security, privacy, and identity theft: The economics behind the policy debates [PDF]
Privacy ; Identity theft ; Data ...
Stacey L. Schreft, William Roberds
core
Hard‐Magnetic Soft Millirobots in Underactuated Systems
This review provides a comprehensive overview of hard‐magnetic soft millirobots in underactuated systems. It examines key advances in structural design, physics‐informed modeling, and control strategies, while highlighting the interplay among these domains.
Qiong Wang +4 more
wiley +1 more source
Privacy matters: Payments Cards Center Workshop on the right to privacy and the financial services industry. [PDF]
"Privacy Matters: Payments Cards Center Workshop on the Right to Privacy and the Financial Services Industry," summarizes the main points of a workshop sponsored by the Bank's Payment Cards Center.
Sarah A. Burke
core
An autologous whole‐tumor‐cell vaccine (rWTC‐MBTA) is evaluated in murine CNS lymphoma. Subcutaneous vaccination activates dendritic cells, broadens T‐cell priming, and drives lymphocyte trafficking to brain tumors, producing durable tumor control. Longitudinal bioluminescence and adoptive‐transfer assays verify CNS engagement. Combination with anti‐PD‐
Yaping Zhang +10 more
wiley +1 more source
By integrating single‐nuclei and spatial transcriptomics, this study presents a stereoscopic landscape of maize leaf to Puccinia polysora infection. Epidermal and mesophyll cells initiate primary defenses via RLPs/RLKs and jasmonic acid signaling. Cell‐cell communication analyses further reveal the underlying the dynamics of the underlying immune ...
Qiongqiong Wang +16 more
wiley +1 more source
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño +5 more
wiley +1 more source
Privacy Preserving Content Protection (Privacy behoud content protection)
De vooruitgang van informatie- en communicatietechnologie in de laatste decennia heeft de manier waarop informatie wordt verzameld en verwerkt grondig beїnvloed. Dit roept echter ook vraagtekens op rond de manier waarop met privacy wordt omgegaan.
openaire +1 more source
Climate change reshapes the spatial alignment between crop production and environmental resources. Using multi‐source data and a crop model, integrated climatic, water, and soil endowments for maize and wheat are quantified and compared with harvest distributions.
Zheng'e Su +13 more
wiley +1 more source
Linearizing and Forecasting: A Reservoir Computing Route to Digital Twins of the Brain
A new approach uses simple neural networks to create digital twins of brain activity, capturing how different patterns unfold over time. The method generates and recovers key dynamics even from noisy data. When applied to fMRI, it predicts brain signals and reveals distinctive activity patterns across regions and individuals, opening possibilities for ...
Gabriele Di Antonio +3 more
wiley +1 more source
Itch‐induced tick removal (IITR): An acquired neuroimmune mechanism, itch‐induced tick removal, develops after repeated tick exposure, mobilizing T cells and macrophages at the tick bite site to trigger a rapid scratching response that facilitates timely tick removal within a critical window that precedes the transmission of many tick‐borne pathogens ...
Johannes S. P. Doehl +27 more
wiley +1 more source

