Results 211 to 220 of about 2,194 (257)
This study illustrates that maternal smoking during pregnancy (MSDP) is an independent risk factor for IBD in offspring, and DNA methylation serves as a key mechanistic pathway connecting early‐life smoking exposure with IBD risk in offspring. That highlights the urgent need for preventive interventions targeting prospective parents and minors to ...
Han Zhang +11 more
wiley +1 more source
In trophoblast cells, T/S (TNFα + SM164) activated caspase‐3, which cleaved GSDME to switch apoptosis to pyroptosis, causing cell swelling, membrane rupture, and release of LDH, HMGB1, IL‐1β and IL‐18. These cytokines induced pro‐inflammatory macrophage polarization, which in turn reinforced pyroptotic signaling in trophoblasts, amplifying systemic ...
Baoying Huang +15 more
wiley +1 more source
This study identifies TOPK as a dual‐function target in gastric cancer: it drives tumor cell proliferation and migration, and under IFN‐γ stimulation, phosphorylates eIF4F complex component eIF4A1 to enhance STAT1 mRNA translation, thereby promoting PD‐L1/IDO1‐mediated tumor immunometabolic evasion.
Junbing Chen +16 more
wiley +1 more source
The MR‐DELTAnet model utilizes longitudinal MRI to predict treatment response after neoadjuvant chemoradiotherapy in locally rectal cancer patients, accurately identifying patients likely to achieve pathological complete response for personalized management.
Wuteng Cao +14 more
wiley +1 more source
Stress‐Induced Melting Controlled Failure Mechanisms of Methane Hydrate
We study methane hydrate via nanoindentation and nuclear magnetic resonance (NMR), finding its regional melting and mechanical properties, challenging existing views on hydrogen‐bonded crystals. Abstract Methane hydrate, a kind of nonstoichiometric crystalline, attracted worldwide attentions as a promising substitute energy. Its Dissociation is thought
Yanlong Li +9 more
wiley +1 more source
Adding Privacy Protection to Distributed Software Systems
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), 2016
Cloud Computing has been one of the most fascinating and influential technologies in recent years and has literally revolutionised the way we access computing resources by providing a virtually unlimited amount of resources instantaneously. Despite this seemingly amazing breakthrough, there are still some clouds on the horizon, preventing the paradigm ...
Florian Kemmer +3 more
openaire +1 more source
Cloud Computing has been one of the most fascinating and influential technologies in recent years and has literally revolutionised the way we access computing resources by providing a virtually unlimited amount of resources instantaneously. Despite this seemingly amazing breakthrough, there are still some clouds on the horizon, preventing the paradigm ...
Florian Kemmer +3 more
openaire +1 more source
Privacy Petri Net and Privacy Leak Software
Journal of Computer Science and Technology, 2015Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on the outbound network traffic of the applications; the ...
Le-Jun Fan +4 more
openaire +1 more source
Proceedings of the 40th International Conference on Software Engineering, 2017
Privacy by design (PbD) is a policy measure that guides software developers to apply inherent solutions to achieve better privacy protection. For PbD to be a viable option, it is important to understand developers' perceptions, interpretation and practices as to informational privacy (or data protection).
Irit Hadar +6 more
openaire +1 more source
Privacy by design (PbD) is a policy measure that guides software developers to apply inherent solutions to achieve better privacy protection. For PbD to be a viable option, it is important to understand developers' perceptions, interpretation and practices as to informational privacy (or data protection).
Irit Hadar +6 more
openaire +1 more source

