Results 91 to 100 of about 21,615,207 (391)

Single‐cell insights into the role of T cells in B‐cell malignancies

open access: yesFEBS Letters, EarlyView.
Single‐cell technologies have transformed our understanding of T cell–tumor cell interactions in B‐cell malignancies, revealing new T‐cell subsets, functional states, and immune evasion mechanisms. This Review synthesizes these findings, highlighting the roles of T cells in pathogenesis, progression, and therapy response, and underscoring their ...
Laura Llaó‐Cid
wiley   +1 more source

On the Fly Orchestration of Unikernels: Tuning and Performance Evaluation of Virtual Infrastructure Managers

open access: yes, 2018
Network operators are facing significant challenges meeting the demand for more bandwidth, agile infrastructures, innovative services, while keeping costs low.
Lombardo, Francesco   +6 more
core   +1 more source

TRAF2 binds to TIFA via a novel motif and contributes to its autophagic degradation

open access: yesFEBS Letters, EarlyView.
TRAF family members couple receptor signalling complexes to downstream outputs, but how they interact with these complexes is not always clear. Here, we show that during ADP‐heptose signalling, TRAF2 binding to TIFA requires two short sequence motifs in the C‐terminal tail of TIFA, which are distinct from the TRAF6 binding motif.
Tom Snelling   +4 more
wiley   +1 more source

From omics to AI—mapping the pathogenic pathways in type 2 diabetes

open access: yesFEBS Letters, EarlyView.
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan   +2 more
wiley   +1 more source

Aβ42 promotes the aggregation of α‐synuclein splice isoforms via heterogeneous nucleation

open access: yesFEBS Letters, EarlyView.
The aggregation of amyloid‐β (Aβ) and α‐synuclein (αSyn) is associated with Alzheimer's and Parkinson's diseases. This study reveals that Aβ aggregates serve as potent nucleation sites for the aggregation of αSyn and its splice isoforms, shedding light on the intricate interplay between these two pathogenic proteins.
Alexander Röntgen   +2 more
wiley   +1 more source

Computer-to-Computer Communication in the Acquisition Process

open access: yesInformation Technology and Libraries, 1981
Computer-to-Computer Communication in the Acquisition ...
openaire   +4 more sources

Computer image processing [PDF]

open access: yesNature, 1977
Digital Image Restoration. By H. C. Andrews and B. R. Hunt. Pp. xviii + 238.) Prentice-Hall International: Englewood Cliffs, New Jersey, and Hemel-Hempstead, UK, 1977.) £19.95; $31.75. Digital Picture Analysis. Edited by A. Rosenfeld. Pp. xiii + 351. (Springer: Berlin and New York, 1976.) DM72; $29.60. Image Science Mathematics. Edited by C. O.
openaire   +2 more sources

ERBIN limits epithelial cell plasticity via suppression of TGF‐β signaling

open access: yesFEBS Letters, EarlyView.
In breast and lung cancer patients, low ERBIN expression correlates with poor clinical outcomes. Here, we show that ERBIN inhibits TGF‐β‐induced epithelial‐to‐mesenchymal transition in NMuMG breast and A549 lung adenocarcinoma cell lines. ERBIN suppresses TGF‐β/SMAD signaling and reduces TGF‐β‐induced ERK phosphorylation.
Chao Li   +3 more
wiley   +1 more source

Mobile Membranes

open access: yesIEEE Access, 2020
Mobile membranes represent a model of computation inspired from the biological movement provided by endocytosis and exocytosis in the living cells. This paper presents a survey of the results treating the computational power of the mobile membranes ...
Bogdan Aman, Gabriel Ciobanu
doaj   +1 more source

Volatile Kernel Rootkit hidden process detection in cloud computing

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
The rootkit industry has advanced significantly in the last decade. Attackers want to leave a backdoor for quick reoccurring exploits rather than launching the traditional one-time worm/virus attacks.
Suresh Kumar S, Sudalai Muthu T
doaj   +1 more source

Home - About - Disclaimer - Privacy