Results 41 to 50 of about 71,487 (291)

Combining antibody conjugates with cytotoxic and immune‐stimulating payloads maximizes anti‐cancer activity

open access: yesMolecular Oncology, EarlyView.
Methods to improve antibody–drug conjugate (ADC) treatment durability in cancer therapy are needed. We utilized ADCs and immune‐stimulating antibody conjugates (ISACs), which are made from two non‐competitive antibodies, to enhance the entry of toxic payloads into cancer cells and deliver immunostimulatory agents into immune cells.
Tiexin Wang   +3 more
wiley   +1 more source

Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs

open access: yes网络与信息安全学报, 2023
In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon ...
Yan LI   +4 more
doaj   +3 more sources

Research on 3D Weaving Process of Multi⁃axial Blade Preforms

open access: yesNanjing Hangkong Hangtian Daxue Xuebao
In order to achieve the three-dimensional weaving of the multi-axial composite preform of composites, the microstructure of the multi-axial composite preform is studied, finding that there is a difference in the thickness of the single layer woven with ...
BIAN Jinshuai   +5 more
doaj   +1 more source

Towards Evaluating Size Reduction Techniques for Software Model Checking [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2017
Formal verification techniques are widely used for detecting design flaws in software systems. Formal verification can be done by transforming an already implemented source code to a formal model and attempting to prove certain properties of the model (e.
Gyula Sallai   +3 more
doaj   +1 more source

Can Molecularly Engineered Plant Galls Help to Ease the Problem of World Food Shortage (and Our Dependence on Pollinating Insects)?

open access: yesFoods, 2022
The world faces numerous problems and two of them are global food shortages and the dwindling number of pollinating insects. Plant products that do not arise from pollination are plant galls, which as in the case of oak apples, can resemble fruits and be
Victor Benno Meyer-Rochow
doaj   +1 more source

Code extraction algorithms which unify slicing and concept assignment [PDF]

open access: yes
One approach to reverse engineering is to partially automate subcomponent extraction, improvement and subsequent recombination. Two previously proposed automated techniques for supporting this activity are slicing and concept assignment. However, neither
Binkley, D   +3 more
core   +4 more sources

Basroparib inhibits YAP‐driven cancers by stabilizing angiomotin

open access: yesMolecular Oncology, EarlyView.
Basroparib, a selective tankyrase inhibitor, suppresses Wnt signaling and attenuates YAP‐driven oncogenic programs by stabilizing angiomotin. It promotes AMOT–YAP complex formation, enforces cytoplasmic YAP sequestration, inhibits YAP/TEAD transcription, and sensitizes YAP‐active cancers, including KRAS‐mutant colorectal cancer, to MEK inhibition.
Young‐Ju Kwon   +4 more
wiley   +1 more source

Fault localization approach for null pointer exception

open access: yesTongxin xuebao, 2015
A novel approach to locate the fault for null pointer exception is presented.The approach first computes the static slice guided by the runtime stack,then conducts a null-pointer analysis and aliases analysis on the sliced program and obtains the ...
Shu-juan JIANG   +5 more
doaj   +2 more sources

Software Testbed for Selective Laser Sintering [PDF]

open access: yes, 1991
Computer software plays an important role in the implementation of Solid Freeform Fabrication (SFF) technologies. This paper describes a software testbed for processing part geometry for a particular SFF technology, selective laser sintering (SLS ...
Beaman, J.J.   +2 more
core   +1 more source

Program specialization via program slicing [PDF]

open access: yes, 1996
This paper concerns the use of program slicing to perform a certain kind of program-specialization operation. We show that the specialization operation that slicing performs is different from the specialization operations performed by algorithms for partial evaluation, supercompilation, bifurcation, and deforestation.
Thomas Reps, Todd Turnidge
openaire   +1 more source

Home - About - Disclaimer - Privacy