Results 151 to 160 of about 7,587 (272)
Therapeutic potential of natural products in cancer immunotherapy: Advances and challenges
This review systematically outlines the mechanisms underlying tumour immunotherapy resistance and elucidates the role of natural products in enhancing therapeutic efficacy as immunomodulatory adjuvants. Abstract Immunotherapy has emerged as a clinically pivotal approach in cancer treatment, but its application remains limited to a small subset of ...
Rao Hu +6 more
wiley +1 more source
Certificateless data integrity auditing with sparse Merkle trees for the cloud-edge environment. [PDF]
Du R, Wang Z, Shen J.
europepmc +1 more source
Trusted-auditing chain: A security blockchain prototype used in agriculture traceability. [PDF]
Lei M, Liu S, Luo N, Yang X, Sun C.
europepmc +1 more source
Fast Injective Mesh Parameterization via Beltrami Coefficient Prolongation
Abstract We present a highly efficient and robust method for free boundary injective parameterization of disk‐like triangle meshes with low isometric distortion. Harmonic function–based approaches, grounded in a strong mathematical framework, are widely employed.
G. Fargion, O. Weber
wiley +1 more source
Abstract Noncompliance regularly undermines the effectiveness of marine protected areas (MPAs) worldwide. The reasons for and drivers of noncompliance depend on the context (e.g., insufficient funding, capacity, neocolonialism, historical conflict), but the prevalent solution offered to curtail noncompliance tends to be more or better enforcement.
B. Bergseth +10 more
wiley +1 more source
A comparative performance analysis of fully homomorphic and attribute-based encryption schemes. [PDF]
More KD, Pramod D.
europepmc +1 more source
Why Creditors File So Few Involuntary Petitions and Why the Number is Not Too Small [PDF]
Block-Lieb, Susan
core +2 more sources
A framework for maximizing the benefit from retaining regrowth on private land
Abstract Conservation interventions often have lower‐than‐desired positive impacts, as revealed by retrospective counterfactual‐based evaluations. To address this, a prospective counterfactual‐based approach can be used to estimate potential benefits and design conservation interventions to maximize outcomes. We developed a framework for estimating the
Hannah Thomas +4 more
wiley +1 more source
Security Authentication Scheme for Vehicle-to-Everything Computing Task Offloading Environments. [PDF]
Liu Y, Li C, Sun Q, Jiang H.
europepmc +1 more source

