Results 81 to 90 of about 89,500 (322)

Improving PARP inhibitor efficacy in bladder cancer without genetic BRCAness by combination with PLX51107

open access: yesMolecular Oncology, EarlyView.
Clinical trials on PARP inhibitors in urothelial carcinoma (UC) showed limited efficacy and a lack of predictive biomarkers. We propose SLFN5, SLFN11, and OAS1 as UC‐specific response predictors. We suggest Talazoparib as the better PARP inhibitor for UC than Olaparib.
Jutta Schmitz   +15 more
wiley   +1 more source

U-Care: Requirements Elicitation For Ambient Assisted Living [PDF]

open access: yes, 2009
Western countries are facing similar trends in healthcare: population is aging, life expectations are growing, the number of healthcare professionals is decreasing, cost pressure on healthcare systems is increasing and urbanization is taking place.
Beijnum, B.J.F. van   +2 more
core   +2 more sources

ViSpec: A graphical tool for elicitation of MTL requirements

open access: yes, 2015
One of the main barriers preventing widespread use of formal methods is the elicitation of formal specifications. Formal specifications facilitate the testing and verification process for safety critical robotic systems. However, handling the intricacies
Fainekos, Georgios   +2 more
core   +1 more source

Rationale Management Challenges in Requirements Engineering [PDF]

open access: yes, 2010
Rationale and rationale management have been playing an increasingly prominent role in software system development mainly due to the knowledge demand during system evaluation, maintenance, and evolution, especially for large and complex systems.
Avgeriou, Paris,   +2 more
core   +3 more sources

Dual targeting of RET and SRC synergizes in RET fusion‐positive cancer cells

open access: yesMolecular Oncology, EarlyView.
Despite the strong activity of selective RET tyrosine kinase inhibitors (TKIs), resistance of RET fusion‐positive (RET+) lung cancer and thyroid cancer frequently occurs and is mainly driven by RET‐independent bypass mechanisms. Son et al. show that SRC TKIs significantly inhibit PAK and AKT survival signaling and enhance the efficacy of RET TKIs in ...
Juhyeon Son   +13 more
wiley   +1 more source

Collaborative mint map tool to facilitate requirement elicitation [PDF]

open access: yes, 2011
Requirements elicitation is a crucial task in any software development process.It is notable as a major contributor to the project failure.To minimize and subsequently improve the process, folding Mind Map concept in the elicitation process and ...
Abdul Hamid, Nazatul Naquiah Ahba   +2 more
core  

Provoking creativity: Imagine what your requirements could be like [PDF]

open access: yes, 2004
Requirements engineering research, with its focus on elicitation, analysis and management, offers little to support the creation or invention of requirements.
Gizikis, A., Maiden, N., Robertson, S.
core   +1 more source

Transcriptional network analysis of PTEN‐protein‐deficient prostate tumors reveals robust stromal reprogramming and signs of senescent paracrine communication

open access: yesMolecular Oncology, EarlyView.
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice   +16 more
wiley   +1 more source

Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

open access: yesComplex Systems Informatics and Modeling Quarterly, 2015
This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security ...
Christian Schmitt, Peter Liggesmeyer
doaj   +1 more source

Arguing satisfaction of security requirements [PDF]

open access: yes, 2006
This chapter presents a process for security requirements elicitation and analysis, based around the construction of a satisfaction argument for the security of a system. The process starts with the enumeration of security goals based on assets in the
Haley, Charles B.   +3 more
core  

Home - About - Disclaimer - Privacy