Investment Cost Channel and Monetary Transmission [PDF]
We show that a standard DSGE model with investment cost channels has important model stability and policy implications. Our analysis suggests that in economies characterized by supply side well as demand side channels of monetary transmission ...
Henrique S. Basso +2 more
core
Cell surface interactome analysis identifies TSPAN4 as a negative regulator of PD‐L1 in melanoma
Using cell surface proximity biotinylation, we identified tetraspanin TSPAN4 within the PD‐L1 interactome of melanoma cells. TSPAN4 negatively regulates PD‐L1 expression and lateral mobility by limiting its interaction with CMTM6 and promoting PD‐L1 degradation.
Guus A. Franken +7 more
wiley +1 more source
PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software
Software solutions to address computational challenges are ubiquitous in our daily lives. One specific application area where software is often used is in embedded systems, which, like other digital electronic devices, are vulnerable to side-channel ...
Jannik Zeitschner, Amir Moradi
doaj +1 more source
Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla +10 more
wiley +1 more source
Quantitative approaches to linguistic variation in IRC : implications for qualitative research [PDF]
Qualitative analysis of code choice, code switching, and language style in Internet Relay Chat (IRC) can shed light on functional-pragmatic aspects of the use of different linguistic varieties.
Siebenhaar, Beat
core
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V [PDF]
Jan Wichelmann +4 more
openalex +1 more source
Polynomial Evaluation and Side Channel Analysis [PDF]
Side Channel Analysis (SCA) is a class of attacks that exploits leakage of information from a cryptographic implementation during execution. To thwart it, masking is a common countermeasure. The principle is to randomly split every sensitive intermediate variable occurring in the computation into several shares and the number of shares, called the ...
Carlet, Claude, Prouff, Emmanuel
openaire +3 more sources
The PI3Kδ inhibitor roginolisib (IOA‐244) preserves T‐cell function and activity
Identification of novel PI3K inhibitors with limited immune‐related adverse effects is highly sought after. We found that roginolisib and idelalisib inhibit chronic lymphocytic leukemia (CLL) cells and Treg suppressive functions to similar extents, but roginolisib affects cytotoxic T‐cell function and promotion of pro‐inflammatory T helper subsets to a
Elise Solli +7 more
wiley +1 more source
Ransomware Classification Using Hardware Performance Counters on a Non-Virtualized System
Ransomware is a type of malicious software designed to encrypt a user’s important data for the purpose of extortion, with a global annual impact of billions of dollars in damages.
Jennie E. Hill +5 more
doaj +1 more source
Efficient Side-Channel Protections of ARX Ciphers
The current state of the art of Boolean masking for the modular addition operation in software has a very high performance overhead. Firstly, the instruction count is very high compared to a normal addition operation.
Bernhard Jungk +2 more
doaj +1 more source

