Results 51 to 60 of about 19,937 (276)
Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore +20 more
wiley +1 more source
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin +4 more
doaj +1 more source
Vectorization, Obfuscation and P4 LLVM Tool-chain [PDF]
This thesis broadly focuses on three different areas: Loop Vectorization, Code Obfuscation, and P4LLVM compiler. The work in Loop vectorization starts with a comparison of Auto-vectorization of GCC, ICC and LLVM compilers and show their strengths and ...
Kumar, Dangeti Tharun +1 more
core
We uncover a large variety of putative inhibitory ligand‐gated ion channels (LGICs) in the phylum Cnidaria, the sister group to all bilaterian animals. Phylogenetic analysis suggests a complex evolutionary history of inhibitory LGICs with diverse neurotransmitter ligands.
Abhilasha Ojha +13 more
wiley +1 more source
In the field of software protection, when there is a dependence between the various software protection technologies, the application order of these technologies must be arranged in a correct way in order to maximize the protection effect.
Qing Su, Fan He, Naiqi Wu, Zhiyi Lin
doaj +1 more source
Nigral dopaminergic (DA) neurons modulate and represent pain with a preference to a particular modality (mechanical) and laterality (contralateral), which are controlled by nigral GABAergic neurons. The pain modulation is mimicked by the nigro‐subthalamic projection and its downstream neurons, involving D2‐like receptors.
Ying Ji +13 more
wiley +1 more source
Vulnerability Analysis and Detection of Android System Signature [PDF]
Aiming at the problem that an attacker can issue pirated software by re-signing the vulnerabilities in the self-signature process of Android system application program,this paper analyses the digital signature and verification process of Android system ...
LIAO Fangyuan, GAN Zhiwang
doaj +1 more source
Postsynaptic Complexin Mediates Constitutive Exocytosis of Nicotinic Acetylcholine Receptor
Beyond its established presynaptic role, complexin is identified as a postsynaptic regulator of neurotransmitter receptor trafficking. By promoting constitutive and activity‐dependent exocytosis of nicotinic acetylcholine receptors, complexin controls spontaneous synaptic signaling at the C.
Ya Wang +4 more
wiley +1 more source
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis +5 more
doaj +1 more source
DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps
The Android packing techniques were originally used to pack and conceal important information of the apps to prevent malicious developers from deconstructing the software logic.
Caijun Sun +5 more
doaj +1 more source

