Results 91 to 100 of about 1,981,488 (283)

Perspective: manufacturers should be liable when computer bugs leave consumers in the lurch [PDF]

open access: yes
Auto makers are responsible for the safety and reliability of their cars. So why shouldn't software makers be held responsible for buggy computer programs?Computers ; Consumer ...
David Banisar
core  

Genetic attenuation of ALDH1A1 increases metastatic potential and aggressiveness in colorectal cancer

open access: yesMolecular Oncology, EarlyView.
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova   +25 more
wiley   +1 more source

Software services protection security protocol based on software watermarking in cloud environment

open access: yesTongxin xuebao, 2012
Aimed to resist the infringement of software services in cloud environment,a software services protection security protocol based on software watermarking in cloud environment was presented.On the consideration of actual needs in cloud computing,the ...
Jin-chao XU, Guo-sun ZENG, Wei WANG
doaj   +2 more sources

COMP–PMEPA1 axis promotes epithelial‐to‐mesenchymal transition in breast cancer cells

open access: yesMolecular Oncology, EarlyView.
This study reveals that cartilage oligomeric matrix protein (COMP) promotes epithelial‐to‐mesenchymal transition (EMT) in breast cancer. We identify PMEPA1 (protein TMEPAI) as a novel COMP‐binding partner that mediates EMT via binding to the TSP domains of COMP, establishing the COMP–PMEPA1 axis as a key EMT driver in breast cancer.
Konstantinos S. Papadakos   +6 more
wiley   +1 more source

Software Protection

open access: yes, 2011
A computer system's security can be compromised in many ways a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdrop per can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack.
Falcarin P   +3 more
openaire   +1 more source

Advanced Software Protection Now

open access: yes, 2010
Software digital rights management is a pressing need for the software development industry which remains, as no practical solutions have been acclamaimed succesful by the industry. We introduce a novel software-protection method, fully implemented with today's technologies, that provides traitor tracing and license enforcement and requires no ...
Bendersky, Diego   +4 more
openaire   +2 more sources

Engineered extracellular vesicles enriched with the miR‐214/199a cluster enhance the efficacy of chemotherapy in ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Loss of the miR‐214/199a cluster is associated with recurrence in ovarian cancer. Engineered small extracellular vesicles (m214‐sEVs) elevate miR‐214‐3p/miR‐199a‐5p in tumor cells, suppress β‐catenin, TLR4, and YKT6 signaling, reprogram tumor‐derived sEV cargo, reduce chemoresistance and migration, and enhance carboplatin efficacy and survival in ...
Weida Wang   +12 more
wiley   +1 more source

What is the Impact of Software Patent Shifts?: Evidence from Lotus v. Borland [PDF]

open access: yes
Economists have debated the extent to which strengthening patent protection spurs or detracts from technological innovation. In this paper, we examine the reduction of software copyright protection in the Lotus v. Borland decision.
Feng Zhu, Josh Lerner
core  

Day/night variations of myeloid and lymphoid cell subsets in the murine inguinal lymph node

open access: yesFEBS Open Bio, EarlyView.
The circadian system is involved in the temporal regulation of the immune system. Our study reveals that two innate immune populations, NKT cells and neutrophils, predominate at the beginning of the day in healthy mice, highlighting how the time of day influences immune responses.
Paula M. Wagner   +6 more
wiley   +1 more source

Software and business methods patents: Case law evolution and market strategies [PDF]

open access: yes
In this paper we explore the evolution of the software industry and the increasing importance of patent protection. Through a set of case law, we show that the various American Courts of Justice for the one hand and the European Patent Office (EPO) one ...
Isabelle Liotard
core  

Home - About - Disclaimer - Privacy