Results 91 to 100 of about 1,981,488 (283)
Perspective: manufacturers should be liable when computer bugs leave consumers in the lurch [PDF]
Auto makers are responsible for the safety and reliability of their cars. So why shouldn't software makers be held responsible for buggy computer programs?Computers ; Consumer ...
David Banisar
core
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova +25 more
wiley +1 more source
Software services protection security protocol based on software watermarking in cloud environment
Aimed to resist the infringement of software services in cloud environment,a software services protection security protocol based on software watermarking in cloud environment was presented.On the consideration of actual needs in cloud computing,the ...
Jin-chao XU, Guo-sun ZENG, Wei WANG
doaj +2 more sources
COMP–PMEPA1 axis promotes epithelial‐to‐mesenchymal transition in breast cancer cells
This study reveals that cartilage oligomeric matrix protein (COMP) promotes epithelial‐to‐mesenchymal transition (EMT) in breast cancer. We identify PMEPA1 (protein TMEPAI) as a novel COMP‐binding partner that mediates EMT via binding to the TSP domains of COMP, establishing the COMP–PMEPA1 axis as a key EMT driver in breast cancer.
Konstantinos S. Papadakos +6 more
wiley +1 more source
A computer system's security can be compromised in many ways a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdrop per can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack.
Falcarin P +3 more
openaire +1 more source
Advanced Software Protection Now
Software digital rights management is a pressing need for the software development industry which remains, as no practical solutions have been acclamaimed succesful by the industry. We introduce a novel software-protection method, fully implemented with today's technologies, that provides traitor tracing and license enforcement and requires no ...
Bendersky, Diego +4 more
openaire +2 more sources
Loss of the miR‐214/199a cluster is associated with recurrence in ovarian cancer. Engineered small extracellular vesicles (m214‐sEVs) elevate miR‐214‐3p/miR‐199a‐5p in tumor cells, suppress β‐catenin, TLR4, and YKT6 signaling, reprogram tumor‐derived sEV cargo, reduce chemoresistance and migration, and enhance carboplatin efficacy and survival in ...
Weida Wang +12 more
wiley +1 more source
What is the Impact of Software Patent Shifts?: Evidence from Lotus v. Borland [PDF]
Economists have debated the extent to which strengthening patent protection spurs or detracts from technological innovation. In this paper, we examine the reduction of software copyright protection in the Lotus v. Borland decision.
Feng Zhu, Josh Lerner
core
Day/night variations of myeloid and lymphoid cell subsets in the murine inguinal lymph node
The circadian system is involved in the temporal regulation of the immune system. Our study reveals that two innate immune populations, NKT cells and neutrophils, predominate at the beginning of the day in healthy mice, highlighting how the time of day influences immune responses.
Paula M. Wagner +6 more
wiley +1 more source
Software and business methods patents: Case law evolution and market strategies [PDF]
In this paper we explore the evolution of the software industry and the increasing importance of patent protection. Through a set of case law, we show that the various American Courts of Justice for the one hand and the European Patent Office (EPO) one ...
Isabelle Liotard
core

