Results 91 to 100 of about 1,980,136 (283)

Dual PI3K/AKT and CDK4/6 inhibition reveals selective sensitivity in an SHH medulloblastoma stem cell model

open access: yesMolecular Oncology, EarlyView.
Targeted therapy was evaluated in SHH medulloblastoma using neuroepithelial stem cell (NES) and tumor‐derived NES‐like (tNES) models in 2D monolayers and 3D spheroids. PI3K, AKT, and CDK4/6 inhibitors had minimal effects in NES but markedly reduced viability and growth and induced apoptosis in tNES cells, revealing distinct therapeutic vulnerabilities.
Monika Lukoseviciute   +4 more
wiley   +1 more source

Software services protection security protocol based on software watermarking in cloud environment

open access: yesTongxin xuebao, 2012
Aimed to resist the infringement of software services in cloud environment,a software services protection security protocol based on software watermarking in cloud environment was presented.On the consideration of actual needs in cloud computing,the ...
Jin-chao XU, Guo-sun ZENG, Wei WANG
doaj   +2 more sources

Perspective: manufacturers should be liable when computer bugs leave consumers in the lurch [PDF]

open access: yes
Auto makers are responsible for the safety and reliability of their cars. So why shouldn't software makers be held responsible for buggy computer programs?Computers ; Consumer ...
David Banisar
core  

Targeting TNBC: core–shell polycationic polyurea dendrimers with inherent anticancer activity

open access: yesFEBS Open Bio, EarlyView.
Core–shell polycationic PURE dendrimers were tested in TNBC‐derived tumor models. Both formulations selectively targeted TNBC and effectively reduced tumor volume. PUREG4‐OEI48 suppressed tumor growth without detectable toxicity, whereas PUREG4‐OCEI24, despite showing efficacy, induced hepatic toxicity.
Adriana Cruz   +9 more
wiley   +1 more source

Software Protection

open access: yes, 2011
A computer system's security can be compromised in many ways a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdrop per can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack.
Falcarin P   +3 more
openaire   +1 more source

Advanced Software Protection Now

open access: yes, 2010
Software digital rights management is a pressing need for the software development industry which remains, as no practical solutions have been acclamaimed succesful by the industry. We introduce a novel software-protection method, fully implemented with today's technologies, that provides traitor tracing and license enforcement and requires no ...
Bendersky, Diego   +4 more
openaire   +2 more sources

Software and business methods patents: Case law evolution and market strategies [PDF]

open access: yes
In this paper we explore the evolution of the software industry and the increasing importance of patent protection. Through a set of case law, we show that the various American Courts of Justice for the one hand and the European Patent Office (EPO) one ...
Isabelle Liotard
core  

Windows Software Protection Against Reverse Engineering [PDF]

open access: yes, 2011
Tato práce se zabývá seznámením se se zpětným inženýrstvím, způsoby jeho použití a zneužití v praxi a seznámením se s existujícími nástroji na ochranu softwaru a s nástroji projektu Lissom.
Korvas, Pavol
core  

Hands‐on protocol for preparing water‐soluble fractions from agri‐food samples for NMR‐based metabolomics analysis

open access: yesFEBS Open Bio, EarlyView.
This research protocol outlines a workflow for nuclear magnetic resonance (NMR)‐based metabolomics in the agri‐food sector. Using two case studies—strawberry leaves (solid matrix) and wine (liquid matrix)—it details the procedures for sample preparation, data acquisition, and processing.
Andrea Fernández‐Veloso   +4 more
wiley   +1 more source

DDX3X induces mesenchymal transition of endothelial cells by disrupting BMPR2 signaling

open access: yesFEBS Open Bio, EarlyView.
Elevated DDX3X expression led to downregulation of BMPR2, a key regulator of endothelial homeostasis and function. Our co‐immunoprecipitation assays further demonstrated a molecular interaction between DDX3X and BMPR2. Notably, DDX3X promoted lysosomal degradation of BMPR2, thereby impairing its downstream signaling and facilitating endothelial‐to ...
Yu Zhang   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy