Results 91 to 100 of about 1,980,136 (283)
Targeted therapy was evaluated in SHH medulloblastoma using neuroepithelial stem cell (NES) and tumor‐derived NES‐like (tNES) models in 2D monolayers and 3D spheroids. PI3K, AKT, and CDK4/6 inhibitors had minimal effects in NES but markedly reduced viability and growth and induced apoptosis in tNES cells, revealing distinct therapeutic vulnerabilities.
Monika Lukoseviciute +4 more
wiley +1 more source
Software services protection security protocol based on software watermarking in cloud environment
Aimed to resist the infringement of software services in cloud environment,a software services protection security protocol based on software watermarking in cloud environment was presented.On the consideration of actual needs in cloud computing,the ...
Jin-chao XU, Guo-sun ZENG, Wei WANG
doaj +2 more sources
Perspective: manufacturers should be liable when computer bugs leave consumers in the lurch [PDF]
Auto makers are responsible for the safety and reliability of their cars. So why shouldn't software makers be held responsible for buggy computer programs?Computers ; Consumer ...
David Banisar
core
Targeting TNBC: core–shell polycationic polyurea dendrimers with inherent anticancer activity
Core–shell polycationic PURE dendrimers were tested in TNBC‐derived tumor models. Both formulations selectively targeted TNBC and effectively reduced tumor volume. PUREG4‐OEI48 suppressed tumor growth without detectable toxicity, whereas PUREG4‐OCEI24, despite showing efficacy, induced hepatic toxicity.
Adriana Cruz +9 more
wiley +1 more source
A computer system's security can be compromised in many ways a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdrop per can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack.
Falcarin P +3 more
openaire +1 more source
Advanced Software Protection Now
Software digital rights management is a pressing need for the software development industry which remains, as no practical solutions have been acclamaimed succesful by the industry. We introduce a novel software-protection method, fully implemented with today's technologies, that provides traitor tracing and license enforcement and requires no ...
Bendersky, Diego +4 more
openaire +2 more sources
Software and business methods patents: Case law evolution and market strategies [PDF]
In this paper we explore the evolution of the software industry and the increasing importance of patent protection. Through a set of case law, we show that the various American Courts of Justice for the one hand and the European Patent Office (EPO) one ...
Isabelle Liotard
core
Windows Software Protection Against Reverse Engineering [PDF]
Tato práce se zabývá seznámením se se zpětným inženýrstvím, způsoby jeho použití a zneužití v praxi a seznámením se s existujícími nástroji na ochranu softwaru a s nástroji projektu Lissom.
Korvas, Pavol
core
This research protocol outlines a workflow for nuclear magnetic resonance (NMR)‐based metabolomics in the agri‐food sector. Using two case studies—strawberry leaves (solid matrix) and wine (liquid matrix)—it details the procedures for sample preparation, data acquisition, and processing.
Andrea Fernández‐Veloso +4 more
wiley +1 more source
DDX3X induces mesenchymal transition of endothelial cells by disrupting BMPR2 signaling
Elevated DDX3X expression led to downregulation of BMPR2, a key regulator of endothelial homeostasis and function. Our co‐immunoprecipitation assays further demonstrated a molecular interaction between DDX3X and BMPR2. Notably, DDX3X promoted lysosomal degradation of BMPR2, thereby impairing its downstream signaling and facilitating endothelial‐to ...
Yu Zhang +7 more
wiley +1 more source

