Results 101 to 110 of about 1,980,136 (283)

The pirate from Koenigsberg: why closed source software is not worth of copyright protection [PDF]

open access: yes
According to Kant, property applies only to touchable things, among which he includes the works of art. For the very principle of private property, a legitimate purchaser has the right to replicate and to share them without restrictions.
Pievatolo, Maria Chiara
core   +1 more source

Antibiofilm activity of a chionodracine‐derived peptide by NMR‐based metabolomics of cell‐free supernatant of Acinetobacter baumannii clinical strains

open access: yesFEBS Open Bio, EarlyView.
KHS‐Cnd peptide is able to impair biofilm formation and disaggregate mature biofilms in Acinetobacter baumannii clinical isolates. Differences in extracellular metabolites reflect changes in biofilm metabolism due to KHS‐Cnd treatment. Among the differentially represented extracellular metabolites upon KHS‐Cnd treatment, the significantly altered ...
Fernando Porcelli   +9 more
wiley   +1 more source

Software code protection through software obfuscation [PDF]

open access: yes, 2019
The mode of platform-independent software running on client machine has various advantages. But it also introduces some problems, such as how to guard against software piracy, how to protect user from intellectual property theft and from attacks by malicious modifications.
openaire   +2 more sources

Metformin promotes mitochondrial integrity through AMPK‐signaling in Leber's hereditary optic neuropathy

open access: yesFEBS Open Bio, EarlyView.
Metformin mediates mitochondrial quality control in Leber's hereditary optic neuropathy (LHON) fibroblasts carrying mtDNA mutations. At therapeutic levels, metformin activates AMPK signaling to restore mitochondrial dynamics by promoting fusion and restraining fission, while preserving mitochondrial mass, enhancing autophagy/mitophagy and biogenesis ...
Chatnapa Panusatid   +3 more
wiley   +1 more source

Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations

open access: yesMachine Learning and Knowledge Extraction
We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code ...
Sebastian Raubitzek   +3 more
doaj   +1 more source

What is the Impact of Software Patent Shifts?: Evidence from Lotus v. Borland [PDF]

open access: yes
Economists have debated the extent to which strengthening patent protection spurs or detracts from technological innovation. In this paper, we examine the reduction of software copyright protection in the Lotus v. Borland decision.
Feng Zhu, Josh Lerner
core  

dUTPase is essential in zebrafish development and possesses several single‐nucleotide variants with pronounced structural and functional consequences

open access: yesFEBS Open Bio, EarlyView.
dUTPases are involved in balancing the appropriate nucleotide pools. We showed that dUTPase is essential for normal development in zebrafish. The different zebrafish genomes contain several single‐nucleotide variations (SNPs) of the dut gene. One of the dUTPase variants displayed drastically lower protein stability and catalytic efficiency as compared ...
Viktória Perey‐Simon   +6 more
wiley   +1 more source

Consensus-Based Load Frequency Control of a Multi-Area Power System

open access: yesIEEE Access
The integration of renewable energy sources into modern power grids presents challenges for load frequency control (LFC) due to the increased system dynamics and uncertainties introduced by variable generation sources. Traditional LFC methods are limited
Ravi Patel   +3 more
doaj   +1 more source

Tumor‐stromal crosstalk and macrophage enrichment are associated with chemotherapy response in bladder cancer

open access: yesFEBS Open Bio, EarlyView.
Chemoresistance in bladder cancer: Macrophage recruitment associated with CXCL1, CXCL5 and CXCL8 expression is characteristic of Gemcitabine/Cisplatin (Gem/Cis) Non‐Responder tumors (right side) while Responder tumors did not show substantial tumor‐stromal crosstalk (left side). All biological icons are attributed to Bioicons: carcinoma, cancerous‐cell‐
Sophie Leypold   +11 more
wiley   +1 more source

Software for audit of information protection system of the organization

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
На основе требований к системе защиты информации, представленных в приказе Оперативно-аналитического центра при Президенте Республики Беларусь от 30.08.2013 № 62, и положений СТБ ISO/IEC 27001-2016 составлен перечень вопросов и разработано программное ...
V. A. Boiprav, V. V. Kovalev, L. L. Utin
doaj  

Home - About - Disclaimer - Privacy