Results 101 to 110 of about 1,980,136 (283)
The pirate from Koenigsberg: why closed source software is not worth of copyright protection [PDF]
According to Kant, property applies only to touchable things, among which he includes the works of art. For the very principle of private property, a legitimate purchaser has the right to replicate and to share them without restrictions.
Pievatolo, Maria Chiara
core +1 more source
KHS‐Cnd peptide is able to impair biofilm formation and disaggregate mature biofilms in Acinetobacter baumannii clinical isolates. Differences in extracellular metabolites reflect changes in biofilm metabolism due to KHS‐Cnd treatment. Among the differentially represented extracellular metabolites upon KHS‐Cnd treatment, the significantly altered ...
Fernando Porcelli +9 more
wiley +1 more source
Software code protection through software obfuscation [PDF]
The mode of platform-independent software running on client machine has various advantages. But it also introduces some problems, such as how to guard against software piracy, how to protect user from intellectual property theft and from attacks by malicious modifications.
openaire +2 more sources
Metformin mediates mitochondrial quality control in Leber's hereditary optic neuropathy (LHON) fibroblasts carrying mtDNA mutations. At therapeutic levels, metformin activates AMPK signaling to restore mitochondrial dynamics by promoting fusion and restraining fission, while preserving mitochondrial mass, enhancing autophagy/mitophagy and biogenesis ...
Chatnapa Panusatid +3 more
wiley +1 more source
Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations
We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code ...
Sebastian Raubitzek +3 more
doaj +1 more source
What is the Impact of Software Patent Shifts?: Evidence from Lotus v. Borland [PDF]
Economists have debated the extent to which strengthening patent protection spurs or detracts from technological innovation. In this paper, we examine the reduction of software copyright protection in the Lotus v. Borland decision.
Feng Zhu, Josh Lerner
core
dUTPases are involved in balancing the appropriate nucleotide pools. We showed that dUTPase is essential for normal development in zebrafish. The different zebrafish genomes contain several single‐nucleotide variations (SNPs) of the dut gene. One of the dUTPase variants displayed drastically lower protein stability and catalytic efficiency as compared ...
Viktória Perey‐Simon +6 more
wiley +1 more source
Consensus-Based Load Frequency Control of a Multi-Area Power System
The integration of renewable energy sources into modern power grids presents challenges for load frequency control (LFC) due to the increased system dynamics and uncertainties introduced by variable generation sources. Traditional LFC methods are limited
Ravi Patel +3 more
doaj +1 more source
Chemoresistance in bladder cancer: Macrophage recruitment associated with CXCL1, CXCL5 and CXCL8 expression is characteristic of Gemcitabine/Cisplatin (Gem/Cis) Non‐Responder tumors (right side) while Responder tumors did not show substantial tumor‐stromal crosstalk (left side). All biological icons are attributed to Bioicons: carcinoma, cancerous‐cell‐
Sophie Leypold +11 more
wiley +1 more source
Software for audit of information protection system of the organization
На основе требований к системе защиты информации, представленных в приказе Оперативно-аналитического центра при Президенте Республики Беларусь от 30.08.2013 № 62, и положений СТБ ISO/IEC 27001-2016 составлен перечень вопросов и разработано программное ...
V. A. Boiprav, V. V. Kovalev, L. L. Utin
doaj

