Results 101 to 110 of about 1,981,488 (283)
The relationship between anabolic and catabolic processes governing lung cancer cell growth is nuanced. We show that ATG4B, an autophagy regulator, is elevated in lung cancer and that high ATG4B is associated with worse patient outcomes. Targeting ATG4B in cells reduces growth, protein synthesis, and mTORC1 activity, demonstrating a new relationship ...
Patrick J. Ryan +6 more
wiley +1 more source
Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations
We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code ...
Sebastian Raubitzek +3 more
doaj +1 more source
Software code protection through software obfuscation [PDF]
The mode of platform-independent software running on client machine has various advantages. But it also introduces some problems, such as how to guard against software piracy, how to protect user from intellectual property theft and from attacks by malicious modifications.
openaire +2 more sources
Sequential Innovation, Patents, and Imitation [PDF]
We argue that when discoveries are "sequential" (so that each successive invention builds in an essential way on its predecessors) patent protection is not as useful for encouraging innovation as in a static setting.
Eric Maskin, James Bessen
core
Chemotherapies such as doxorubicin can have toxic effects on healthy cardiovascular/heart tissue. Following up on a doxorubicin toxicity study in mice without tumors where nitrate water was cardioprotective (lessened toxicity), this study with tumor‐bearing mice undergoing doxorubicin treatment showed no negative effect of nitrate and nitrite on drug ...
Rama D. Yammani +7 more
wiley +1 more source
The pirate from Koenigsberg: why closed source software is not worth of copyright protection [PDF]
According to Kant, property applies only to touchable things, among which he includes the works of art. For the very principle of private property, a legitimate purchaser has the right to replicate and to share them without restrictions.
Pievatolo, Maria Chiara
core +1 more source
Windows Software Protection Against Reverse Engineering [PDF]
Tato práce se zabývá seznámením se se zpětným inženýrstvím, způsoby jeho použití a zneužití v praxi a seznámením se s existujícími nástroji na ochranu softwaru a s nástroji projektu Lissom.
Korvas, Pavol
core
Excess Ca2+ ions activate the Calcium‐Sensing Receptor (CaSR), which subsequently drives the uptake of excess inorganic phosphate (Pi) via the Pi transporter (Pit−1) in chondrocytes. This mechanism causes a toxic increase in intracellular Pi concentration, ultimately leading to chondrocyte apoptosis and pathological mineralization. Excess extracellular
Sachie Nakatani +7 more
wiley +1 more source
Consensus-Based Load Frequency Control of a Multi-Area Power System
The integration of renewable energy sources into modern power grids presents challenges for load frequency control (LFC) due to the increased system dynamics and uncertainties introduced by variable generation sources. Traditional LFC methods are limited
Ravi Patel +3 more
doaj +1 more source
This study addressed how a senior research thesis is perceived by undergraduate students. It assessed students' perception of research skills, epistemological beliefs, and career goals in Biochemistry (science) and BDC (science‐business) students. Completing a thesis improved confidence in research skills, resilience, scientific identity, closed gender‐
Celeste Suart +4 more
wiley +1 more source

