Results 101 to 110 of about 1,996,535 (294)

Pharmacological inhibition of the PERK pathway modulates hepatocellular carcinoma growth and immune signaling

open access: yesFEBS Open Bio, EarlyView.
Pharmacological inhibition of PERK in a DEN‐induced mouse model of liver cancer does not reduce tumor burden but alters cellular stress signaling. Despite blocking PERK activity, downstream stress responses, including CHOP expression, remain active, suggesting compensatory mechanisms within the unfolded protein response that may influence tumor ...
Ada Lerma‐Clavero   +5 more
wiley   +1 more source

Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations

open access: yesMachine Learning and Knowledge Extraction
We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code ...
Sebastian Raubitzek   +3 more
doaj   +1 more source

The pirate from Koenigsberg: why closed source software is not worth of copyright protection [PDF]

open access: yes
According to Kant, property applies only to touchable things, among which he includes the works of art. For the very principle of private property, a legitimate purchaser has the right to replicate and to share them without restrictions.
Pievatolo, Maria Chiara
core   +1 more source

One size does not fit all: An in vitro evaluation of the effects of bezafibrate and medroxyprogesterone acetate on human SH‐SY5Y and U‐87 MG cancer cells

open access: yesFEBS Open Bio, EarlyView.
Drugs previously repurposed to target blood cancers reduced neuroblastoma and glioblastoma cell growth and viability. However, their levels of anticancer activity were different and their clinical application may be problematic due to side effects at effective doses.
Abhishek Kharawatkar   +4 more
wiley   +1 more source

Consensus-Based Load Frequency Control of a Multi-Area Power System

open access: yesIEEE Access
The integration of renewable energy sources into modern power grids presents challenges for load frequency control (LFC) due to the increased system dynamics and uncertainties introduced by variable generation sources. Traditional LFC methods are limited
Ravi Patel   +3 more
doaj   +1 more source

Fault-tolerant software for the FIMP [PDF]

open access: yes
The work reported here provides protection against software failures in the task dispatcher of the FTMP, a particularly critical portion of the system software.
Hecht, H., Hecht, M.
core   +1 more source

Lipopolysaccharide uptake is augmented in lipopolysaccharide‐tolerant mouse macrophage‐like cells via increased CD14 expression

open access: yesFEBS Open Bio, EarlyView.
In normal (nontolerant) cells, CD14 is crucial for both LPS uptake and LPS signaling. In LPS‐tolerant cells, in which LPS‐induced TNF‐α and IFN‐β production is suppressed, there is a dramatic increase in surface CD14 expression. The overexpressed CD14 in LPS‐tolerant cells is responsible for the enhanced LPS uptake without inducing pro‐inflammatory ...
Saeka Nishihara   +3 more
wiley   +1 more source

Software for audit of information protection system of the organization

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
На основе требований к системе защиты информации, представленных в приказе Оперативно-аналитического центра при Президенте Республики Беларусь от 30.08.2013 № 62, и положений СТБ ISO/IEC 27001-2016 составлен перечень вопросов и разработано программное ...
V. A. Boiprav, V. V. Kovalev, L. L. Utin
doaj  

The software patent experiment. [PDF]

open access: yes
Over the past two decades, the scope of technologies that can be patented has been expanded to include many items previously thought unsuitable for patenting, for example, computer software. Today, the U.S.
James Bessen, Robert Hunt
core  

Digital Piracy: Theory [PDF]

open access: yes
This article reviews recent theoretical contributions on digital piracy. It starts by elaborating on the reasons for intellectual property protection, by reporting a few facts about copyright protection, and by examining reasons to become a digital ...
Martin Peitz, Paul Belleflamme
core   +3 more sources

Home - About - Disclaimer - Privacy