Results 101 to 110 of about 1,996,535 (294)
Pharmacological inhibition of PERK in a DEN‐induced mouse model of liver cancer does not reduce tumor burden but alters cellular stress signaling. Despite blocking PERK activity, downstream stress responses, including CHOP expression, remain active, suggesting compensatory mechanisms within the unfolded protein response that may influence tumor ...
Ada Lerma‐Clavero +5 more
wiley +1 more source
Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations
We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code ...
Sebastian Raubitzek +3 more
doaj +1 more source
The pirate from Koenigsberg: why closed source software is not worth of copyright protection [PDF]
According to Kant, property applies only to touchable things, among which he includes the works of art. For the very principle of private property, a legitimate purchaser has the right to replicate and to share them without restrictions.
Pievatolo, Maria Chiara
core +1 more source
Drugs previously repurposed to target blood cancers reduced neuroblastoma and glioblastoma cell growth and viability. However, their levels of anticancer activity were different and their clinical application may be problematic due to side effects at effective doses.
Abhishek Kharawatkar +4 more
wiley +1 more source
Consensus-Based Load Frequency Control of a Multi-Area Power System
The integration of renewable energy sources into modern power grids presents challenges for load frequency control (LFC) due to the increased system dynamics and uncertainties introduced by variable generation sources. Traditional LFC methods are limited
Ravi Patel +3 more
doaj +1 more source
Fault-tolerant software for the FIMP [PDF]
The work reported here provides protection against software failures in the task dispatcher of the FTMP, a particularly critical portion of the system software.
Hecht, H., Hecht, M.
core +1 more source
In normal (nontolerant) cells, CD14 is crucial for both LPS uptake and LPS signaling. In LPS‐tolerant cells, in which LPS‐induced TNF‐α and IFN‐β production is suppressed, there is a dramatic increase in surface CD14 expression. The overexpressed CD14 in LPS‐tolerant cells is responsible for the enhanced LPS uptake without inducing pro‐inflammatory ...
Saeka Nishihara +3 more
wiley +1 more source
Software for audit of information protection system of the organization
На основе требований к системе защиты информации, представленных в приказе Оперативно-аналитического центра при Президенте Республики Беларусь от 30.08.2013 № 62, и положений СТБ ISO/IEC 27001-2016 составлен перечень вопросов и разработано программное ...
V. A. Boiprav, V. V. Kovalev, L. L. Utin
doaj
The software patent experiment. [PDF]
Over the past two decades, the scope of technologies that can be patented has been expanded to include many items previously thought unsuitable for patenting, for example, computer software. Today, the U.S.
James Bessen, Robert Hunt
core
This article reviews recent theoretical contributions on digital piracy. It starts by elaborating on the reasons for intellectual property protection, by reporting a few facts about copyright protection, and by examining reasons to become a digital ...
Martin Peitz, Paul Belleflamme
core +3 more sources

