U.S. Software Protection: Problems of Trade Secret Estoppel under International and Brazilian Technology Transfer Regimes Note [PDF]
This note describes the fundamental aspects of software protection and applies the requisites of U.S. trade secret protection to software. After explaining how the UNCTAD and Brazilian transfer of technology regimes apply to software licensing ...
Reidenberg, Joel R.
core +1 more source
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi +5 more
wiley +1 more source
Routing Protection Algorithm Based on Hybrid Software Defined Network [PDF]
In order to enable the Software Defined Network(SDN) to cope with the possible situations of single link failure in network,this paper proposes a routing protection algorithm based on hybrid SDN.The routing protection algorithm coping with the single ...
GENG Haijun, ZHANG Wei, YIN Xia
doaj +1 more source
Truly-Protect: An Efficient VM-Based Software Protection [PDF]
We present Truly-Protect that is a software protection method. Previously published protection methods relied solely on obscurity. Rolles proposed a general approach for breaking systems that are based on obscurity. We show that, under certain assumptions, Truly-Protect is resistant not only to Rolles' attack but also to any other attacks that do not ...
Kiperberg, Michael +3 more
openaire +2 more sources
Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes +3 more
wiley +1 more source
Compiler protection techniques against software vulnerabilities exploitation
Software vulnerabilities are critical for security. All C/C++ programs contain significant amount of vulnerabilities. Some of them can be successfully exploitable by attacker to gain control of the execution flow.
A. R. Nurmukhametov +3 more
doaj +1 more source
Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang +8 more
wiley +1 more source
Open-source QSAR models for pKa prediction using multiple machine learning approaches
Background The logarithmic acid dissociation constant pKa reflects the ionization of a chemical, which affects lipophilicity, solubility, protein binding, and ability to pass through the plasma membrane.
Kamel Mansouri +9 more
doaj +1 more source
Function‐driven design of a surrogate interleukin‐2 receptor ligand
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang +9 more
wiley +1 more source
Robust Control of Autonomous Underwater Vehicles Using Delta-Sigma-Based 1-bit Controllers
Autonomous underwater vehicles (AUVs) are robots capable of operating underwater without the need for human operators. Nonetheless, there is the essential requirement of remote operation capability in case of exceptional situations, such as the encounter
Chathura Wanigasekara +2 more
doaj +1 more source

