Results 31 to 40 of about 1,996,535 (294)

Routing Protection Algorithm Based on Hybrid Software Defined Network [PDF]

open access: yesJisuanji gongcheng, 2020
In order to enable the Software Defined Network(SDN) to cope with the possible situations of single link failure in network,this paper proposes a routing protection algorithm based on hybrid SDN.The routing protection algorithm coping with the single ...
GENG Haijun, ZHANG Wei, YIN Xia
doaj   +1 more source

Truly-Protect: An Efficient VM-Based Software Protection [PDF]

open access: yesIEEE Systems Journal, 2013
We present Truly-Protect that is a software protection method. Previously published protection methods relied solely on obscurity. Rolles proposed a general approach for breaking systems that are based on obscurity. We show that, under certain assumptions, Truly-Protect is resistant not only to Rolles' attack but also to any other attacks that do not ...
Kiperberg, Michael   +3 more
openaire   +2 more sources

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Compiler protection techniques against software vulnerabilities exploitation

open access: yesТруды Института системного программирования РАН, 2018
Software vulnerabilities are critical for security. All C/C++ programs contain significant amount of vulnerabilities. Some of them can be successfully exploitable by attacker to gain control of the execution flow.
A. R. Nurmukhametov   +3 more
doaj   +1 more source

Software Patent Law: United States and Europe Compared [PDF]

open access: yes, 2003
Software is a global business. Patents are increasingly the protection of choice; as a consequence, international software patent laws are of growing importance to software vendors.
Guntersdorfer, Michael
core   +1 more source

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

U.S. Software Protection: Problems of Trade Secret Estoppel under International and Brazilian Technology Transfer Regimes Note [PDF]

open access: yes, 1984
This note describes the fundamental aspects of software protection and applies the requisites of U.S. trade secret protection to software. After explaining how the UNCTAD and Brazilian transfer of technology regimes apply to software licensing ...
Reidenberg, Joel R.
core   +1 more source

SOFIA : software and control flow integrity architecture [PDF]

open access: yes, 2016
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead to injury, damage to equipment, or environmental catastrophe.
Coppens, Bart   +8 more
core   +1 more source

Tau acetylation at K331 has limited impact on tau pathology in vivo

open access: yesFEBS Letters, EarlyView.
We mapped tau post‐translational modifications in humanized MAPT knock‐in mice and in amyloid‐bearing double knock‐in mice. Acetylation within the repeat domain, particularly around K331, showed modest increases under amyloid pathology. To test functional relevance, we generated MAPTK331Q knock‐in mice.
Shoko Hashimoto   +3 more
wiley   +1 more source

Open-source QSAR models for pKa prediction using multiple machine learning approaches

open access: yesJournal of Cheminformatics, 2019
Background The logarithmic acid dissociation constant pKa reflects the ionization of a chemical, which affects lipophilicity, solubility, protein binding, and ability to pass through the plasma membrane.
Kamel Mansouri   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy