Results 51 to 60 of about 1,981,488 (283)

Efficient Memory-Protected Integration of Add-On Software Subsystems in Small Embedded Automotive Applications [PDF]

open access: yes, 2007
Current innovations in the automotive industry evolve mainly in the electronics and software domain. This leads to an increasing integration of additional software subsystems into already existing electronic control units (ECUs) to cope with the ...
Khan, A, Schäfer, A, Zetlmeisl, M
core   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Estimation Method for Software Protection System based on Hardware Modules

open access: yesБезопасность информационных технологий, 2011
This paper is told about a new method for estimating software protection systems based on hardware modules. It covers a new method for modeling software protection process.
T. V. Petrova, A. A. Krasnopevtsev
doaj  

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

Integrity protection for code-on-demand mobile agents in e-commerce [PDF]

open access: yes, 2002
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling ...
Chan, TK, Guan, SU, Wang, TH
core   +1 more source

PARP inhibitors elicit distinct transcriptional programs in homologous recombination competent castration‐resistant prostate cancer

open access: yesMolecular Oncology, EarlyView.
PARP inhibitors are used to treat a small subset of prostate cancer patients. These studies reveal that PARP1 activity and expression are different between European American and African American prostate cancer tissue samples. Additionally, different PARP inhibitors cause unique and overlapping transcriptional changes, notably, p53 pathway upregulation.
Moriah L. Cunningham   +21 more
wiley   +1 more source

SOFTWARE APPLICATIONS FOR MOBILE AND MOBILE PROTECTION [PDF]

open access: yesFiabilitate şi Durabilitate, 2018
One of the most interesting hipothesys launched in the software industries reveals the following: software applications modify intentions, consumer behavior and all related to the motivation.
Ştefan IOVAN, Cristian IVĂNUŞ
doaj  

Software copyright protection

open access: yes, 2021
Internationally, copyright protection is the most extensively utilized legal protection model for software. Software is protected under copyright law since it is a sort of "work." Because the requirements to qualify as works under copyright laws are not stringent, just formal creativity is required.
openaire   +1 more source

Adenosine‐to‐inosine editing of miR‐200b‐3p is associated with the progression of high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira   +14 more
wiley   +1 more source

The Analysis of Software Protectors

open access: yesБезопасность информационных технологий, 2011
This article presents an overview of software products designed to protect software against unauthorized copying or protectors. The author analyses advantages and disadvantages of popular protectors and also covers new tendencies, technologies and ...
V. A. Bukasov
doaj  

Home - About - Disclaimer - Privacy