Results 81 to 90 of about 1,981,488 (283)
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source
MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION
Software protection is a mechanism to make software systems more difficult (or impossible) to be accessed by attackers. Such mechanisms are gaining more importance nowadays for increasing number of attacks on the software systems in the large internet ...
Ali J. Abboud
doaj
We developed a cost‐effective methylation‐specific droplet digital PCR multiplex assay containing tissue‐conserved and tumor‐specific methylation markers. The assay can detect circulating tumor DNA with high accuracy in patients with localized and metastatic colorectal cancer.
Luisa Matos do Canto +8 more
wiley +1 more source
Software Patent Law: United States and Europe Compared [PDF]
Software is a global business. Patents are increasingly the protection of choice; as a consequence, international software patent laws are of growing importance to software vendors.
Guntersdorfer, Michael
core +1 more source
Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller +17 more
wiley +1 more source
The Model of System to Counter to Software Tools Learning Code
The article describes the main types of software used for the study of the code, the shortcomings of existing systems of protection programs and proposed a new model of protection system of code.
Anatoliy Petrovich Durakovskiy +1 more
doaj +2 more sources
Digital Rights Management, Intellectual Property Rights Protection and Economic development: The case of digital piracy in the South Mediterranean countries [PDF]
: The potential benefits that could be gained from information technologies in South Mediterranean economies are constrained by both DRM and institutional protection related to Intellectual Property Rights.
Alaoui Belghiti, Moulay Abdelaziz +2 more
core +1 more source
Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung +17 more
wiley +1 more source
On Strategic Enabling of Product Piracy in the Market for Video Games [PDF]
In this paper, we consider the market for video games, where some firms are active in both, the market for video games hardware and software. It is puzzling that hardware can be easily made compatible with duplicated (i.e. pirated) software.
Oliver Gürtler
core
Basroparib inhibits YAP‐driven cancers by stabilizing angiomotin
Basroparib, a selective tankyrase inhibitor, suppresses Wnt signaling and attenuates YAP‐driven oncogenic programs by stabilizing angiomotin. It promotes AMOT–YAP complex formation, enforces cytoplasmic YAP sequestration, inhibits YAP/TEAD transcription, and sensitizes YAP‐active cancers, including KRAS‐mutant colorectal cancer, to MEK inhibition.
Young‐Ju Kwon +4 more
wiley +1 more source

