Results 81 to 90 of about 1,996,535 (294)

Web development evolution: the business perspective on security [PDF]

open access: yes, 2006
Protection of data, information, and knowledge is a hot topic in today’s business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and ...
Glisson, L.M.   +2 more
core  

Dihydroorotate dehydrogenase (DHODH) regulates trophoblast syncytialization through organelle stress–induced cellular senescence

open access: yesFEBS Open Bio, EarlyView.
The inhibition of mitochondrial dihydroorotate dehydrogenase (DHODH) impairs syncytialization and induces cellular senescence via mitochondrial and endoplasmic reticulum stress in human trophoblast stem cells, elevating sFlt1/PlGF levels, a hallmark of placental dysfunction in hypertensive disorders of pregnancy.
Kanoko Yoshida   +6 more
wiley   +1 more source

The Model of System to Counter to Software Tools Learning Code

open access: yesБезопасность информационных технологий, 2015
The article describes the main types of software used for the study of the code, the shortcomings of existing systems of protection programs and proposed a new model of protection system of code.
Anatoliy Petrovich Durakovskiy   +1 more
doaj   +2 more sources

On Strategic Enabling of Product Piracy in the Market for Video Games [PDF]

open access: yes
In this paper, we consider the market for video games, where some firms are active in both, the market for video games hardware and software. It is puzzling that hardware can be easily made compatible with duplicated (i.e. pirated) software.
Oliver Gürtler
core  

Erythropoietin modulates hepatic inflammation, glucose homeostasis, and soluble epoxide hydrolase and epoxides in high‐fat diet‐induced obese mice

open access: yesFEBS Open Bio, EarlyView.
Erythropoietin administration suppresses hepatic soluble epoxide hydrolase (sEH) expression, leading to increased CYP‐derived epoxides. This is associated with a shift in hepatic macrophage polarization characterized by reduced M1 markers and increased M2 markers, along with reduced hepatic inflammation, suppressed hepatic lipogenesis, and attenuated ...
Takeshi Goda   +12 more
wiley   +1 more source

Economic Analysis, Public Policy and the Software Industry [PDF]

open access: yes
This paper focuses on three related matters. It analyses the process of competition in the software industry, this being important both in itself and for the light it throws on competition within all industries characterised by low or zero marginal costs
George B. Richardson
core  

Development of human monoclonal antibodies against TARM1 by yeast display

open access: yesFEBS Open Bio, EarlyView.
Human monoclonal antibodies against TARM1 are generated by yeast display‐guided selection. These antibodies bind to soluble and cell‐surface forms of TARM1. Also, these antibodies exhibit agonistic activity in the NFAT‐GFP reporter assay, indicating that TARM1 signaling can be functionally modulated by antibodies and suggesting TARM1 as a potential ...
Rikio Yabe   +5 more
wiley   +1 more source

THE RELATIONSHIP BETWEEN SOFTWARE PROTECTION AND PIRACY: EVIDENCE FROM EUROPE [PDF]

open access: yes
piracy, enforcement, panel data ...
ANTONIO RODRIGUEZ ANDRES
core  

Combined 5‐aminolevulinic acid and ferric ammonium citrate treatment promotes hair follicle growth by activating dermal papilla cells

open access: yesFEBS Open Bio, EarlyView.
5‐Aminolevulinic acid combined with ferric ammonium citrate (5‐ALA/FAC) stimulates dermal papilla cell activity and promotes hair follicle growth. The treatment enhances ERK and AKT signaling, increases hair‐inductive gene expression, and restores dermal papilla function suppressed by dihydrotestosterone and oxidative stress, resulting in enhanced hair
Han‐Wook Ryu, Eok‐Soo Oh, Sewoon Kim
wiley   +1 more source

Software services protection security protocol based on software watermarking in cloud environment

open access: yesTongxin xuebao, 2012
Aimed to resist the infringement of software services in cloud environment,a software services protection security protocol based on software watermarking in cloud environment was presented.On the consideration of actual needs in cloud computing,the ...
Jin-chao XU, Guo-sun ZENG, Wei WANG
doaj   +2 more sources

Home - About - Disclaimer - Privacy