Results 81 to 90 of about 1,996,535 (294)
Web development evolution: the business perspective on security [PDF]
Protection of data, information, and knowledge is a hot topic in today’s business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and ...
Glisson, L.M. +2 more
core
The inhibition of mitochondrial dihydroorotate dehydrogenase (DHODH) impairs syncytialization and induces cellular senescence via mitochondrial and endoplasmic reticulum stress in human trophoblast stem cells, elevating sFlt1/PlGF levels, a hallmark of placental dysfunction in hypertensive disorders of pregnancy.
Kanoko Yoshida +6 more
wiley +1 more source
The Model of System to Counter to Software Tools Learning Code
The article describes the main types of software used for the study of the code, the shortcomings of existing systems of protection programs and proposed a new model of protection system of code.
Anatoliy Petrovich Durakovskiy +1 more
doaj +2 more sources
On Strategic Enabling of Product Piracy in the Market for Video Games [PDF]
In this paper, we consider the market for video games, where some firms are active in both, the market for video games hardware and software. It is puzzling that hardware can be easily made compatible with duplicated (i.e. pirated) software.
Oliver Gürtler
core
Erythropoietin administration suppresses hepatic soluble epoxide hydrolase (sEH) expression, leading to increased CYP‐derived epoxides. This is associated with a shift in hepatic macrophage polarization characterized by reduced M1 markers and increased M2 markers, along with reduced hepatic inflammation, suppressed hepatic lipogenesis, and attenuated ...
Takeshi Goda +12 more
wiley +1 more source
Economic Analysis, Public Policy and the Software Industry [PDF]
This paper focuses on three related matters. It analyses the process of competition in the software industry, this being important both in itself and for the light it throws on competition within all industries characterised by low or zero marginal costs
George B. Richardson
core
Development of human monoclonal antibodies against TARM1 by yeast display
Human monoclonal antibodies against TARM1 are generated by yeast display‐guided selection. These antibodies bind to soluble and cell‐surface forms of TARM1. Also, these antibodies exhibit agonistic activity in the NFAT‐GFP reporter assay, indicating that TARM1 signaling can be functionally modulated by antibodies and suggesting TARM1 as a potential ...
Rikio Yabe +5 more
wiley +1 more source
THE RELATIONSHIP BETWEEN SOFTWARE PROTECTION AND PIRACY: EVIDENCE FROM EUROPE [PDF]
piracy, enforcement, panel data ...
ANTONIO RODRIGUEZ ANDRES
core
5‐Aminolevulinic acid combined with ferric ammonium citrate (5‐ALA/FAC) stimulates dermal papilla cell activity and promotes hair follicle growth. The treatment enhances ERK and AKT signaling, increases hair‐inductive gene expression, and restores dermal papilla function suppressed by dihydrotestosterone and oxidative stress, resulting in enhanced hair
Han‐Wook Ryu, Eok‐Soo Oh, Sewoon Kim
wiley +1 more source
Software services protection security protocol based on software watermarking in cloud environment
Aimed to resist the infringement of software services in cloud environment,a software services protection security protocol based on software watermarking in cloud environment was presented.On the consideration of actual needs in cloud computing,the ...
Jin-chao XU, Guo-sun ZENG, Wei WANG
doaj +2 more sources

