Results 61 to 70 of about 5,112,197 (346)
A multiprocess quality model: identification of of key processes in the integration approach [PDF]
In this paper we investigate the use of multiprocess quality model in the adoption of process improvement frameworks. We analyze an improvement effort based on multiple process quality models adoption.
Abd. Rahman, Aedah +2 more
core
Software systems through complex networks science: Review, analysis and applications [PDF]
Complex software systems are among most sophisticated human-made systems, yet only little is known about the actual structure of 'good' software. We here study different software systems developed in Java from the perspective of network science.
Bajec, Marko, Šubelj, Lovro
core +1 more source
Software Change Prediction: A Systematic Review and Future Guidelines [PDF]
Background: The importance of Software Change Prediction (SCP) has been emphasized by several studies. Numerous prediction models in literature claim to effectively predict change-prone classes in software products. These models help software managers in
Ruchika Malhotra, Megha Khanna
doaj +1 more source
In this study, we present the structure of AcrIE8.1, a previously uncharacterized anti‐CRISPR protein that inhibits the type I‐E CRISPR‐Cas system. Through a combination of structural and biochemical analyses, we demonstrate that AcrIE8.1 directly binds to the Cas11 subunit of the Cascade complex to inhibit the CRISPR‐Cas system.
Young Woo Kang, Hyun Ho Park
wiley +1 more source
Automating the Object-Oriented Software Development Process: Workshop Report [PDF]
Cost-effective realization of robust, adaptable and reusable software systems demands efficient and effective management of the overall software production process.
Aksit, Mehmet, Tekinerdogan, Bedir
core +3 more sources
A Machine Learning Based Monitoring Framework for Side-Channel Information Leaks
Computer and network security is an ever important field of study as information processed by these systems is of ever increasing value. The state of research on direct attacks, such as exploiting memory safety or shell input errors is well established ...
Michael Lescisin, Qusay H. Mahmoud
doaj +1 more source
A Cre‐dependent lentiviral vector for neuron subtype‐specific expression of large proteins
We designed a versatile and modular lentivector comprising a Cre‐dependent switch and self‐cleaving 2A peptide and tested it for co‐expression of GFP and a 2.8 kb gene of interest (GOI) in mouse cortical parvalbumin (PV+) interneurons and midbrain dopamine (TH+) neurons.
Weixuan Xue +6 more
wiley +1 more source
$$PM_{2.5}$$ , a major air pollutant, often carries toxic components such as polycyclic aromatic hydrocarbons (PAHs), which pose potential health risks.
Zeming Huang +5 more
doaj +1 more source
Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes +3 more
wiley +1 more source
Considerations for regulation and evaluation of digital mental health technologies
Digital mental health technologies (DMHTs) are becoming well established within mental health services and through direct-to-consumer models. Due to their scalable nature, DMHTs may support services to bridge the gap between demand and the available ...
Gareth Hopkin +6 more
doaj +1 more source

