Results 101 to 110 of about 12,796,570 (330)

A Comparative Study of Static Code Analysis tools for Vulnerability Detection in C/C++ and JAVA Source Code

open access: yes, 2020
Software security has become an essential component of software development process. It is necessary for an organisation to maintain software security in order to ensure integrity, authenticity and availability of the software product. To ensure software
Arvinder Kaur, R. Nayyar
semanticscholar   +1 more source

A methionine‐lined active site governs carbocation stabilization and product specificity in a bacterial terpene synthase

open access: yesFEBS Letters, EarlyView.
This study reveals a unique active site enriched in methionine residues and demonstrates that these residues play a critical role by stabilizing carbocation intermediates through novel sulfur–cation interactions. Structure‐guided mutagenesis further revealed variants with significantly altered product profiles, enhancing pseudopterosin formation. These
Marion Ringel   +13 more
wiley   +1 more source

Optimal code design for lossless and near lossless source coding in multiple access networks [PDF]

open access: yes, 2001
A multiple access source code (MASC) is a source code designed for the following network configuration: a pair of correlated information sequences {Xi}i=1∞ and {Yi }i=1∞ is drawn i.i.d.
Effros, Michelle, Zhao, Qian
core  

Diversity and complexity in neural organoids

open access: yesFEBS Letters, EarlyView.
Neural organoid research aims to expand genetic diversity on one side and increase tissue complexity on the other. Chimeroids integrate multiple donor genomes within single organoids. Self‐organising multi‐identity organoids, exogenous cell seeding, or enforced assembly of region‐specific organoids contribute to tissue complexity.
Ilaria Chiaradia, Madeline A. Lancaster
wiley   +1 more source

Transcriptional network analysis of PTEN‐protein‐deficient prostate tumors reveals robust stromal reprogramming and signs of senescent paracrine communication

open access: yesMolecular Oncology, EarlyView.
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice   +16 more
wiley   +1 more source

Joint design of vector quantizers and RCPC channel codes for Rayleigh fading channels [PDF]

open access: yes, 2000
We study the performance of joint source and channel codes designed to minimize end-to-end distortion over a Rayleigh fading channel. We consider two joint code designs.
Effros, Michelle   +2 more
core  

Infrared laser sampling of low volumes combined with shotgun lipidomics reveals lipid markers in palatine tonsil carcinoma

open access: yesMolecular Oncology, EarlyView.
Nanosecond infrared laser (NIRL) low‐volume sampling combined with shotgun lipidomics uncovers distinct lipidome alterations in oropharyngeal squamous cell carcinoma (OPSCC) of the palatine tonsil. Several lipid species consistently differentiate tumor from healthy tissue, highlighting their potential as diagnostic markers.
Leonard Kerkhoff   +11 more
wiley   +1 more source

Integrated Technique of Natural Language Texts and Source Codes Authorship Verification in the Academic Environment

open access: yesIEEE Access
The issue of text plagiarism in academic and educational environments is becoming increasingly relevant every year. The quality of research articles and works is declining due to students copying fragments of others’ works and using modern ...
Aleksandr Romanov   +3 more
doaj   +1 more source

Circular RNA expression landscapes in myelodysplastic neoplasms: Associations with mutational signatures and disease progression

open access: yesMolecular Oncology, EarlyView.
In this explorative study, the abundance of circular RNA molecules in bone marrow stem cells was found to be elevated in patients with high‐risk myelodysplastic neoplasms, and to be associated with an increased risk of progression to acute myeloid leukemia.
Eileen Wedge   +17 more
wiley   +1 more source

SCORE: Source Code Optimization & REconstruction

open access: yesIEEE Access, 2020
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy