Results 111 to 120 of about 12,796,570 (330)
Consider the Source: The Value of Source Code to Digital Preservation Strategies [PDF]
One of the major challenges in the digital preservation field is the difficulty of ensuring long-term access to digital objects, especially in cases when the software that was used to create an object is no longer current.
Castagné, Michel
core +1 more source
Subtype‐specific enhancer RNAs define transcriptional regulators and prognosis in breast cancers
This study employed machine learning methodologies to perform the subtype‐specific classification of RNA‐seq data sets, which are mapped on enhancers from TCGA‐derived breast cancer patients. Their integration with gene expression (referred to as ProxCReAM eRNAs) and chromatin accessibility profiles has the potential to identify lineage‐specific and ...
Aamena Y. Patel +6 more
wiley +1 more source
On source and channel codes for multiple inputs and outputs: does multiple description beat space time? [PDF]
We compare two strategies for lossy source description across a pair of unreliable channels. In the first strategy, we use a broadcast channel code to achieve a different rate for each possible channel realization, and then use a multiresolution source ...
Effros, Michelle +3 more
core
Summarizing Source Code using a Neural Attention Model
High quality source code is often paired with high level summaries of the computation it performs, for example in code documentation or in descriptions posted in online forums.
Srini Iyer +3 more
semanticscholar +1 more source
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova +25 more
wiley +1 more source
In higher education, especially in programming-intensive fields like computer science, safeguarding students’ source code is crucial to prevent theft that could impact learning and future careers.
Leonardo Juan Ramirez Lopez +1 more
doaj +1 more source
A Language-Independent Library for Observing Source Code Plagiarism
Background: Most source code plagiarism detection tools are not modifiable. Consequently, when a modification is required to be applied, a new detection tool should be created along with it.
Ricardo Franclinton, Oscar Karnalim
doaj +1 more source
On the Effect of Semantically Enriched Context Models on Software Modularization
Many of the existing approaches for program comprehension rely on the linguistic information found in source code, such as identifier names and comments.
Hage, Jurriaan +3 more
core +2 more sources
Polar codes for distributed hierarchical source coding
We show that polar codes can be used to achieve the rate-distortion functions in the problem of hierarchical source coding also known as the successive refinement problem. We also analyze the distributed version of this problem, constructing a polar coding scheme that achieves the rate distortion functions for successive refinement with side ...
Min Ye 0005, Alexander Barg
openaire +2 more sources
Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra +6 more
wiley +1 more source

