Results 51 to 60 of about 2,796,496 (275)

L’écriture collective du code source informatique

open access: yesRevue d'anthropologie des connaissances, 2012
This article analyzes the collective writing of software source code. Software source code is a set of textual documents that formally specify the behavior of software – its script. The article draws on work in the sociology of science and technology and
Stéphane Couture
doaj   +1 more source

Peptide‐based ligand antagonists block a Vibrio cholerae adhesin

open access: yesFEBS Letters, EarlyView.
The structure of a peptide‐binding domain of the Vibrio cholerae adhesin FrhA was solved by X‐ray crystallography, revealing how the inhibitory peptide AGYTD binds tightly at its Ca2+‐coordinated pocket. Structure‐guided design incorporating D‐amino acids enhanced binding affinity, providing a foundation for developing anti‐adhesion therapeutics ...
Mingyu Wang   +9 more
wiley   +1 more source

Optimal code design for lossless and near lossless source coding in multiple access networks [PDF]

open access: yes, 2001
A multiple access source code (MASC) is a source code designed for the following network configuration: a pair of correlated information sequences {Xi}i=1∞ and {Yi }i=1∞ is drawn i.i.d.
Effros, Michelle, Zhao, Qian
core  

Real‐time assay of ribonucleotide reductase activity with a fluorescent RNA aptamer

open access: yesFEBS Letters, EarlyView.
Ribonucleotide reductases (RNR) synthesize DNA building blocks de novo, making them crucial in DNA replication and drug targeting. FLARE introduces the first single‐tube real‐time coupled RNR assay, which enables isothermal tracking of RNR activity at nanomolar enzyme levels and allows the reconstruction of allosteric regulatory patterns and rapid ...
Jacopo De Capitani   +4 more
wiley   +1 more source

A new approach to software vulnerability detection based on CPG analysis

open access: yesCogent Engineering, 2023
Detecting source code vulnerabilities is an essential issue today. In this paper, to improve the efficiency of detecting vulnerabilities in software written in C/C++, we propose to use a combination of Deep Graph Convolutional Neural Network (DGCNN) and ...
Cho Do Xuan
doaj   +1 more source

Consider the Source: The Value of Source Code to Digital Preservation Strategies [PDF]

open access: yes, 2013
One of the major challenges in the digital preservation field is the difficulty of ensuring long-term access to digital objects, especially in cases when the software that was used to create an object is no longer current.
Castagné, Michel
core   +1 more source

On the Effect of Semantically Enriched Context Models on Software Modularization

open access: yes, 2017
Many of the existing approaches for program comprehension rely on the linguistic information found in source code, such as identifier names and comments.
Hage, Jurriaan   +3 more
core   +2 more sources

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Employing Blockchain, NFTs, and Digital Certificates for Unparalleled Authenticity and Data Protection in Source Code: A Systematic Review

open access: yesComputers
In higher education, especially in programming-intensive fields like computer science, safeguarding students’ source code is crucial to prevent theft that could impact learning and future careers.
Leonardo Juan Ramirez Lopez   +1 more
doaj   +1 more source

On source and channel codes for multiple inputs and outputs: does multiple description beat space time? [PDF]

open access: yes, 2005
We compare two strategies for lossy source description across a pair of unreliable channels. In the first strategy, we use a broadcast channel code to achieve a different rate for each possible channel realization, and then use a multiresolution source ...
Effros, Michelle   +3 more
core  

Home - About - Disclaimer - Privacy