Results 71 to 80 of about 2,796,496 (275)
PARP inhibitors are used to treat a small subset of prostate cancer patients. These studies reveal that PARP1 activity and expression are different between European American and African American prostate cancer tissue samples. Additionally, different PARP inhibitors cause unique and overlapping transcriptional changes, notably, p53 pathway upregulation.
Moriah L. Cunningham +21 more
wiley +1 more source
Smell-Aware Bug Classification
Code smell indicates inadequacies in design and implementation choices. Code smells harm software maintainability including effects on components’ bug proneness and code quality has been demonstrated in previous studies.
Khyber +5 more
doaj +1 more source
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk +2 more
doaj +1 more source
Source Code Verification for Embedded Systems using Prolog
System relevant embedded software needs to be reliable and, therefore, well tested, especially for aerospace systems. A common technique to verify programs is the analysis of their abstract syntax tree (AST).
Flederer, Frank +3 more
core +2 more sources
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan +9 more
wiley +1 more source
Inhibition of CDK9 enhances AML cell death induced by combined venetoclax and azacitidine
The CDK9 inhibitor AZD4573 downregulates c‐MYC and MCL‐1 to induce death of cytarabine (AraC)‐resistant AML cells. This enhances VEN + AZA‐induced cell death significantly more than any combination of two of the three drugs in AraC‐resistant AML cells.
Shuangshuang Wu +18 more
wiley +1 more source
Big Coding Data: Analysis, Insights, and Applications
In recent years, there has been a notable surge in the generation of coding data on various platforms, including programming competitions and educational institutions.
Md. Mostafizer Rahman +2 more
doaj +1 more source
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker +16 more
wiley +1 more source
A Language-Independent Library for Observing Source Code Plagiarism
Background: Most source code plagiarism detection tools are not modifiable. Consequently, when a modification is required to be applied, a new detection tool should be created along with it.
Ricardo Franclinton, Oscar Karnalim
doaj +1 more source
The BELLFLOW flowcharting system was developed to meet certain Bell System standards of documentation. There are three modes of operation with the BELLFLOW system: source mode, comment mode, and mixed mode.
Pardee, S.
core +1 more source

