Results 31 to 40 of about 2,407,178 (265)

Associations of Internet Developers

open access: yesVestnik MGIMO-Universiteta, 2013
The results of research of participation of international networked associations of internet developers in world political process are presented in the article.
S. S. Shirin
doaj   +1 more source

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users [PDF]

open access: yes, 2011
Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream.
Abdelberi, Chaabane   +6 more
core   +3 more sources

HIBRIDISASI INTERSPESIFIK TIGA SPESIES IKAN TOR (Tor soro, Tor douronensis, DAN Tor tambroides) SECARA RESIPROKAL PADA FASE LARVA

open access: yesJurnal Riset Akuakultur, 2021
Ikan Tor merupakan genus yang potensi dibudidayakan karena memiliki nilai ekonomis tinggi. Masalah yang ada adalah lambatnya pertumbuhan dan rendahnya tingkat sintasan benih ikan tersebut dalam jumlah yang memadai untuk pembudidaya. Hibridisasi atau persilangan merupakan suatu upaya untuk mendapatkan kombinasi antara populasi yang berbeda untuk ...
Toni Yulian Kusmardani   +3 more
openaire   +2 more sources

Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment

open access: yesMolecular Oncology, EarlyView.
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley   +1 more source

K8s-enhanced lightweight simulation method for the Tor network

open access: yesSecurity and Safety
Criminals exploit the robust anonymity afforded by Tor for illicit purposes, prompting heightened interest among researchers in de-anonymization attacks on the Tor network.
Huang Wentao   +7 more
doaj   +1 more source

A negative feedback loop of TOR signaling balances growth and stress-response trade-offs in plants

open access: yesCell Reports, 2022
Summary: TOR kinase is a central coordinator of nutrient-dependent growth in eukaryotes. Maintaining optimal TOR signaling is critical for the normal development of organisms.
Muhammed Jamsheer K   +7 more
doaj   +1 more source

Tor [PDF]

open access: yesProceedings of the 14th symposium on Principles and practice of declarative programming, 2012
Horn Clause Programs have a natural depth-first procedural semantics. However, for many programs this procedural semantics is ineffective. In order to compute useful solutions, one needs the ability to modify the search method that explores the alternative execution branches.Tor, a well-defined hook into Prolog disjunction, provides this ability. It is
Schrijvers, Tom   +2 more
openaire   +1 more source

Dimethyl fumarate combined with cisplatin at subcytotoxic doses sensitizes cervical cancer toward ferroptosis and apoptosis through GSH restriction and p53 (re)activation

open access: yesMolecular Oncology, EarlyView.
Dimethyl fumarate (DMF) reduces growth of HPV‐positive cervical cancer spheroids and induces ferroptosis in cervical cancer cells via blocking SLC7A11/Glutathione (GSH) axis. Combination of subcytotoxic doses of DMF and cisplatin (CDDP) further suppresses spheroid growth and drives cell death in 2D culture models.
Carolina Punziano   +6 more
wiley   +1 more source

Comparative study of anonymous network Tor and I2P

open access: yes网络与信息安全学报, 2019
Tor is the most deployed anonymous communication system, providing online anonymity and privacy protection, while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.
YANG Yun, LI Lingyan, WEI Qingzheng
doaj   +1 more source

Hippo pathway at the crossroads of stemness and therapeutic resistance in breast cancer

open access: yesMolecular Oncology, EarlyView.
Dysregulation of the Hippo pathway drives nuclear accumulation of YAP/TAZ, activating stemness‐related transcriptional programs that sustain breast cancer stemness and fuel therapeutic resistance across subtypes, underscoring Hippo signaling as a targetable vulnerability. Figure created and edited with BioRender.com.
Giulia Schiavoni   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy