Results 31 to 40 of about 2,407,178 (265)
Associations of Internet Developers
The results of research of participation of international networked associations of internet developers in world political process are presented in the article.
S. S. Shirin
doaj +1 more source
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users [PDF]
Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream.
Abdelberi, Chaabane +6 more
core +3 more sources
Ikan Tor merupakan genus yang potensi dibudidayakan karena memiliki nilai ekonomis tinggi. Masalah yang ada adalah lambatnya pertumbuhan dan rendahnya tingkat sintasan benih ikan tersebut dalam jumlah yang memadai untuk pembudidaya. Hibridisasi atau persilangan merupakan suatu upaya untuk mendapatkan kombinasi antara populasi yang berbeda untuk ...
Toni Yulian Kusmardani +3 more
openaire +2 more sources
Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley +1 more source
K8s-enhanced lightweight simulation method for the Tor network
Criminals exploit the robust anonymity afforded by Tor for illicit purposes, prompting heightened interest among researchers in de-anonymization attacks on the Tor network.
Huang Wentao +7 more
doaj +1 more source
A negative feedback loop of TOR signaling balances growth and stress-response trade-offs in plants
Summary: TOR kinase is a central coordinator of nutrient-dependent growth in eukaryotes. Maintaining optimal TOR signaling is critical for the normal development of organisms.
Muhammed Jamsheer K +7 more
doaj +1 more source
Horn Clause Programs have a natural depth-first procedural semantics. However, for many programs this procedural semantics is ineffective. In order to compute useful solutions, one needs the ability to modify the search method that explores the alternative execution branches.Tor, a well-defined hook into Prolog disjunction, provides this ability. It is
Schrijvers, Tom +2 more
openaire +1 more source
Dimethyl fumarate (DMF) reduces growth of HPV‐positive cervical cancer spheroids and induces ferroptosis in cervical cancer cells via blocking SLC7A11/Glutathione (GSH) axis. Combination of subcytotoxic doses of DMF and cisplatin (CDDP) further suppresses spheroid growth and drives cell death in 2D culture models.
Carolina Punziano +6 more
wiley +1 more source
Comparative study of anonymous network Tor and I2P
Tor is the most deployed anonymous communication system, providing online anonymity and privacy protection, while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.
YANG Yun, LI Lingyan, WEI Qingzheng
doaj +1 more source
Hippo pathway at the crossroads of stemness and therapeutic resistance in breast cancer
Dysregulation of the Hippo pathway drives nuclear accumulation of YAP/TAZ, activating stemness‐related transcriptional programs that sustain breast cancer stemness and fuel therapeutic resistance across subtypes, underscoring Hippo signaling as a targetable vulnerability. Figure created and edited with BioRender.com.
Giulia Schiavoni +11 more
wiley +1 more source

