Results 71 to 80 of about 13,348 (285)
Transition Probability Matrix Methodology for Incremental Risk Charge [PDF]
As part of Basel II's incremental risk charge (IRC) methodology, this paper summarizes our extensive investigations of constructing transition probability matrices (TPMs) for unsecuritized credit products in the trading book.
Clayton, Michael +3 more
core +1 more source
Access to Knowledge in Africa: the role of copyright [PDF]
The emergence of the Internet and the digital world has changed the way people access, produce and share information and knowledge. Yet people in Africa face challenges in accessing scholarly publications, journals and learning materials in general.
Armstrong, Chris +4 more
core
Chronic Hypoxia Disrupts Spermatogenesis Through ASXL2–EZH2–Mediated Microtubule Destabilization
This study reveals the mechanism by which chronic hypoxia impairs spermatogenesis via the ASXL2–EZH2 axis, hindering the transition of spermatids from round to elongated forms. Key findings reveal that under hypoxic conditions, downregulated ASXL2 expression reduces EZH2 binding to the CEP162 promoter, leading to decreased H3K27me3 modification and ...
Jun Yin +11 more
wiley +1 more source
PD‐1 Inhibits CD4+ TRM‐Mediated cDC1 Mobilization via Suppressing JAML in Human NSCLC
CD4+ tissue‐resident memory T cells (TRMs) in non‐small cell lung cancer recruit conventional type 1 dendritic cells via XCL1‐XCR1 signaling, orchestrating antitumor immunity. The costimulatory molecule JAML is essential for this process. PD‐1 blockade restores JAML expression and cDC1 mobilization, while JAML agonists synergize with anti‐PD‐1 therapy,
Zheyu Shao +16 more
wiley +1 more source
Hybrid plate-TPMS lattice metamaterials with exceptional stiffness and strength
This study introduces new hybrid (multi-topology) lattice metamaterials, combining both plate-lattices and triply periodic minimal surface (TPMS) sheet-based lattices.
Mohamed M. Naji +3 more
doaj +1 more source
TPM-FAIL: TPM meets Timing and Lattice Attacks
The 29th USENIX Security Symposium (Usenix SEC 2020)
Moghimi, Daniel +3 more
openaire +2 more sources
Authenticated tree parity machine key exchange
The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys ...
Schaumburg, André, Volkmer, Markus
core
In this paper we address the problem of closed-form spectral evaluation of CPM. We show that the multi-h CPM signal can be conveniently generated by a PTI SM.
Cariolaro, Gianfranco +3 more
core +1 more source
By integrating single‐nuclei and spatial transcriptomics, this study presents a stereoscopic landscape of maize leaf to Puccinia polysora infection. Epidermal and mesophyll cells initiate primary defenses via RLPs/RLKs and jasmonic acid signaling. Cell‐cell communication analyses further reveal the underlying the dynamics of the underlying immune ...
Qiongqiong Wang +16 more
wiley +1 more source
This study presents the first telomere‐to‐telomere genomes and population resources for Diaporthe pathogens, uncovering the largest known fungal repertoire of secondary metabolite gene clusters. Structural variations and horizontal gene transfer drive cluster diversification, while specific rapidly evolving clusters control virulence, offering novel ...
Kainan Li +9 more
wiley +1 more source

