Results 81 to 90 of about 489,634 (291)
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
Vulnerability to water shortages in the 21st Century’s arid and semi-arid American West
Scientific studies agree to stress the growing risk of water shortages in the arid and semi-arid American West. Over the next fifty years, at least part of the local population will likely face water shortages which will call into question the ...
Nicolas Barbier
doaj +1 more source
Wage Earners’ Priority in Bankruptcy: Application to Welfare Fund Payments [PDF]
This paper describes a study on how cyber security experts assess the importance of three variables related to the probability of successful remote code execution attacks – presence of: (i) non-executable memory, (ii) access and (iii) exploits for High ...
Ekstedt, Mathias +3 more
core +1 more source
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen +11 more
wiley +1 more source
Background People experiencing homelessness (PEH) are disproportionately affected by health issues yet remain underserved by the health care system. Emerging findings suggest that complementary medicine (CM) approaches might help address the low access ...
Véronique S. Grazioli +12 more
doaj +1 more source
A preliminary analysis of vulnerability scores for attacks in wild [PDF]
NVD and Exploit-DB are the de facto standard databases used for research on vulnerabilities, and the CVSS score is the standard measure for risk. On open question is whether such databases and scores are actually representative of at- tacks found in the ...
Allodi, Luca, Massacci, Fabio
core
Harvey: A Greybox Fuzzer for Smart Contracts
We present Harvey, an industrial greybox fuzzer for smart contracts, which are programs managing accounts on a blockchain. Greybox fuzzing is a lightweight test-generation approach that effectively detects bugs and security vulnerabilities.
Amani Sidney +55 more
core +1 more source
Hippo pathway at the crossroads of stemness and therapeutic resistance in breast cancer
Dysregulation of the Hippo pathway drives nuclear accumulation of YAP/TAZ, activating stemness‐related transcriptional programs that sustain breast cancer stemness and fuel therapeutic resistance across subtypes, underscoring Hippo signaling as a targetable vulnerability. Figure created and edited with BioRender.com.
Giulia Schiavoni +11 more
wiley +1 more source
Vulnerability Assessment of Ubiquitous Cities Using the Analytic Hierarchy Process
Urbanization is a challenge faced by most countries worldwide and leads to several problems. Due to rapid communication capabilities, conforming the megacities into Ubiquitous cities (U-cities) seems to be a potential solution to mitigate the problems ...
Muhammad Atiq Ur Rehman Tariq +2 more
doaj +1 more source
WHAT VULNERABILITY? WHOSE VULNERABILITY? CONFLICT OF UNDERSTANDINGS IN THE DEBATE ON VULNERABILITY
In this paper, I intend to explore the apparent difficulty in communication between two understandings of vulnerability: one that claims that vulnerability is a part of conditio humana, a feature closely connected to the facts of (human) embodiment and mortality, and the other which argues for the exclusivity of vulnerability and wishes to limit it to ...
openaire +3 more sources

