Results 81 to 90 of about 489,634 (291)

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Vulnerability to water shortages in the 21st Century’s arid and semi-arid American West

open access: yesL'Ordinaire des Amériques, 2015
Scientific studies agree to stress the growing risk of water shortages in the arid and semi-arid American West. Over the next fifty years, at least part of the local population will likely face water shortages which will call into question the ...
Nicolas Barbier
doaj   +1 more source

Wage Earners’ Priority in Bankruptcy: Application to Welfare Fund Payments [PDF]

open access: yes, 1957
This paper describes a study on how cyber security experts assess the importance of three variables related to the probability of successful remote code execution attacks – presence of: (i) non-executable memory, (ii) access and (iii) exploits for High ...
Ekstedt, Mathias   +3 more
core   +1 more source

Pre‐analytical optimization of cell‐free DNA and extracellular vesicle‐derived DNA for mutation detection in liquid biopsies

open access: yesMolecular Oncology, EarlyView.
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen   +11 more
wiley   +1 more source

Complementary medicine among individuals experiencing homelessness in Switzerland: a quantitative and qualitative descriptive study

open access: yesBMC Complementary Medicine and Therapies
Background People experiencing homelessness (PEH) are disproportionately affected by health issues yet remain underserved by the health care system. Emerging findings suggest that complementary medicine (CM) approaches might help address the low access ...
Véronique S. Grazioli   +12 more
doaj   +1 more source

A preliminary analysis of vulnerability scores for attacks in wild [PDF]

open access: yes, 2013
NVD and Exploit-DB are the de facto standard databases used for research on vulnerabilities, and the CVSS score is the standard measure for risk. On open question is whether such databases and scores are actually representative of at- tacks found in the ...
Allodi, Luca, Massacci, Fabio
core  

Harvey: A Greybox Fuzzer for Smart Contracts

open access: yes, 2019
We present Harvey, an industrial greybox fuzzer for smart contracts, which are programs managing accounts on a blockchain. Greybox fuzzing is a lightweight test-generation approach that effectively detects bugs and security vulnerabilities.
Amani Sidney   +55 more
core   +1 more source

Hippo pathway at the crossroads of stemness and therapeutic resistance in breast cancer

open access: yesMolecular Oncology, EarlyView.
Dysregulation of the Hippo pathway drives nuclear accumulation of YAP/TAZ, activating stemness‐related transcriptional programs that sustain breast cancer stemness and fuel therapeutic resistance across subtypes, underscoring Hippo signaling as a targetable vulnerability. Figure created and edited with BioRender.com.
Giulia Schiavoni   +11 more
wiley   +1 more source

Vulnerability Assessment of Ubiquitous Cities Using the Analytic Hierarchy Process

open access: yesFuture Internet, 2020
Urbanization is a challenge faced by most countries worldwide and leads to several problems. Due to rapid communication capabilities, conforming the megacities into Ubiquitous cities (U-cities) seems to be a potential solution to mitigate the problems ...
Muhammad Atiq Ur Rehman Tariq   +2 more
doaj   +1 more source

WHAT VULNERABILITY? WHOSE VULNERABILITY? CONFLICT OF UNDERSTANDINGS IN THE DEBATE ON VULNERABILITY

open access: yesFacta Universitatis, Series: Law and Politics, 2017
In this paper, I intend to explore the apparent difficulty in communication between two understandings of vulnerability: one that claims that vulnerability is a part of conditio humana, a feature closely connected to the facts of (human) embodiment and mortality, and the other which argues for the exclusivity of vulnerability and wishes to limit it to ...
openaire   +3 more sources

Home - About - Disclaimer - Privacy