Results 51 to 60 of about 812,870 (286)
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson +9 more
wiley +1 more source
Diversity and social capital within the workplace:evidence from Britain [PDF]
This paper uses the British Workplace Employee Relations Survey to investigate the impact of gender and ethnic diversity on workers’ level of trust in managers and the extent of identity with the values and objectives of the firm – dimensions of what we ...
Breda, Thomas, Manning, Alan
core
Personality predictors of levels of forgiveness two and a half years after the transgression [PDF]
The aim of the present study was to explore whether the domains and facets of the five-factor model of personality predicted motivational states for avoidance and revenge following a transgression at a second temporal point distant from the original ...
Alex M. Wood +21 more
core +1 more source
The dual roles of CC and CXC chemokines in distinguishing active, latent, and subclinical tuberculosis were reviewed, along with an evaluation of their potential as diagnostic biomarkers and therapeutic targets to advance precision medicine in tuberculosis management. The graphical abstract was generated with AI assistance (Gemini 3.0).
Xuying Yin, Dangsheng Xiao, Jiezuan Yang
wiley +1 more source
Does refusal bias influence the measurement of Chinese political trust? [PDF]
Measurements of Chinese political trust may be inaccurate due to ‘refusal bias’, resulting from unwillingness of people with certain attitudes to take part in surveys.
Munro, Neil
core +1 more source
Directed evolution of enzymes at the crossroads of tradition and innovation
An iterative cycle of data‐driven enzyme optimization comprising four stages: genetic diversification of a template enzyme, expression of protein variants, high‐throughput evaluation, and machine‐learning‐guided redesign of the next variant library.
Maria Tomkova +2 more
wiley +1 more source
The significance of artificial intelligence in zero trust technologies: a comprehensive review
In the era of cloud computing, cybersecurity has assumed paramount importance. As organizations transition to cloud-based solutions, cyberattackers increasingly target cloud services as a lucrative avenue for unauthorized access to sensitive information.
Deepa Ajish
doaj +1 more source
Toward zero trust in 5G Industrial Internet collaboration systems
With the introduction of 5G, users and devices can access the industrial network from anywhere in the world. Therefore, traditional perimeter-based security technologies for industrial networks can no longer work well.
Han Zhang, Ziyan Zhang, Liquan Chen
doaj +1 more source
Weak enforcement of international contracts can substantially reduce international trade. We develop a model where agents build reputations to overcome the difficulties that this institutional failure causes in a context of incomplete information.
Araujo, Luis, Ornelas, Emanuel
core +1 more source
This Is Not a Myeloproliferative Neoplasm…
Pediatric Blood &Cancer, EarlyView.
Stephanie Juané Kennedy
wiley +1 more source

