Advanced search in
Research products
arrow_drop_down
Searching FieldsTerms
Any field
arrow_drop_down
includes
arrow_drop_down
Include:
284,846 Research products, page 1 of 28,485

  • Research software

10
arrow_drop_down
Date (most recent)
arrow_drop_down
  • Closed Access English
    Authors: 
    Nariyoshi, Chida; Tachio, Terauchi;
    Publisher: Zenodo

    This is an artifact of our paper titled "Repairing DoS Vulnerability of Real-World Regexes" (S&P 2022). The artifact consists of an OVA file that stores a PoC implementation of REMEDY described in our paper. To use this, import the OVA file into VirtualBox.

  • Closed Access English
    Authors: 
    Nariyoshi, Chida; Tachio, Terauchi;
    Publisher: Zenodo

    This is an artifact of our paper titled "Repairing DoS Vulnerability of Real-World Regexes" (S&P 2022). The artifact consists of an OVA file that stores a PoC implementation of REMEDY described in our paper. To use this, import the OVA file into VirtualBox...

  • Open Access
    Authors: 
    Massalha, Hassan; Bahar Halpern, Keren; Abu Gazala, Samir; Jana, Tamar; E. Massasa, Efi; E. Moor, Andreas; Buchauer, Lisa; Rozenberg, Milena; Pikarsky, Eli; Amit, Ido; +2 more
    Publisher: Zenodo

    Matlab scripts used to analyze data associated with the manuscript entitled "A single cell atlas of the human liver tumor microenvironment". *please used Matlab 2019b to run the following m files. Files: inputData.mat: Matlab structure file contains input da...

  • Research software . 2027
    Closed Access
    Authors: 
    salilab;
    Publisher: Zenodo

    Working modpipe installation directory with external programs (blast, hhsuite) and custom dataset/scripts. Still needs to set some variables when downloaded. The python scripts in the 'demo' dir are used to convert cif files into databases for 'Seq-Seq' ...

  • Research software . 2026
    Restricted C#
    Authors: 
    Noel, Todd G.; Brooks, Dusty M.;
    Publisher: DOE CODE

    Risk Informed Timelines (RIT) is a more modern and holistic method for understanding how access delay timelines are developed and utilized in physical security system evaluations. The software utilizes Bayesian methods to combine subject matter expert judgement and smal...

  • Embargo English
    Authors: 
    Huang;
    Publisher: Zenodo

    Background: The blue-crowned laughingthrush (Garrulax courtoisi, GCO) is a critically endangered songbird endemic to Wuyuan, China with population of ~323 individuals. It has attracted widespread attention, but the lack of a published genome has limited research and spe...

  • Open Access
    Authors: 
    Brockett, Brittany; Manning, Adrian; Banks, Sam; Neaves, Linda; Gordon, Iain; Pierson, Jennifer;
    Publisher: Zenodo

    Genotyping Following the reintroduction monitoring protocol, adults were marked by PIT microchip at first capture and an ear biopsy was taken (Manning et al. 2019). DNA was extracted from these ear clips using a modified proteinase-K digestion and salting-out method (Mi...

  • Embargo
    Authors: 
    Chen Hao;
    Publisher: Zenodo

    Geese are herbivorous birds that play an essential role in agricultural economy. Here, we constructed the first chromosome-level genome of Chinese indigenous goose (Xingguo gray goose) and revealed the adaptation of fat storage capacity in goose liver during the evoluti...

  • Restricted
    Authors: 
    Nian-Feng Wan; Liwan Fu; Matteo Dainese; Yue-Qing Hu; Lars Pødenphant Kiær; Rebecca Chaplin-Kramer; Forest Isbell; Mark Vellend; Christoph Scherber;
    Publisher: Zenodo

    The R codes of " Plant genetic diversity affects interactions among multiple trophic levels "

  • Open Access English
    Authors: 
    Mittal, Aayushi; Vishakha Gautam; S, Roshan; Sakshi Arora; Sheetanshu Saproo; Gupta, Ria; Mohanty, Sanjay Kumar; Prakriti Garg; Anmol Aggarwal; Padmasini R; +7 more
    Publisher: Zenodo

    The genome of a eukaryotic cell is often vulnerable to both intrinsic and extrinsic threats due to its constant exposure to a myriad of heterogeneous chemical compounds. Despite the availability of innate DNA damage repair pathways, some genomic lesions trigger cells fo...