Academic literature on the topic 'File'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'File.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "File"

1

Sahni, Priyanka, and Nonika Sharma. "File System." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 1, no. 4 (April 30, 2014): 01–05. http://dx.doi.org/10.53555/nncse.v1i4.513.

Full text
Abstract:
A file is a named collection of related information that is recorded on secondary storage such as magnetic disks, magnetic tapes and optical disks. In general, a file is a sequence of bits, bytes, lines or records whose meaning is defined by the files creator and user. In our research paper we’re going to focus on File Structure, File Type, File Names, Pathnames. File Structure - It is a structure, which is according to a required format that operating system can understand. File types also can be used to indicate the internal structure of the file. File Type – It refers to the ability of the operating system to distinguish different types of file such as text files, source files and the binary files etc .Many Operating system supports many types of files .Operating system like MS-DOS and UNIX have following types of files:
APA, Harvard, Vancouver, ISO, and other styles
2

Herlambang, Herlambang, Antory Royan, and Samhori Samhori. "PROCESS OF PROSPEROUS RESEARCH FILES IN THE CASE DETERMINING NEW INSTITUTIONS IN CRIMINAL MEASURES CORRUPTION." Bengkoelen Justice : Jurnal Ilmu Hukum 10, no. 1 (June 8, 2020): 1–12. http://dx.doi.org/10.33369/j_bengkoelenjust.v10i1.11339.

Full text
Abstract:
This thesis is the result of research on "Process Attorney Researcher Case file in Determine Suspect New on Corruption", specifically this thesis discusses the process of determining the new suspects by prosecutors investigators file corruption cases and factor inhibitors for Attorney Researcher Files Case to determine a suspect new in the case file corruption. In particular, this thesis examines several cases of corruption filed by Investigator Police Resort Arga Makmur District Attorney of Public Prosecutions to Arga Makmur. The results of the study illustrate that the Attorney Researcher in determining new suspects in the case files submitted by police investigators are using the instrument giving direct instructions by the prosecution team of researchers P 19 and the instrument exposes / his case subsequently prosecutors investigators case file gives instructions to the investigator to be fulfilled within 14 days after prosecutors clue investigators met by investigators, the case file is declared complete by prosecutors investigators (P21).
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Ya Rong, Pei Rong Wang, and Rui Liu. "Hybrid File System - A Strategy for the Optimization of File System." Advanced Materials Research 734-737 (August 2013): 3129–32. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3129.

Full text
Abstract:
The hybrid file system is designed to optimize the latency of the response of File System I/Os and extend the capacity of the local file system to cloud by taking the advantage of Internet. Our hybrid file system is consist of SSD, HDD and Amazon S3 cloud file system. We store small files, directory tree and metadata of all the files in SSD, because SSD has a good performance for the response of small and random I/Os. HDD is good at responding big and sequential I/Os, so we use it just like a warehouse to store big files which are linked by the symbolic files in the SSD. We also extend the local file system to cloud in order to enlarge its capacity. In this paper we describe test data of our hybrid file system and also its design and implement details.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhao, Zhen Zhou, and Zhong Yong Fu. "The Research of Excel File Fragmentation Data Recovery." Applied Mechanics and Materials 496-500 (January 2014): 2274–78. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.2274.

Full text
Abstract:
Because the Excel file is often edited, the data blocks stored in the hard disk which make up the Excel file is often not continuous. Discontinuous storage fragmented files, deleted or formatted, with the current data recovery software to restore the effect is very poor, often file recovery, but can not open or is garbled. Therefore it makes sense to study an effective recovery method to recover Excel fragmented files. Based on "Laura" file format, first introduced the Windows platform fragmented files, and then given an Excel file fragmentation recognition method, final based on debris identify given Excel file fragmentation restructuring.
APA, Harvard, Vancouver, ISO, and other styles
5

Taufik, Ichsan, Undang Syaripudin, Faiz M. Kaffah, Jaka Giri Sobirin, Nanang Ismail, and Teddy Surya Gunawan. "Concealment of Files Blocked by Gmail with EOF-Based Image Steganography." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 716. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp716-721.

Full text
Abstract:
Nowadays, due to security concern, not all the process of sending files via email runs smoothly. There are several types of file extensions that are blocked when sent via email. For examples, there are several file extensions blocked by Gmail. This paper discusses steganographic implementation using End of File (EOF) algorithm to insert special file into image cover file with JPG and PNG format so that files with these extensions can be sent via email. Before a special extension file is inserted into the cover file, a compression process should be conducted first to make the file size smaller. The proposed algorithm is implemented on Visual Basic.Net software. Based on the tests performed, the application can insert Gmail-blocked file system to the image cover file, without changing the physical bit of the image cover file or file system that inserted with 100% success rate. The stego-image file is also successfully sent via email without being blocked.
APA, Harvard, Vancouver, ISO, and other styles
6

Narjis Mezaal Shati and Ali Jassim Mohamed Ali. "Hiding Any Data File Format into Wave Cover." journal of the college of basic education 16, no. 69 (October 31, 2019): 1–10. http://dx.doi.org/10.35950/cbej.v16i69.4739.

Full text
Abstract:
In the current study a steganography approach utilized to hide various data file format in wave files cover. Lest significant bit insertion (LSB) used to embedding a regular computer files (such as graphic, execution file (exe), sound, text, hyper text markup language (HTML) …etc) in a wave file with 2-bits hiding rates. The test results achieved good performance to hide any data file in wave file.
APA, Harvard, Vancouver, ISO, and other styles
7

Pitchiah, Pragadeesh A., and Prathima G. Shivashankarappa. "Rotary Files in Pediatric Dentistry: From Then Till Now." Journal of Scientific Dentistry 10, no. 2 (2020): 55–57. http://dx.doi.org/10.5005/jp-journals-10083-0926.

Full text
Abstract:
ABSTRACT The introduction of adult NiTi rotary file system for children was a revolution in the field of pediatric endodontics. With the use of these files, cost-effective, consistent obturations were made possible in shorter instrumentation time. The various restraints of adult rotary files such as file length and taper created the need for newer rotary file system. These voids were fulfilled with the advent of exclusive pediatric rotary file—Kedo-S file system. In this article, we have discussed how the innovative pediatric rotary files have made its mark overpowering the limitations of the existing adult rotary file system in children. How to cite this article: Pitchiah PA, Shivashankarappa PG. Rotary Files in Pediatric Dentistry: From Then Till Now. J Sci Dent 2020;10(2):55–57.
APA, Harvard, Vancouver, ISO, and other styles
8

Bhat, Anirudh, Aryan Likhite, Swaraj Chavan, and Leena Ragha. "File Fragment Classification using Content Based Analysis." ITM Web of Conferences 40 (2021): 03025. http://dx.doi.org/10.1051/itmconf/20214003025.

Full text
Abstract:
One of the major components in Digital Forensics is the extraction of files from a criminal’s hard drives. To achieve this, several techniques are used. One of these techniques is using file carvers. File carvers are used when the system metadata or the file table is damaged but the contents of the hard drive are still intact. File carvers work on the raw fragments in the hard disk and reconstruct files by classifying the fragments and then reassembling them to form the complete file. Hence the classification of file fragments has been an important problem in the field of digital forensics. The work on this problem has mainly relied on finding the specific byte sequences in the file header and footer. However, classification based on header and footer is not reliable as they may be modified or missing. In this project, the goal is to present a machine learningbased approach for content-based analysis to recognize the file types of file fragments. It does so by training a Feed-Forward Neural Network with a 2-byte sequence histogram feature vector which is calculated for each file. These files are obtained from a publicly available file corpus named Govdocs1. The results show that content-based analysis is more reliable than relying on the header and footer data of files.
APA, Harvard, Vancouver, ISO, and other styles
9

Karanović, Lj, and D. Poleti. "A FORTRAN Program for Conversion of PC-APD Data Files into ASCII Files." Powder Diffraction 7, no. 3 (September 1992): 179. http://dx.doi.org/10.1017/s0885715600018595.

Full text
Abstract:
Recently, Dahan and co-workers (Dahan, 1991) suggested processing the XRD data by spreadsheet computer programs. Treated in this manner the XRD data became very flexible and made comparison with other data sets, as well as graphical presentation, much easier. In this note a simple FORTRAN 77 program for conversion of PC-APD data files into ASCII files suitable for import into spreadsheets is reported.In our laboratory XRD data are collected on a Philips 1710 diffractometer operated by the PC-APD version 2.0 (PC-APD Software, 1989). Each experiment usually generates its files containing collected raw intensity data (.RD file), background data (.BK file) and file with peak positions and their intensities (.DI file). The XRD data can be further processed: after smoothing, data are stored in files with extension .SM (.SM file) and, after Kα2 stripping, into files with extension .A2 (.A2 file). All files are stored in the binary format.
APA, Harvard, Vancouver, ISO, and other styles
10

Abhilisha Pandurang Bhalke. "Enhancement the Efficiency of Work with P2P System." International Journal for Modern Trends in Science and Technology 06, no. 09 (October 29, 2020): 68–72. http://dx.doi.org/10.46501/ijmtst060911.

Full text
Abstract:
The P2P system should be used Proximity information to minimize the load of file request and improve the efficiency of the work .Clustering peers for their physical proximity can also rise the performance of the request file. However, very few currently work in a peer group based on demands as peers on physical proximity. Although structured P2P provides more efficient files requests than unstructured P2P, it is difficult to apply because of their strictly defined topology. In this work, we intending to introduce a system for exchange a P2P file for proximity and level of interest based on structured P2P nodes that form physically block in the cluster and other groups physically close and nodes of public interest in sub-cluster based on the hierarchical topology. Querying an effective file is important for the overall P2P file exchange performance. Clustering peers from their common interests can significantly enhance the efficiency of the request file PAIS use an intelligent file replication algorithm to further rise the efficiency of the request file .Create a copy file that is often requested by a group of physically close nodes in their position. In addition, PAIS improves the search for files within the intra-system sub-cluster through various approaches. First, it further classifies interest in the sub-cluster to a number of subsections of interests and groups with common interest-free sub nodes in the group for file sharing. Secondly PAIS creates an over for each group that connects nodes of less node capacity to a higher throughput for the distributed node overload prevention request file. Third, in order to reduce the search for late files, PAIS uses a set of proactive information so that applicant can file knowledge if its requested file is in the neighboring nodes. Fourth, reduce the overhead of collecting information about files using the PAIS, collection of file information based on the Bloom Filter and the corresponding search for files distributed. Fifth, in order to improve the efficiency of file sharing, PAIS ranks the results with a blob of filters in order. Sixth, while the newly visited file is usually re-visited approach, based on the Bloom filter is improved only through the management of new information flowering filter is added to reduce the delay of file search. The experimental result of the Real-world Planet Lab Experiment shows that PAIS significantly reduces overhead and improves the efficiency of scrolling and without sharing files. In addition, the experimental results show high efficiency within the sub-research cluster of file approaches to improve file search efficiency.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "File"

1

Rivera, Gabrio. "From file pathnames to file objects /." Zürich, 2001. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=14377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yarovyi, O. "File system." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/40511.

Full text
Abstract:
Nowadays, many people use electronic devices. For example, it is can be cameras, mobile phones, computers and others. The file system is a very important component of any device that works with the file.
APA, Harvard, Vancouver, ISO, and other styles
3

García, Moral Daniel Jesús. "Remote File Access System for Generic Ericsson Processor Boards : File transfer service, Random Access Memory-based file system and secure file transfer solution research." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-53448.

Full text
Abstract:
Generic Ericsson Processor boards are general purpose hardware platforms which provide generic processing services. They support the Unified Extensible Firmware Interface Specification. They have several network interfaces available and they are connected to Ericsson’s laboratory network. Several servers are also connected to this network. These boards require periodic firmware upgrades. They also require acquiring new firmware components and data files. Currently, an application to download or upload files from and to Ericsson’s laboratory servers when an Operating System has not already been booted does not exist. Therefore, the files have to be transferred to USB drives which are connected later to the boards in order to transfer the files. This is a time consuming operation which decreases Ericsson’s productivity. In addition, although Generic Ericsson Processor boards have an optional solid-state drive as secondary storage, Ericsson wants to be able to operate without it. This is because this secondary storage is not always available and Ericsson does not want to use it when the Generic Ericsson Processor boards are operating before an Operating System has been loaded. They prefer to use Random Access Memory storage. This project is focused on studying possible solutions for those two problems. Several file transfer protocols are analyzed. Several file system solutions mounted on Random Access Memory are also explored. A Trivial File Transfer Protocol client application and a Random Access Memory Disk driver prototype are designed, implemented and tested. They are tailored to work on a pre-boot environment, when the boards have not booted an Operating System yet, in Ericsson’s laboratory network. Finally, a secure file transfer protocols’ study is developed. This study will be used to assess Ericsson on the optimal secure file transfer protocol choice in order to implement possible secure future versions of the system.
APA, Harvard, Vancouver, ISO, and other styles
4

Ordulu, Nizameddin (Nizameddin H. ). "A file system for accessing MySQL tables as CSV files." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/62664.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 49-50).
In this thesis, we describe the design and implementation of a userspace file system that represents MySQL tables as comma-separated values (CSV) files. The users can access and modify the data through both the file system and MySQL's query interface. In order to transform read and write operations to SQL queries, we maintain a reverse index from file offsets to line numbers. Changes to the database outside of the file system are reflected on the file system by means of MySQL's master-slave replication feature. We evaluate our system by comparing its performance to a regular file system's performance using popular command line tools(grep, sed, awk) and user applications (OpenOffice.org spreadsheets). The choice of the database for this system was MySQL because of its popularity and the availability of its source code, however, the same ideas can be applied to any relational database with replication to create a similar system.
by Nizameddin Ordulu.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Irene Y. (Irene Yun). "Efficient file distribution in a flexible,wide-area file system." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/53188.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 63-65).
WheelFS is a wide-area distributed file system designed to help applications cope with the challenges of sharing data over the wide-area network. A wide range of applications can use WheelFS as a storage layer because applications can control various trade-offs in WheelFS, such as consistency versus availability, using semantic cues. One key feature that many applications require from any storage system is efficient file distribution. The storage system needs to be able to serve files quickly, even large or popular ones, and allow users and applications to quickly browse files. Wide-area links with high latency and low throughput make achieving these goals difficult for most distributed storage systems. This thesis explores using pre fetching, a traditional file system optimization technique, in wide-area file systems for more efficient file distribution. This thesis focuses on Tread, a pref etcher for WheelFS. Tread includes several types of pre fetching to improve the performance of reading files and directories in WheelFS: read-ahead pre fetching, whole file prefetching, directory prefetching and a prefetching optimization for WheelFS's built-in cooperative caching. To makes the best use of scarce wide-area resources, Tread adaptively rate-limits prefetching and gives applications control over what and how prefetching is done using WheelFS's semantic cues. Experiments show that Tread can reduce the time to read a 10MB file in WheelFS by 40% and the time to list a directory with 100 entries by more than 80%.
(cont.) In addition, experiments on Planetlab show that using prefetching with cooperative caching to distribute a 10MB file to 270 clients reduces the average latency for each client to read the file by almost 45%.
by Irene Y. Zhang.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
6

Purdin, Titus Douglas Mahlon. "ENHANCING FILE AVAILABILITY IN DISTRIBUTED SYSTEMS (THE SAGUARO FILE SYSTEM)." Diss., The University of Arizona, 1987. http://hdl.handle.net/10150/184161.

Full text
Abstract:
This dissertation describes the design and implementation of the file system component of the Saguaro operating system for computers connected by a local-area network. Systems constructed on such an architecture have the potential advantage of increased file availability due to their inherent redundancy. In Saguaro, this advantage is made available through two mechanisms that support semi-automatic file replication and access: reproduction sets and metafiles. A reproduction set is a collection of files that the system attempts to keep identical on a "best effort" basis, relying on the user to handle unusual situations that may arise. A metafile is a special file that contains symbolic path names of other files; when a metafile is opened, the system selects an available constituent file and opens it instead. These mechanisms are especially appropriate for situations that do not require guaranteed consistency or a large number of copies. Other interesting aspects of the Saguaro file system design are also described. The logical file system forms a single tree, yet any file can be placed in any of the physical file systems. This organization allows the creation of a logical association among files that is quite different from their physical association. In addition, the broken path algorithm is described. This algorithm makes it possible to bypass elements in a path name that are on inaccessible physical file systems. Thus, any accessible file can be made available, regardless of the availability of directories in its path. Details are provided on the implementation of the Saguaro file system. The servers of which the system is composed are described individually and a comprehensive operational example is supplied to illustrate their interation. The underlying data structures of the file system are presented. The virtual roots, which contain information used by the broken path algorithm, are the most novel of these. Finally, an implementation of reproduction sets and metafiles for interconnected networks running Berkeley UNIX is described. This implementation demonstrates the broad applicability of these mechanisms. It also provides insight into the way in which mechanisms to facilitate user controlled replication of files can be inexpensively added to existing file systems. Performance measurements for this implementation are also presented.
APA, Harvard, Vancouver, ISO, and other styles
7

Alsowail, Rakan. "Secure file sharing." Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/63551/.

Full text
Abstract:
File sharing has become an indispensable part of our daily lives. The shared files might be sensitive, thus, their confidentially, integrity and availability should be protected. Such protection might be against external threats that are initiated by unauthorised users or insider threats that are initiated by authorised users. Our main interest in this thesis is with insider threats. Protecting shared files against insiders is a challenging problem. Insiders enjoy various characteristics such as being trusted and authorised, in addition to being inside the network perimeter and having knowledge of information systems. This makes it difficult to prevent or detect policy violation for these users. The goal of this thesis is to protect shared files from the perspective of insider security with language-based techniques. In the first part of the thesis, we define what we mean by an insider and the insider problem precisely, and propose an approach to classify the insider problem into different categories. We then define and focus on one category that is related to file sharing. Namely, protecting the confidentiality and integrity of the shared files against accidental misuse by insiders. Furthermore, we classify the activity of file sharing into different categories that describe all possible ways of performing the activity of file sharing. These categories represent policies that describe how files should be propagated and accessed by insiders. We show that enforcing these policies can protect the files against accidental misuse by insiders while allowing the activity of sharing to be performed as desired. Thus our interest can be summarised as keeping honest users safe. In the second part of the thesis, we develop a security type system that statically enforces information flow and access control policies in a file system. Files are associated with security types that represent security policies, and programs are sets of operations to be performed on files such as read, copy, move, etc. A type checker, therefore, will statically check each operation to be performed on a file and determine whether the operation satisfies the policy of the file. We prove that our type system is sound and develop a type reconstruction algorithm and prove its soundness and completeness. The type system we developed in this thesis protects the files against accidental misuse by insiders.
APA, Harvard, Vancouver, ISO, and other styles
8

Motara, Yusuf Moosa. "File integrity checking." Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1007701.

Full text
Abstract:
This thesis looks at file execution as an attack vector that leads to the execution of unauthorized code. File integrity checking is examined as a means of removing this attack vector, and the design, implementation, and evaluation of a best-of-breed file integrity checker for the Linux operating system is undertaken. We conclude that the resultant file integrity checker does succeed in removing file execution as an attack vector, does so at a computational cost that is negligible, and displays innovative and useful features that are not currently found in any other Linux file integrity checker.
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Hojin. "S1_Scrambled_siRNA [Digital file]." Diss., Temple University Libraries, 2008. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/254229.

Full text
Abstract:
Microbiology and Immunology;
Ph.D.;
c-Cbl functions as a multifunctional adaptor and an E3 ubiquitin protein ligase. Several studies have shown that c-Cbl is involved in cytoskeleton-mediated events, but the molecular mechanisms linking c-Cbl to cytoskeletal rearrangements remain to be elucidated. Our previous results indicated that c-Cbl facilitates spreading and migration of v-Abl-transformed NIH 3T3 fibroblasts and suggested that small GTPases play important roles in the cytoskeletal effects of c-Cbl in this system. To elucidate the individual contributions of small GTPases to these effects, we assessed the roles of endogenous Rac1, RhoA and Rap1 in the c-Cbl-dependent spreading and migration of v-Abl-transformed fibroblasts overexpressing c-Cbl, using RNAi. Furthermore, since it has been shown that Rap1 can act as an upstream regulator of Rac1 in inducing cell spreading, we analyzed the interplay between Rap1 and Rac1 in the signaling pathways connecting c-Cbl to the cytoskeletal events. Our results indicate that Rac1 is essential for cell migration and spreading, whereas activation of RhoA exerts a negative effect. We have also shown that Rap1 is essential for cell spreading, although not for migration in our experimental system. Furthermore, we provide evidence that Rap1 is located upstream of Rac1 in one of the signaling pathways that regulate c-Cbl-facilitated cell spreading. Overall, our findings are consistent with the model describing the connection of c-Cbl to the cytoskeletal rearrangements via two pathways, one of which is mediated by PI3K and Rac1, and the other, by CrkL/C3G, Rap1 and Rac1. A major biological feature of glioma is the ability to invade normal brain tissue. The molecular mechanisms of glioma invasion are involved in multiple biological processes which are primarily associated with cytoskeleton-mediated events including adhesion, migration, degradation of extra cellular matrix (ECM). Biological functions of c-Cbl in glioma have not been elucidated. In this study, we examined biological roles of c-Cbl using RNAi-mediated depletion of endogenous c-Cbl and stably c-Cbl expressing glioma cells generated by lentiviral transduction and showed that c-Cbl increases invasion through degradation of ECM by upregulation of MMP2 but not through migration, adhesion, or growth of SNB19, a grade IV glioblastoma cell line.
Temple University--Theses
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Hojin. "S2_RhoA_siRNA [Digital file]." Diss., Temple University Libraries, 2008. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/254230.

Full text
Abstract:
Microbiology and Immunology;
Ph.D.;
c-Cbl functions as a multifunctional adaptor and an E3 ubiquitin protein ligase. Several studies have shown that c-Cbl is involved in cytoskeleton-mediated events, but the molecular mechanisms linking c-Cbl to cytoskeletal rearrangements remain to be elucidated. Our previous results indicated that c-Cbl facilitates spreading and migration of v-Abl-transformed NIH 3T3 fibroblasts and suggested that small GTPases play important roles in the cytoskeletal effects of c-Cbl in this system. To elucidate the individual contributions of small GTPases to these effects, we assessed the roles of endogenous Rac1, RhoA and Rap1 in the c-Cbl-dependent spreading and migration of v-Abl-transformed fibroblasts overexpressing c-Cbl, using RNAi. Furthermore, since it has been shown that Rap1 can act as an upstream regulator of Rac1 in inducing cell spreading, we analyzed the interplay between Rap1 and Rac1 in the signaling pathways connecting c-Cbl to the cytoskeletal events. Our results indicate that Rac1 is essential for cell migration and spreading, whereas activation of RhoA exerts a negative effect. We have also shown that Rap1 is essential for cell spreading, although not for migration in our experimental system. Furthermore, we provide evidence that Rap1 is located upstream of Rac1 in one of the signaling pathways that regulate c-Cbl-facilitated cell spreading. Overall, our findings are consistent with the model describing the connection of c-Cbl to the cytoskeletal rearrangements via two pathways, one of which is mediated by PI3K and Rac1, and the other, by CrkL/C3G, Rap1 and Rac1. A major biological feature of glioma is the ability to invade normal brain tissue. The molecular mechanisms of glioma invasion are involved in multiple biological processes which are primarily associated with cytoskeleton-mediated events including adhesion, migration, degradation of extra cellular matrix (ECM). Biological functions of c-Cbl in glioma have not been elucidated. In this study, we examined biological roles of c-Cbl using RNAi-mediated depletion of endogenous c-Cbl and stably c-Cbl expressing glioma cells generated by lentiviral transduction and showed that c-Cbl increases invasion through degradation of ECM by upregulation of MMP2 but not through migration, adhesion, or growth of SNB19, a grade IV glioblastoma cell line.
Temple University--Theses
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "File"

1

Filo file for filophiles. New Orleans: Andesign, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bieberich, G. Sampson. Illustration files and file environments. Albany, Oregon, USA: Meanderings, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Paulo, Brazil) Festival Internacional de Linguagem Eletrônica (11th 2010 São. FILE 2010: FILE Prix Lux : FILE Pai. São Paulo: FILE, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barreto, Ricardo, and Paula Perissinoto. FILE. Edited by Festival Internacional de Linguagem Eletronica. São Paulo: FILE, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

The Y2K File (Film). The Edge Press/Mnemonics, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dugdale, John. File on Shepard (Writer-Files). Heinemann, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Page, Malcolm. File on Pinter (Writer-Files). Heinemann, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Watts, Alan. UFO Sci-File (Science Files). Red Bird Publishing, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Piasecki, Andy. File on Lorca (Writer-Files). Heinemann (Txt), 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dk Publishing. Fun Files: Dinosaur Fun File. DK CHILDREN, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "File"

1

Hewitt, Jill A., and Raymond J. Frank. "Files and File Handling." In Software Engineering in Modula-2, 94–103. London: Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-11260-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lischner, Ray. "Files and File Names." In Exploring C++20, 561–69. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5961-0_66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mohanta, Abhijit, and Anoop Saldanha. "Files and File Formats." In Malware Analysis and Detection Engineering, 53–69. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6193-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hantelmann, Fred. "Files and File Systems." In LINUX Start-up Guide, 55–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/978-3-642-60749-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Friesen, Jeff. "File." In Java I/O, NIO and NIO.2, 19–42. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1565-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weik, Martin H. "file." In Computer Science and Communications Dictionary, 604. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_7112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Krafsur, E. S., R. D. Moon, R. Albajes, O. Alomar, Elisabetta Chiappini, John Huber, John L. Capinera, et al. "File." In Encyclopedia of Entomology, 1424. Dordrecht: Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-6359-6_3801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bährle-Rapp, Marina. "file." In Springer Lexikon Kosmetik und Körperpflege, 206. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71095-0_3993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bressoud, Thomas, and David White. "File Systems and File Processing." In Introduction to Data Systems, 17–57. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54371-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sarwar, Syed Mansoor, and Robert M. Koretsky. "Files and File System Structure." In Linux, 69–96. Second edition. | Boca Raton : Taylor & Francis, CRC Press,: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/b22134-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "File"

1

Ahlers, Dirk, and Mahsa Mehrpoor. "Everything is Filed under 'File'." In the 26th ACM Conference. New York, New York, USA: ACM Press, 2015. http://dx.doi.org/10.1145/2700171.2791046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harter, Tyler, Chris Dragga, Michael Vaughn, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. "A file is not a file." In the Twenty-Third ACM Symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2043556.2043564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cai, Tao, Jiancong Shi, Dejiao Niu, Jie Wang, Fei Wang, and Lei Li. "The Fine Grained Collaborative NVM File System." In 2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 2020. http://dx.doi.org/10.1109/hpcc-smartcity-dss50907.2020.00010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Xiuqiao, Bin Dong, Limin Xiao, Li Ruan, and Yi Ding. "Small Files Problem in Parallel File System." In 2011 International Conference on Network Computing and Information Security (NCIS). IEEE, 2011. http://dx.doi.org/10.1109/ncis.2011.143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ku, Chan-I., Guo-Heng Luo, Che-Pin Chang, and Shyan-Ming Yuan. "File Deduplication with Cloud Storage File System." In 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE). IEEE, 2013. http://dx.doi.org/10.1109/cse.2013.52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cherng-Ying Ing and Tzao-Lin Lee. "Heterogeneous file sharing by file-system emulation." In 2008 13th Asia-Pacific Computer Systems Architecture Conference (ACSAC). IEEE, 2008. http://dx.doi.org/10.1109/apcsac.2008.4625479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Carns, Philip, Sam Lang, Robert Ross, Murali Vilayannur, Julian Kunkel, and Thomas Ludwig. "Small-file access in parallel file systems." In Distributed Processing (IPDPS). IEEE, 2009. http://dx.doi.org/10.1109/ipdps.2009.5161029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Shu-fen, Sheng Pei, Xing-yan Huang, and Lu Tian. "File hiding based on FAT file system." In Education (ITIME). IEEE, 2009. http://dx.doi.org/10.1109/itime.2009.5236280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Intro file." In 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA). IEEE, 2015. http://dx.doi.org/10.1109/aiccsa.2015.7507263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"File reference." In 2007 International Conference on Intelligent and Advanced Systems. IEEE, 2007. http://dx.doi.org/10.1109/icias.2007.4658617.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "File"

1

Kulesza, Joel. Vim Syntax File for MCNP Input Files. Office of Scientific and Technical Information (OSTI), December 2020. http://dx.doi.org/10.2172/1734694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zilberman, Mark. Test file. MZB Standard Enterprise, October 2022. http://dx.doi.org/10.57098/sr.biology.123.

Full text
Abstract:
Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.
APA, Harvard, Vancouver, ISO, and other styles
3

Zilberman, Mark. Test file. MZB Standard Enterprise, October 2022. http://dx.doi.org/10.57098/sr-biology.123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abd-El-Malek, Michael, Matthew Wachs, James Cipar, Karan Sanghi, Gregory R. Ganger, Garth A. Gibson, and Michael K. Reiter. File System Virtual Appliances: Portable File System Implementations. Fort Belvoir, VA: Defense Technical Information Center, May 2009. http://dx.doi.org/10.21236/ada512851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abd-El-Malek, Michael, Matthew Wachs, James Cipar, Karen Sanghi, Gregory R. Ganger, Garth A. Gibson, and Michael K. Reiter. File System Virtual Appliances: Portable File System Implementations. Fort Belvoir, VA: Defense Technical Information Center, April 2010. http://dx.doi.org/10.21236/ada522537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mokhtarani, Akbar, Matthew Andrews, Jason Hick, and William Kramer. Large File System Backup: NERSC Global File System Experience. Office of Scientific and Technical Information (OSTI), October 2008. http://dx.doi.org/10.2172/941678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Thoreson, Gregory G. PCF File Format. Office of Scientific and Technical Information (OSTI), August 2017. http://dx.doi.org/10.2172/1378172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Postel, J., and J. Reynolds. File Transfer Protocol. RFC Editor, October 1985. http://dx.doi.org/10.17487/rfc0959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wareham, Lindsey Paige. MOSRC Test File. Office of Scientific and Technical Information (OSTI), September 2016. http://dx.doi.org/10.2172/1562404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Welch, Brent B., and John K. Ousterhout. Pseudo-File-Systems. Fort Belvoir, VA: Defense Technical Information Center, April 1989. http://dx.doi.org/10.21236/ada631678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography