Gotowa bibliografia na temat „File”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „File”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "File"

1

Sahni, Priyanka, i Nonika Sharma. "File System". Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 1, nr 4 (30.04.2014): 01–05. http://dx.doi.org/10.53555/nncse.v1i4.513.

Pełny tekst źródła
Streszczenie:
A file is a named collection of related information that is recorded on secondary storage such as magnetic disks, magnetic tapes and optical disks. In general, a file is a sequence of bits, bytes, lines or records whose meaning is defined by the files creator and user. In our research paper we’re going to focus on File Structure, File Type, File Names, Pathnames. File Structure - It is a structure, which is according to a required format that operating system can understand. File types also can be used to indicate the internal structure of the file. File Type – It refers to the ability of the operating system to distinguish different types of file such as text files, source files and the binary files etc .Many Operating system supports many types of files .Operating system like MS-DOS and UNIX have following types of files:
Style APA, Harvard, Vancouver, ISO itp.
2

Herlambang, Herlambang, Antory Royan i Samhori Samhori. "PROCESS OF PROSPEROUS RESEARCH FILES IN THE CASE DETERMINING NEW INSTITUTIONS IN CRIMINAL MEASURES CORRUPTION". Bengkoelen Justice : Jurnal Ilmu Hukum 10, nr 1 (8.06.2020): 1–12. http://dx.doi.org/10.33369/j_bengkoelenjust.v10i1.11339.

Pełny tekst źródła
Streszczenie:
This thesis is the result of research on "Process Attorney Researcher Case file in Determine Suspect New on Corruption", specifically this thesis discusses the process of determining the new suspects by prosecutors investigators file corruption cases and factor inhibitors for Attorney Researcher Files Case to determine a suspect new in the case file corruption. In particular, this thesis examines several cases of corruption filed by Investigator Police Resort Arga Makmur District Attorney of Public Prosecutions to Arga Makmur. The results of the study illustrate that the Attorney Researcher in determining new suspects in the case files submitted by police investigators are using the instrument giving direct instructions by the prosecution team of researchers P 19 and the instrument exposes / his case subsequently prosecutors investigators case file gives instructions to the investigator to be fulfilled within 14 days after prosecutors clue investigators met by investigators, the case file is declared complete by prosecutors investigators (P21).
Style APA, Harvard, Vancouver, ISO itp.
3

Wang, Ya Rong, Pei Rong Wang i Rui Liu. "Hybrid File System - A Strategy for the Optimization of File System". Advanced Materials Research 734-737 (sierpień 2013): 3129–32. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3129.

Pełny tekst źródła
Streszczenie:
The hybrid file system is designed to optimize the latency of the response of File System I/Os and extend the capacity of the local file system to cloud by taking the advantage of Internet. Our hybrid file system is consist of SSD, HDD and Amazon S3 cloud file system. We store small files, directory tree and metadata of all the files in SSD, because SSD has a good performance for the response of small and random I/Os. HDD is good at responding big and sequential I/Os, so we use it just like a warehouse to store big files which are linked by the symbolic files in the SSD. We also extend the local file system to cloud in order to enlarge its capacity. In this paper we describe test data of our hybrid file system and also its design and implement details.
Style APA, Harvard, Vancouver, ISO itp.
4

Zhao, Zhen Zhou, i Zhong Yong Fu. "The Research of Excel File Fragmentation Data Recovery". Applied Mechanics and Materials 496-500 (styczeń 2014): 2274–78. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.2274.

Pełny tekst źródła
Streszczenie:
Because the Excel file is often edited, the data blocks stored in the hard disk which make up the Excel file is often not continuous. Discontinuous storage fragmented files, deleted or formatted, with the current data recovery software to restore the effect is very poor, often file recovery, but can not open or is garbled. Therefore it makes sense to study an effective recovery method to recover Excel fragmented files. Based on "Laura" file format, first introduced the Windows platform fragmented files, and then given an Excel file fragmentation recognition method, final based on debris identify given Excel file fragmentation restructuring.
Style APA, Harvard, Vancouver, ISO itp.
5

Taufik, Ichsan, Undang Syaripudin, Faiz M. Kaffah, Jaka Giri Sobirin, Nanang Ismail i Teddy Surya Gunawan. "Concealment of Files Blocked by Gmail with EOF-Based Image Steganography". Indonesian Journal of Electrical Engineering and Computer Science 12, nr 2 (1.11.2018): 716. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp716-721.

Pełny tekst źródła
Streszczenie:
Nowadays, due to security concern, not all the process of sending files via email runs smoothly. There are several types of file extensions that are blocked when sent via email. For examples, there are several file extensions blocked by Gmail. This paper discusses steganographic implementation using End of File (EOF) algorithm to insert special file into image cover file with JPG and PNG format so that files with these extensions can be sent via email. Before a special extension file is inserted into the cover file, a compression process should be conducted first to make the file size smaller. The proposed algorithm is implemented on Visual Basic.Net software. Based on the tests performed, the application can insert Gmail-blocked file system to the image cover file, without changing the physical bit of the image cover file or file system that inserted with 100% success rate. The stego-image file is also successfully sent via email without being blocked.
Style APA, Harvard, Vancouver, ISO itp.
6

Narjis Mezaal Shati i Ali Jassim Mohamed Ali. "Hiding Any Data File Format into Wave Cover". journal of the college of basic education 16, nr 69 (31.10.2019): 1–10. http://dx.doi.org/10.35950/cbej.v16i69.4739.

Pełny tekst źródła
Streszczenie:
In the current study a steganography approach utilized to hide various data file format in wave files cover. Lest significant bit insertion (LSB) used to embedding a regular computer files (such as graphic, execution file (exe), sound, text, hyper text markup language (HTML) …etc) in a wave file with 2-bits hiding rates. The test results achieved good performance to hide any data file in wave file.
Style APA, Harvard, Vancouver, ISO itp.
7

Pitchiah, Pragadeesh A., i Prathima G. Shivashankarappa. "Rotary Files in Pediatric Dentistry: From Then Till Now". Journal of Scientific Dentistry 10, nr 2 (2020): 55–57. http://dx.doi.org/10.5005/jp-journals-10083-0926.

Pełny tekst źródła
Streszczenie:
ABSTRACT The introduction of adult NiTi rotary file system for children was a revolution in the field of pediatric endodontics. With the use of these files, cost-effective, consistent obturations were made possible in shorter instrumentation time. The various restraints of adult rotary files such as file length and taper created the need for newer rotary file system. These voids were fulfilled with the advent of exclusive pediatric rotary file—Kedo-S file system. In this article, we have discussed how the innovative pediatric rotary files have made its mark overpowering the limitations of the existing adult rotary file system in children. How to cite this article: Pitchiah PA, Shivashankarappa PG. Rotary Files in Pediatric Dentistry: From Then Till Now. J Sci Dent 2020;10(2):55–57.
Style APA, Harvard, Vancouver, ISO itp.
8

Bhat, Anirudh, Aryan Likhite, Swaraj Chavan i Leena Ragha. "File Fragment Classification using Content Based Analysis". ITM Web of Conferences 40 (2021): 03025. http://dx.doi.org/10.1051/itmconf/20214003025.

Pełny tekst źródła
Streszczenie:
One of the major components in Digital Forensics is the extraction of files from a criminal’s hard drives. To achieve this, several techniques are used. One of these techniques is using file carvers. File carvers are used when the system metadata or the file table is damaged but the contents of the hard drive are still intact. File carvers work on the raw fragments in the hard disk and reconstruct files by classifying the fragments and then reassembling them to form the complete file. Hence the classification of file fragments has been an important problem in the field of digital forensics. The work on this problem has mainly relied on finding the specific byte sequences in the file header and footer. However, classification based on header and footer is not reliable as they may be modified or missing. In this project, the goal is to present a machine learningbased approach for content-based analysis to recognize the file types of file fragments. It does so by training a Feed-Forward Neural Network with a 2-byte sequence histogram feature vector which is calculated for each file. These files are obtained from a publicly available file corpus named Govdocs1. The results show that content-based analysis is more reliable than relying on the header and footer data of files.
Style APA, Harvard, Vancouver, ISO itp.
9

Karanović, Lj, i D. Poleti. "A FORTRAN Program for Conversion of PC-APD Data Files into ASCII Files". Powder Diffraction 7, nr 3 (wrzesień 1992): 179. http://dx.doi.org/10.1017/s0885715600018595.

Pełny tekst źródła
Streszczenie:
Recently, Dahan and co-workers (Dahan, 1991) suggested processing the XRD data by spreadsheet computer programs. Treated in this manner the XRD data became very flexible and made comparison with other data sets, as well as graphical presentation, much easier. In this note a simple FORTRAN 77 program for conversion of PC-APD data files into ASCII files suitable for import into spreadsheets is reported.In our laboratory XRD data are collected on a Philips 1710 diffractometer operated by the PC-APD version 2.0 (PC-APD Software, 1989). Each experiment usually generates its files containing collected raw intensity data (.RD file), background data (.BK file) and file with peak positions and their intensities (.DI file). The XRD data can be further processed: after smoothing, data are stored in files with extension .SM (.SM file) and, after Kα2 stripping, into files with extension .A2 (.A2 file). All files are stored in the binary format.
Style APA, Harvard, Vancouver, ISO itp.
10

Abhilisha Pandurang Bhalke. "Enhancement the Efficiency of Work with P2P System". International Journal for Modern Trends in Science and Technology 06, nr 09 (29.10.2020): 68–72. http://dx.doi.org/10.46501/ijmtst060911.

Pełny tekst źródła
Streszczenie:
The P2P system should be used Proximity information to minimize the load of file request and improve the efficiency of the work .Clustering peers for their physical proximity can also rise the performance of the request file. However, very few currently work in a peer group based on demands as peers on physical proximity. Although structured P2P provides more efficient files requests than unstructured P2P, it is difficult to apply because of their strictly defined topology. In this work, we intending to introduce a system for exchange a P2P file for proximity and level of interest based on structured P2P nodes that form physically block in the cluster and other groups physically close and nodes of public interest in sub-cluster based on the hierarchical topology. Querying an effective file is important for the overall P2P file exchange performance. Clustering peers from their common interests can significantly enhance the efficiency of the request file PAIS use an intelligent file replication algorithm to further rise the efficiency of the request file .Create a copy file that is often requested by a group of physically close nodes in their position. In addition, PAIS improves the search for files within the intra-system sub-cluster through various approaches. First, it further classifies interest in the sub-cluster to a number of subsections of interests and groups with common interest-free sub nodes in the group for file sharing. Secondly PAIS creates an over for each group that connects nodes of less node capacity to a higher throughput for the distributed node overload prevention request file. Third, in order to reduce the search for late files, PAIS uses a set of proactive information so that applicant can file knowledge if its requested file is in the neighboring nodes. Fourth, reduce the overhead of collecting information about files using the PAIS, collection of file information based on the Bloom Filter and the corresponding search for files distributed. Fifth, in order to improve the efficiency of file sharing, PAIS ranks the results with a blob of filters in order. Sixth, while the newly visited file is usually re-visited approach, based on the Bloom filter is improved only through the management of new information flowering filter is added to reduce the delay of file search. The experimental result of the Real-world Planet Lab Experiment shows that PAIS significantly reduces overhead and improves the efficiency of scrolling and without sharing files. In addition, the experimental results show high efficiency within the sub-research cluster of file approaches to improve file search efficiency.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "File"

1

Rivera, Gabrio. "From file pathnames to file objects /". Zürich, 2001. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=14377.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Yarovyi, O. "File system". Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/40511.

Pełny tekst źródła
Streszczenie:
Nowadays, many people use electronic devices. For example, it is can be cameras, mobile phones, computers and others. The file system is a very important component of any device that works with the file.
Style APA, Harvard, Vancouver, ISO itp.
3

García, Moral Daniel Jesús. "Remote File Access System for Generic Ericsson Processor Boards : File transfer service, Random Access Memory-based file system and secure file transfer solution research". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-53448.

Pełny tekst źródła
Streszczenie:
Generic Ericsson Processor boards are general purpose hardware platforms which provide generic processing services. They support the Unified Extensible Firmware Interface Specification. They have several network interfaces available and they are connected to Ericsson’s laboratory network. Several servers are also connected to this network. These boards require periodic firmware upgrades. They also require acquiring new firmware components and data files. Currently, an application to download or upload files from and to Ericsson’s laboratory servers when an Operating System has not already been booted does not exist. Therefore, the files have to be transferred to USB drives which are connected later to the boards in order to transfer the files. This is a time consuming operation which decreases Ericsson’s productivity. In addition, although Generic Ericsson Processor boards have an optional solid-state drive as secondary storage, Ericsson wants to be able to operate without it. This is because this secondary storage is not always available and Ericsson does not want to use it when the Generic Ericsson Processor boards are operating before an Operating System has been loaded. They prefer to use Random Access Memory storage. This project is focused on studying possible solutions for those two problems. Several file transfer protocols are analyzed. Several file system solutions mounted on Random Access Memory are also explored. A Trivial File Transfer Protocol client application and a Random Access Memory Disk driver prototype are designed, implemented and tested. They are tailored to work on a pre-boot environment, when the boards have not booted an Operating System yet, in Ericsson’s laboratory network. Finally, a secure file transfer protocols’ study is developed. This study will be used to assess Ericsson on the optimal secure file transfer protocol choice in order to implement possible secure future versions of the system.
Style APA, Harvard, Vancouver, ISO itp.
4

Ordulu, Nizameddin (Nizameddin H. ). "A file system for accessing MySQL tables as CSV files". Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/62664.

Pełny tekst źródła
Streszczenie:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 49-50).
In this thesis, we describe the design and implementation of a userspace file system that represents MySQL tables as comma-separated values (CSV) files. The users can access and modify the data through both the file system and MySQL's query interface. In order to transform read and write operations to SQL queries, we maintain a reverse index from file offsets to line numbers. Changes to the database outside of the file system are reflected on the file system by means of MySQL's master-slave replication feature. We evaluate our system by comparing its performance to a regular file system's performance using popular command line tools(grep, sed, awk) and user applications (OpenOffice.org spreadsheets). The choice of the database for this system was MySQL because of its popularity and the availability of its source code, however, the same ideas can be applied to any relational database with replication to create a similar system.
by Nizameddin Ordulu.
M.Eng.
Style APA, Harvard, Vancouver, ISO itp.
5

Zhang, Irene Y. (Irene Yun). "Efficient file distribution in a flexible,wide-area file system". Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/53188.

Pełny tekst źródła
Streszczenie:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 63-65).
WheelFS is a wide-area distributed file system designed to help applications cope with the challenges of sharing data over the wide-area network. A wide range of applications can use WheelFS as a storage layer because applications can control various trade-offs in WheelFS, such as consistency versus availability, using semantic cues. One key feature that many applications require from any storage system is efficient file distribution. The storage system needs to be able to serve files quickly, even large or popular ones, and allow users and applications to quickly browse files. Wide-area links with high latency and low throughput make achieving these goals difficult for most distributed storage systems. This thesis explores using pre fetching, a traditional file system optimization technique, in wide-area file systems for more efficient file distribution. This thesis focuses on Tread, a pref etcher for WheelFS. Tread includes several types of pre fetching to improve the performance of reading files and directories in WheelFS: read-ahead pre fetching, whole file prefetching, directory prefetching and a prefetching optimization for WheelFS's built-in cooperative caching. To makes the best use of scarce wide-area resources, Tread adaptively rate-limits prefetching and gives applications control over what and how prefetching is done using WheelFS's semantic cues. Experiments show that Tread can reduce the time to read a 10MB file in WheelFS by 40% and the time to list a directory with 100 entries by more than 80%.
(cont.) In addition, experiments on Planetlab show that using prefetching with cooperative caching to distribute a 10MB file to 270 clients reduces the average latency for each client to read the file by almost 45%.
by Irene Y. Zhang.
M.Eng.
Style APA, Harvard, Vancouver, ISO itp.
6

Purdin, Titus Douglas Mahlon. "ENHANCING FILE AVAILABILITY IN DISTRIBUTED SYSTEMS (THE SAGUARO FILE SYSTEM)". Diss., The University of Arizona, 1987. http://hdl.handle.net/10150/184161.

Pełny tekst źródła
Streszczenie:
This dissertation describes the design and implementation of the file system component of the Saguaro operating system for computers connected by a local-area network. Systems constructed on such an architecture have the potential advantage of increased file availability due to their inherent redundancy. In Saguaro, this advantage is made available through two mechanisms that support semi-automatic file replication and access: reproduction sets and metafiles. A reproduction set is a collection of files that the system attempts to keep identical on a "best effort" basis, relying on the user to handle unusual situations that may arise. A metafile is a special file that contains symbolic path names of other files; when a metafile is opened, the system selects an available constituent file and opens it instead. These mechanisms are especially appropriate for situations that do not require guaranteed consistency or a large number of copies. Other interesting aspects of the Saguaro file system design are also described. The logical file system forms a single tree, yet any file can be placed in any of the physical file systems. This organization allows the creation of a logical association among files that is quite different from their physical association. In addition, the broken path algorithm is described. This algorithm makes it possible to bypass elements in a path name that are on inaccessible physical file systems. Thus, any accessible file can be made available, regardless of the availability of directories in its path. Details are provided on the implementation of the Saguaro file system. The servers of which the system is composed are described individually and a comprehensive operational example is supplied to illustrate their interation. The underlying data structures of the file system are presented. The virtual roots, which contain information used by the broken path algorithm, are the most novel of these. Finally, an implementation of reproduction sets and metafiles for interconnected networks running Berkeley UNIX is described. This implementation demonstrates the broad applicability of these mechanisms. It also provides insight into the way in which mechanisms to facilitate user controlled replication of files can be inexpensively added to existing file systems. Performance measurements for this implementation are also presented.
Style APA, Harvard, Vancouver, ISO itp.
7

Alsowail, Rakan. "Secure file sharing". Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/63551/.

Pełny tekst źródła
Streszczenie:
File sharing has become an indispensable part of our daily lives. The shared files might be sensitive, thus, their confidentially, integrity and availability should be protected. Such protection might be against external threats that are initiated by unauthorised users or insider threats that are initiated by authorised users. Our main interest in this thesis is with insider threats. Protecting shared files against insiders is a challenging problem. Insiders enjoy various characteristics such as being trusted and authorised, in addition to being inside the network perimeter and having knowledge of information systems. This makes it difficult to prevent or detect policy violation for these users. The goal of this thesis is to protect shared files from the perspective of insider security with language-based techniques. In the first part of the thesis, we define what we mean by an insider and the insider problem precisely, and propose an approach to classify the insider problem into different categories. We then define and focus on one category that is related to file sharing. Namely, protecting the confidentiality and integrity of the shared files against accidental misuse by insiders. Furthermore, we classify the activity of file sharing into different categories that describe all possible ways of performing the activity of file sharing. These categories represent policies that describe how files should be propagated and accessed by insiders. We show that enforcing these policies can protect the files against accidental misuse by insiders while allowing the activity of sharing to be performed as desired. Thus our interest can be summarised as keeping honest users safe. In the second part of the thesis, we develop a security type system that statically enforces information flow and access control policies in a file system. Files are associated with security types that represent security policies, and programs are sets of operations to be performed on files such as read, copy, move, etc. A type checker, therefore, will statically check each operation to be performed on a file and determine whether the operation satisfies the policy of the file. We prove that our type system is sound and develop a type reconstruction algorithm and prove its soundness and completeness. The type system we developed in this thesis protects the files against accidental misuse by insiders.
Style APA, Harvard, Vancouver, ISO itp.
8

Motara, Yusuf Moosa. "File integrity checking". Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1007701.

Pełny tekst źródła
Streszczenie:
This thesis looks at file execution as an attack vector that leads to the execution of unauthorized code. File integrity checking is examined as a means of removing this attack vector, and the design, implementation, and evaluation of a best-of-breed file integrity checker for the Linux operating system is undertaken. We conclude that the resultant file integrity checker does succeed in removing file execution as an attack vector, does so at a computational cost that is negligible, and displays innovative and useful features that are not currently found in any other Linux file integrity checker.
Style APA, Harvard, Vancouver, ISO itp.
9

Lee, Hojin. "S1_Scrambled_siRNA [Digital file]". Diss., Temple University Libraries, 2008. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/254229.

Pełny tekst źródła
Streszczenie:
Microbiology and Immunology;
Ph.D.;
c-Cbl functions as a multifunctional adaptor and an E3 ubiquitin protein ligase. Several studies have shown that c-Cbl is involved in cytoskeleton-mediated events, but the molecular mechanisms linking c-Cbl to cytoskeletal rearrangements remain to be elucidated. Our previous results indicated that c-Cbl facilitates spreading and migration of v-Abl-transformed NIH 3T3 fibroblasts and suggested that small GTPases play important roles in the cytoskeletal effects of c-Cbl in this system. To elucidate the individual contributions of small GTPases to these effects, we assessed the roles of endogenous Rac1, RhoA and Rap1 in the c-Cbl-dependent spreading and migration of v-Abl-transformed fibroblasts overexpressing c-Cbl, using RNAi. Furthermore, since it has been shown that Rap1 can act as an upstream regulator of Rac1 in inducing cell spreading, we analyzed the interplay between Rap1 and Rac1 in the signaling pathways connecting c-Cbl to the cytoskeletal events. Our results indicate that Rac1 is essential for cell migration and spreading, whereas activation of RhoA exerts a negative effect. We have also shown that Rap1 is essential for cell spreading, although not for migration in our experimental system. Furthermore, we provide evidence that Rap1 is located upstream of Rac1 in one of the signaling pathways that regulate c-Cbl-facilitated cell spreading. Overall, our findings are consistent with the model describing the connection of c-Cbl to the cytoskeletal rearrangements via two pathways, one of which is mediated by PI3K and Rac1, and the other, by CrkL/C3G, Rap1 and Rac1. A major biological feature of glioma is the ability to invade normal brain tissue. The molecular mechanisms of glioma invasion are involved in multiple biological processes which are primarily associated with cytoskeleton-mediated events including adhesion, migration, degradation of extra cellular matrix (ECM). Biological functions of c-Cbl in glioma have not been elucidated. In this study, we examined biological roles of c-Cbl using RNAi-mediated depletion of endogenous c-Cbl and stably c-Cbl expressing glioma cells generated by lentiviral transduction and showed that c-Cbl increases invasion through degradation of ECM by upregulation of MMP2 but not through migration, adhesion, or growth of SNB19, a grade IV glioblastoma cell line.
Temple University--Theses
Style APA, Harvard, Vancouver, ISO itp.
10

Lee, Hojin. "S2_RhoA_siRNA [Digital file]". Diss., Temple University Libraries, 2008. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/254230.

Pełny tekst źródła
Streszczenie:
Microbiology and Immunology;
Ph.D.;
c-Cbl functions as a multifunctional adaptor and an E3 ubiquitin protein ligase. Several studies have shown that c-Cbl is involved in cytoskeleton-mediated events, but the molecular mechanisms linking c-Cbl to cytoskeletal rearrangements remain to be elucidated. Our previous results indicated that c-Cbl facilitates spreading and migration of v-Abl-transformed NIH 3T3 fibroblasts and suggested that small GTPases play important roles in the cytoskeletal effects of c-Cbl in this system. To elucidate the individual contributions of small GTPases to these effects, we assessed the roles of endogenous Rac1, RhoA and Rap1 in the c-Cbl-dependent spreading and migration of v-Abl-transformed fibroblasts overexpressing c-Cbl, using RNAi. Furthermore, since it has been shown that Rap1 can act as an upstream regulator of Rac1 in inducing cell spreading, we analyzed the interplay between Rap1 and Rac1 in the signaling pathways connecting c-Cbl to the cytoskeletal events. Our results indicate that Rac1 is essential for cell migration and spreading, whereas activation of RhoA exerts a negative effect. We have also shown that Rap1 is essential for cell spreading, although not for migration in our experimental system. Furthermore, we provide evidence that Rap1 is located upstream of Rac1 in one of the signaling pathways that regulate c-Cbl-facilitated cell spreading. Overall, our findings are consistent with the model describing the connection of c-Cbl to the cytoskeletal rearrangements via two pathways, one of which is mediated by PI3K and Rac1, and the other, by CrkL/C3G, Rap1 and Rac1. A major biological feature of glioma is the ability to invade normal brain tissue. The molecular mechanisms of glioma invasion are involved in multiple biological processes which are primarily associated with cytoskeleton-mediated events including adhesion, migration, degradation of extra cellular matrix (ECM). Biological functions of c-Cbl in glioma have not been elucidated. In this study, we examined biological roles of c-Cbl using RNAi-mediated depletion of endogenous c-Cbl and stably c-Cbl expressing glioma cells generated by lentiviral transduction and showed that c-Cbl increases invasion through degradation of ECM by upregulation of MMP2 but not through migration, adhesion, or growth of SNB19, a grade IV glioblastoma cell line.
Temple University--Theses
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "File"

1

Filo file for filophiles. New Orleans: Andesign, 1985.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Bieberich, G. Sampson. Illustration files and file environments. Albany, Oregon, USA: Meanderings, 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Paulo, Brazil) Festival Internacional de Linguagem Eletrônica (11th 2010 São. FILE 2010: FILE Prix Lux : FILE Pai. São Paulo: FILE, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Barreto, Ricardo, i Paula Perissinoto. FILE. Redaktor Festival Internacional de Linguagem Eletronica. São Paulo: FILE, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

The Y2K File (Film). The Edge Press/Mnemonics, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Dugdale, John. File on Shepard (Writer-Files). Heinemann, 1989.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Page, Malcolm. File on Pinter (Writer-Files). Heinemann, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Watts, Alan. UFO Sci-File (Science Files). Red Bird Publishing, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Piasecki, Andy. File on Lorca (Writer-Files). Heinemann (Txt), 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Dk Publishing. Fun Files: Dinosaur Fun File. DK CHILDREN, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "File"

1

Hewitt, Jill A., i Raymond J. Frank. "Files and File Handling". W Software Engineering in Modula-2, 94–103. London: Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-11260-9_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Lischner, Ray. "Files and File Names". W Exploring C++20, 561–69. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5961-0_66.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Mohanta, Abhijit, i Anoop Saldanha. "Files and File Formats". W Malware Analysis and Detection Engineering, 53–69. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6193-4_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Hantelmann, Fred. "Files and File Systems". W LINUX Start-up Guide, 55–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/978-3-642-60749-3_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Friesen, Jeff. "File". W Java I/O, NIO and NIO.2, 19–42. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1565-4_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Weik, Martin H. "file". W Computer Science and Communications Dictionary, 604. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_7112.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Krafsur, E. S., R. D. Moon, R. Albajes, O. Alomar, Elisabetta Chiappini, John Huber, John L. Capinera i in. "File". W Encyclopedia of Entomology, 1424. Dordrecht: Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-6359-6_3801.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Bährle-Rapp, Marina. "file". W Springer Lexikon Kosmetik und Körperpflege, 206. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71095-0_3993.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Bressoud, Thomas, i David White. "File Systems and File Processing". W Introduction to Data Systems, 17–57. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54371-6_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Sarwar, Syed Mansoor, i Robert M. Koretsky. "Files and File System Structure". W Linux, 69–96. Second edition. | Boca Raton : Taylor & Francis, CRC Press,: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/b22134-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "File"

1

Ahlers, Dirk, i Mahsa Mehrpoor. "Everything is Filed under 'File'". W the 26th ACM Conference. New York, New York, USA: ACM Press, 2015. http://dx.doi.org/10.1145/2700171.2791046.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Harter, Tyler, Chris Dragga, Michael Vaughn, Andrea C. Arpaci-Dusseau i Remzi H. Arpaci-Dusseau. "A file is not a file". W the Twenty-Third ACM Symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2043556.2043564.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Cai, Tao, Jiancong Shi, Dejiao Niu, Jie Wang, Fei Wang i Lei Li. "The Fine Grained Collaborative NVM File System". W 2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 2020. http://dx.doi.org/10.1109/hpcc-smartcity-dss50907.2020.00010.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Li, Xiuqiao, Bin Dong, Limin Xiao, Li Ruan i Yi Ding. "Small Files Problem in Parallel File System". W 2011 International Conference on Network Computing and Information Security (NCIS). IEEE, 2011. http://dx.doi.org/10.1109/ncis.2011.143.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Ku, Chan-I., Guo-Heng Luo, Che-Pin Chang i Shyan-Ming Yuan. "File Deduplication with Cloud Storage File System". W 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE). IEEE, 2013. http://dx.doi.org/10.1109/cse.2013.52.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Cherng-Ying Ing i Tzao-Lin Lee. "Heterogeneous file sharing by file-system emulation". W 2008 13th Asia-Pacific Computer Systems Architecture Conference (ACSAC). IEEE, 2008. http://dx.doi.org/10.1109/apcsac.2008.4625479.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Carns, Philip, Sam Lang, Robert Ross, Murali Vilayannur, Julian Kunkel i Thomas Ludwig. "Small-file access in parallel file systems". W Distributed Processing (IPDPS). IEEE, 2009. http://dx.doi.org/10.1109/ipdps.2009.5161029.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Liu, Shu-fen, Sheng Pei, Xing-yan Huang i Lu Tian. "File hiding based on FAT file system". W Education (ITIME). IEEE, 2009. http://dx.doi.org/10.1109/itime.2009.5236280.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

"Intro file". W 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA). IEEE, 2015. http://dx.doi.org/10.1109/aiccsa.2015.7507263.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

"File reference". W 2007 International Conference on Intelligent and Advanced Systems. IEEE, 2007. http://dx.doi.org/10.1109/icias.2007.4658617.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "File"

1

Kulesza, Joel. Vim Syntax File for MCNP Input Files. Office of Scientific and Technical Information (OSTI), grudzień 2020. http://dx.doi.org/10.2172/1734694.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Zilberman, Mark. Test file. MZB Standard Enterprise, październik 2022. http://dx.doi.org/10.57098/sr.biology.123.

Pełny tekst źródła
Streszczenie:
Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.
Style APA, Harvard, Vancouver, ISO itp.
3

Zilberman, Mark. Test file. MZB Standard Enterprise, październik 2022. http://dx.doi.org/10.57098/sr-biology.123.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Abd-El-Malek, Michael, Matthew Wachs, James Cipar, Karan Sanghi, Gregory R. Ganger, Garth A. Gibson i Michael K. Reiter. File System Virtual Appliances: Portable File System Implementations. Fort Belvoir, VA: Defense Technical Information Center, maj 2009. http://dx.doi.org/10.21236/ada512851.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Abd-El-Malek, Michael, Matthew Wachs, James Cipar, Karen Sanghi, Gregory R. Ganger, Garth A. Gibson i Michael K. Reiter. File System Virtual Appliances: Portable File System Implementations. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2010. http://dx.doi.org/10.21236/ada522537.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Mokhtarani, Akbar, Matthew Andrews, Jason Hick i William Kramer. Large File System Backup: NERSC Global File System Experience. Office of Scientific and Technical Information (OSTI), październik 2008. http://dx.doi.org/10.2172/941678.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Thoreson, Gregory G. PCF File Format. Office of Scientific and Technical Information (OSTI), sierpień 2017. http://dx.doi.org/10.2172/1378172.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Postel, J., i J. Reynolds. File Transfer Protocol. RFC Editor, październik 1985. http://dx.doi.org/10.17487/rfc0959.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Wareham, Lindsey Paige. MOSRC Test File. Office of Scientific and Technical Information (OSTI), wrzesień 2016. http://dx.doi.org/10.2172/1562404.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Welch, Brent B., i John K. Ousterhout. Pseudo-File-Systems. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 1989. http://dx.doi.org/10.21236/ada631678.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii