A cautionary tale: how to delete mouse haemopoietic stem cells with busulphan
نویسندگان
چکیده
منابع مشابه
Pseudothrombocytopenia--a cautionary tale.
Multichannel electronic cell counters are now in widespread use in haematology laboratories. Platelet counts are given routinely by many instruments and low platelet counts generate much further investigation. A falsely low platelet count may expose the patient to unnecessary and expensive investigation and treatment, and we report two illustrative cases. The platelet counts were performed on b...
متن کاملSoliloquy: a Cautionary Tale
The Soliloquy primitive, first proposed by the third author in 2007, is based on cyclic lattices. It has very good efficiency properties, both in terms of public key size and the speed of encryption and decryption. There are straightforward techniques for turning Soliloquy into a key exchange or other public-key protocols. Despite these properties, we abandoned research on Soliloquy after devel...
متن کاملTwitter911: A Cautionary Tale
Researchers have argued that social media, and in particular, Twitter, can be searched to improve “situational awareness” in emergency situations; that is, to provide objective, actionable, real-time information to first-responders. Prior studies have examined cases of very rare, catastrophic emergencies that took place over many days, such as the aftermath of Hurricane Sandy. We asked instead ...
متن کاملCullen, a Cautionary Tale
Some ideas return after the briefest of exiles: reductionism is back in vogue. Existential questions - about who we are, about our origins and future, about what is valuable - no longer require difficult soul searching, especially when straightforward answers are expected from the neurosciences. History is being rewritten with the brain as its centrepiece; the search for great men and big ideas...
متن کاملHow to Delete a Secret
This paper discusses the secure data erasure problem and introduces a new Proof of Deletion protocol, which assures secure data deletion in a way that any independent third party can verify cryptographically. The use of cryptography in data deletion is not new, but previous solutions are unsatisfactory as they merely return a single bit: whether the deletion is successful. However, this single ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: British Journal of Haematology
سال: 2001
ISSN: 0007-1048
DOI: 10.1046/j.1365-2141.2001.02825.x