Cells, shared memory and breaking the PTM code

نویسندگان

  • Pau Creixell
  • Rune Linding
چکیده

Cellular Signal Integration Group, Center for Biological Sequence Analysis, Department of Systems Biology, Technical University of Denmark, Lyngby, Denmark * Corresponding author. Cellular Signal Integration Group, Center for Biological Sequence Analysis, Department of Systems Biology, Technical University of Denmark, Building 301, Lyngby DK-2800, Denmark. Tel.: þ 45 2365 1941; Fax.: þ 45 4525 2281; E-mail: [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Semiotics of Collective Memory of the Iran-Iraq War (Holy Defence): A Case Study of the Shared Images in Virtual Social Networks

This study aims to achieve a semiotic understanding of collective memory of the Iran-Iraq war. For this purpose, samples of images in virtual social networks shared in response to the news of discovery and return of the bodies of more than 175 divers have been analyzed. Visual signs in photographs, cartoons, graphic designs, prints, paintings and posters, in methods of historical pictures and f...

متن کامل

The structural and functional signatures of proteins that undergo multiple events of post-translational modification.

UNLABELLED The structural, functional, and mechanistic characterization of several types of post-translational modifications (PTMs) is well-documented. PTMs, however, may interact or interfere with one another when regulating protein function. Yet, characterization of the structural and functional signatures of their crosstalk has been hindered by the scarcity of data. To this end, we developed...

متن کامل

A Message-Passing Distributed Memory Parallel Algorithm for a Dual-Code Thin Layer, Parabolized Navier-Stokes Solver

In this study, the results of parallelization of a 3-D dual code (Thin Layer, Parabolized Navier-Stokes solver) for solving supersonic turbulent flow around body and wing-body combinations are presented. As a serial code, TLNS solver is very time consuming and takes a large part of memory due to the iterative and lengthy computations. Also for complicated geometries, an exceeding number of grid...

متن کامل

Dwarf Frankenstein is still in your memory: tiny code reuse attacks

Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...

متن کامل

Post-translational protein modification as the substrate for long-lasting memory.

Prevailing models of memory identify mRNA translation as necessary for long-lasting information storage. However, there are enough instances of memory storage in the virtual absence of protein synthesis to prompt consideration of alternative models. A comprehensive review of the protein synthesis literature leads us to conclude that the translational mechanism is exclusively a permissive, reple...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2012