How to survive a macrophage attack
نویسنده
چکیده
polarity development. The resulting protein interaction map provides tantalizing insights and identifies dozens of potential mechanistic connections worth closer examination. The authors used 68 yeast proteins associated with the actin cytoskeleton, septins, the secretory apparatus, and Rhotype GTPases as baits in parallel two-hybrid screens covering 90% of the preConnections in yeast cell polarity.
منابع مشابه
Time and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملHow to reply to referees' comments when submitting manuscripts for publication
Background: The publication of articles in peer-reviewed scientific journals is a fairly complex and stepwise process that involves responding to referees’ comments. Little guidance is available in the biomedical literature on how to deal with such comments. Objective: The objective of this article is to provide guidance to notice writers on dealing with peer review comments in a way that maxim...
متن کاملTime and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملAn Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملPartial Purification of a Potent Immunosuppressive Factor Excreted from Leishmania major Promastigote and Amastigote
Recent scientific evidence indicates that distinct patterns of susceptibility in BALB/c mice to Leishmania major infection are attributable to the differential expansion of distinct CD4+ T-cell subsets and their cytokines production. Production of the Th1 cytokine IFN-g is associated with resistance, whereas production of the Th2 cytokines IL-4 and IL-10 are associated with extreme susceptibili...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- The Journal of Cell Biology
دوره 154 شماره
صفحات -
تاریخ انتشار 2001