How to survive a macrophage attack

نویسنده

  • Alan W. Dove
چکیده

polarity development. The resulting protein interaction map provides tantalizing insights and identifies dozens of potential mechanistic connections worth closer examination. The authors used 68 yeast proteins associated with the actin cytoskeleton, septins, the secretory apparatus, and Rhotype GTPases as baits in parallel two-hybrid screens covering 90% of the preConnections in yeast cell polarity.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Time and Space Complexity Reduction of a Cryptanalysis Algorithm

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

متن کامل

How to reply to referees' comments when submitting manuscripts for publication

Background: The publication of articles in peer-reviewed scientific journals is a fairly complex and stepwise process that involves responding to referees’ comments. Little guidance is available in the biomedical literature on how to deal with such comments. Objective: The objective of this article is to provide guidance to notice writers on dealing with peer review comments in a way that maxim...

متن کامل

Time and Space Complexity Reduction of a Cryptanalysis Algorithm

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

Partial Purification of a Potent Immunosuppressive Factor Excreted from Leishmania major Promastigote and Amastigote

Recent scientific evidence indicates that distinct patterns of susceptibility in BALB/c mice to Leishmania major infection are attributable to the differential expansion of distinct CD4+ T-cell subsets and their cytokines production. Production of the Th1 cytokine IFN-g is associated with resistance, whereas production of the Th2 cytokines IL-4 and IL-10 are associated with extreme susceptibili...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • The Journal of Cell Biology

دوره 154  شماره 

صفحات  -

تاریخ انتشار 2001