نتایج جستجو برای: strand protocol

تعداد نتایج: 284992  

Journal: :Biological psychology 2011
Jelle J Sijtsema Erin K Shoulberg Dianna Murray-Close

Associations between physiological reactivity to exclusion (i.e., heart rate [HRR], respiratory sinus arrhythmia [RSAR], and skin conductance [SCR]) and relational and physical aggression were assessed. It was hypothesized that blunted "fight or flight" responses to stress (i.e., blunted HRR, SCR, and RSA withdrawal) would be associated with relational aggression, whereas heightened "fight or f...

2004
Zeeshan Furqan Ratan K. Guha Shahabuddin Muhammad

The vulnerability and importance of computers, robots, internet etc, demand the employment of exceedingly reliable security protocols. E-Business can not be encouraged with susceptible underlying security protocols. We present a heuristic state space search model for automatic security protocol verification. Our model exploits its knowledge of the search space and intelligently enhances the eff...

2010
Nikhil Gopalkrishnan Harish Chandran John H. Reif

The hybridization of complementary nucleic acid strands is the most basic of all reactions involving nucleic acids, but has a major limitation: the specificity of hybridization reactions depends critically on the lengths of the complementary pairs of strands and can drop (in the presence of other competing strands whose sequences are close to that of a given target strand) to very low values if...

Journal: :Nucleic acids research 1993
V Burland D L Daniels G Plunkett F R Blattner

The design of large scale DNA sequencing projects such as genome analysis demands a new approach to sequencing strategy, since neither a purely random nor a purely directed method is satisfactory. We have developed a strategy that combines these two methods in a way that preserves the advantages of both while avoiding their particular limitations. Computer simulations showed that a specific bal...

Journal: :Cold Spring Harbor protocols 2017
James R Dasch Amy L Dasch

Modern molecular biology techniques have been applied to the production of therapeutic antibodies. Nonetheless, recombinant antibodies remain the exception rather than the rule for the antibodies used in most research and diagnostic applications. The lack of penetration of recombinant antibodies into the research arena can be attributed largely to the fact that the Ig gene families are large an...

2014
Jonathan Hayman

Causal reasoning is a powerful tool in analysing security protocols, as seen in the popularity of the strand space model. However, for protocols that branch, more subtle models are called for to capture the ways in which they can interact with a possibly malign environment. We study a model for security protocols encompassing causal reasoning and interaction, developing a semantics for a simple...

Journal: :J. Inf. Sci. Eng. 2005
Yafen Li Wuu Yang Ching-Wei Huang

A type flaw attack on a security protocol is an attack in which a field in a message that was originally intended to have one type is subsequently interpreted as having another type. Heather et al. proved that type flaw attacks can be prevented by tagging each field with the information that indicates its intended type. We simplify Heather et al.’s tagging scheme by combining all the tags insid...

Journal: :I. J. Network Security 2016
Qing-Qing Xie Shunrong Jiang Liangmin Wang Chin-Chen Chang

The cloud-assisted Body Sensor Networks (BSN) often has an architecture of Multi-hop Wireless Networks (MWN) model, in which both the body sensors and the users must be secure to protect the whole infrastructure. Unfortunately, both the information providers and the users are movable and resource-constrained in communication and computation. Thus some new security problems are proposed, such as...

2010
F. Javier Thayer Vipin Swarup Joshua D. Guttman

Location-dependent services are services that adapt their behavior based on the locations of mobile devices. For many applications, it is critical that location-dependent services use trustworthy device locations, namely locations that are both accurate and recent. These properties are captured by a security goal called locale authentication whereby an entity can authenticate the physical locat...

2015
Harald Lahm Stefanie A. Doppler Martina Dreßen Klaudia Adamczyk Marcus-André Deutsch Hanna Ulrich Matthias Schiemann Rüdiger Lange Markus Krane

The reprogramming of somatic cells to induced pluripotent stem cells (iPS) has successfully been performed in different mammalian species including mouse, rat, human, pig and others. The verification of iPS clones mainly relies on the detection of the endogenous expression of different pluripotency genes. These genes mostly represent transcription factors which are located in the cell nucleus. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید