نتایج جستجو برای: pir

تعداد نتایج: 1350  

Journal: :The Journal of clinical investigation 2001
T Uehara M Bléry D W Kang C C Chen L H Ho G L Gartland F T Liu E Vivier M D Cooper H Kubagawa

The potential of the paired Ig-like receptors of activating (PIR-A) and inhibitory (PIR-B) types for modifying an IgE antibody-mediated allergic response was evaluated in mouse bone marrow-derived mast cells. Although mast cells produced both PIR-A and PIR-B, PIR-B was found to be preferentially expressed on the cell surface, where it was constitutively tyrosine phosphorylated and associated wi...

Journal: :The Journal of Experimental Medicine 1998
Akito Maeda Mari Kurosaki Tomohiro Kurosaki

Paired immunoglobulin-like receptor (PIR)-A and PIR-B possess similar ectodomains with six immunoglobulin-like loops, but have distinct transmembrane and cytoplasmic domains. PIR-B bears immunoreceptor tyrosine-based inhibitory motif (ITIM) sequences in its cytoplasmic domain that recruit Src homology (SH)2 domain-containing tyrosine phosphatases SHP-1 and SHP-2, leading to inhibition of B and ...

2001
Amos Beimel Yuval Ishai

A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a database while hiding the identity of the item being retrieved. In a t-private, k-server PIR protocol the database is replicated among k servers, and the user’s privacy is protected from any collusion of up to t servers. The main cost-measure of such protocols is the communication complexity of retrievi...

2001
Dmitri Asonov

In e-commerce, the protection of user privacy from a server was not considered feasible until the private information retrieval (PIR) problem was stated recently. A PIR protocol allows a user to retrieve a record from a database while hiding the identity of the record from a database server. We explain a motivation for PIR by demonstrating ecommerce examples, where only PIR techniques help. All...

2006
Remo Meier Bartosz Przydatek

Let A and B denote cryptographic primitives. A (k,m)robust A-to-B combiner is a construction, which takes m implementations of primitive A as input, and yields an implementation of primitive B, which is guaranteed to be secure as long as at least k input implementations are secure. The main motivation for such constructions is the tolerance against wrong assumptions on which the security of imp...

2000
Giovanni Di Crescenzo Tal Malkin Rafail Ostrovsky

A Single-Database Private Information Retrieval (PIR) is a protocol that allows a user to privately retrieve from a database an entry with as small as possible communication complexity. We call a PIR protocol non-trivial if its total communication is strictly less than the size of the database. Non-trivial PIR is an important cryptographic primitive with many applications. Thus, understanding w...

2017
Yuyan Wang Tyler Gable Mark Z. Ma David Clark Jun Zhao Yi Zhang Wei Liu Li Mao Yuping Mei

Lung cancer is the leading cause of cancer-related death worldwide. Although advanced drugs have benefitted patients, therapeutic success has largely been hampered because of rapid development of resistance. Here we report that PIWI-interacting RNA likes (piR-Ls), a novel type of functional sncRNAs, play key roles in chemoresistance to cisplatin (CDDP)-based chemotherapy in lung squamous cell c...

Journal: :Acta haematologica 2010
Juan Zhao Yi Luo Xiaochong Wang Hao Zhou Qiubai Li Yong You Ping Zou

Direct interaction between T-suppressor and dendritic cells (DCs) results in DC tolerance by inducing upregulation of immunoglobulin-like transcript (ILT) 3 and ILT4. DCs were treated with a lentiviral vector containing paired immunoglobulin-like B gene (PIR-B) DCs and the effect of PIR-B-DCs on graft-versus-host disease (GVHD) was analyzed after allogeneic bone marrow (BM) transplantation (BMT...

Journal: :CoRR 2017
Jingke Xu Zhifang Zhang

Consider the problem of private information retrieval (PIR) over a distributed storage system where M records are stored across N servers by using an [N,K] MDS code. For simplicity, this problem is usually referred as the coded-PIR problem. The capacity of coded-PIR with privacy against any individual server was determined by Banawan and Ulukus in 2016, i.e., CC-PIR = (1 + K N + · · · + K M−1 N...

Journal: :Nucleic acids research 2003
Cathy H. Wu Lai-Su L. Yeh Hongzhan Huang Leslie Arminski Jorge Castro-Alvear Yongxing Chen Zhang-Zhi Hu Panagiotis Kourtesis Robert S. Ledley Baris E. Suzek C. R. Vinayaka Jian Zhang Winona C. Barker

The Protein Information Resource (PIR) is an integrated public resource of protein informatics that supports genomic and proteomic research and scientific discovery. PIR maintains the Protein Sequence Database (PSD), an annotated protein database containing over 283 000 sequences covering the entire taxonomic range. Family classification is used for sensitive identification, consistent annotati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید