نتایج جستجو برای: tor grypus

تعداد نتایج: 8028  

Journal: :Plant physiology 2011
Maozhi Ren Shuqing Qiu Prakash Venglat Daoquan Xiang Li Feng Gopalan Selvaraj Raju Datla

Target of rapamycin (TOR) is a central regulator of cell growth, cell death, nutrition, starvation, hormone, and stress responses in diverse eukaryotes. However, very little is known about TOR signaling and the associated functional domains in plants. We have taken a genetic approach to dissect TOR functions in Arabidopsis (Arabidopsis thaliana) and report here that the kinase domain is essenti...

Journal: :The international journal of biochemistry & cell biology 2006
Claudio De Virgilio Robbie Loewith

The target of rapamycin, TOR, is an essential ser/thr protein kinase that functions in two distinct multiprotein complexes, TOR complex 1 and 2. The structure and functions of these complexes have been conserved from yeast to man. TOR complex 1 is inhibited by rapamycin and is thought to couple growth cues to cellular metabolism; TOR complex 2 is not inhibited by rapamycin and appears to regula...

Journal: :The Journal of Cell Biology 2006
Krista M. Hennig Julien Colombani Thomas P. Neufeld

Target of rapamycin (TOR) is a central regulator of cellular and organismal growth in response to nutrient conditions. In a genetic screen for novel TOR interactors in Drosophila melanogaster, we have identified the clathrin-uncoating ATPase Hsc70-4, which is a key regulator of endocytosis. We present genetic evidence that TOR signaling stimulates bulk endocytic uptake and inhibits the targeted...

2016
Domagoj Baretić Alex Berndt Yohei Ohashi Christopher M Johnson Roger L Williams

The target of rapamycin (Tor) is a Ser/Thr protein kinase that regulates a range of anabolic and catabolic processes. Tor is present in two complexes, TORC1 and TORC2, in which the Tor-Lst8 heterodimer forms a common sub-complex. We have determined the cryo-electron microscopy (EM) structure of Tor bound to Lst8. Two Tor-Lst8 heterodimers assemble further into a dyad-symmetry dimer mediated by ...

Journal: :Cancer research 1997
D Li Y Dragan V C Jordan M Wang H C Pitot

To assess the effects of chronic administration of tamoxifen (TAM) and toremifene (TOR) on genetic damage related to carcinogenesis, we measured DNA adduct formation by (32)P-postlabeling in liver, kidney, and uterus of Fischer rats given TAM or TOR in the diet for 18 months. TAM induced high levels of DNA adducts in the liver in a dose-dependent manner. The total adduct levels were 3000 +/- 87...

2017
Rachee Singh Rishab Nithyanand Sadia Afroz Paul Pearce Michael Carl Tschantz Phillipa Gill Vern Paxson

Facing abusive traffic from the Tor anonymity network, online service providers discriminate against Tor users. In this study, we characterize not only the extent of such discrimination but also the nature of the undesired traffic originating from the Tor network—a task complicated by Tor’s need to maintain user anonymity. We address this challenge by leveraging multiple independent data source...

2012
F. N. BARTULI F. LUCIANI F. CADDEO S. COMPAGNI P. PIVA L. OTTRIA C. ARCURI

1 Department of Periodontics, University of Rome “Tor Vergata”; “S. Giovanni Calibita, Fatebenefratelli” Hospital 2 Odontostomatology “S. Giovanni Calibita, Fatebenefratelli” Hospital 3 Department of Odontostomatology, University of Rome “Tor Vergata”, Foundation Policlinico “Tor Vergata” 4 Department in Periodontics, University of Rome “Tor Vergata“. Director and Chief Department of Periodonti...

Journal: :CoRR 2017
Zhuotao Liu Yushan Liu Philipp Winter Prateek Mittal Yih-Chun Hu

1 ABSTRACT Tor is the most widely used anonymity network, currently serving millions of users each day. However, there is no access control in place for all these users, leaving the network vulnerable to botnet abuse and attacks. For example, criminals frequently use exit relays as stepping stones for attacks, causing service providers to serve CAPTCHAs to exit relay IP addresses or blacklistin...

2015
Quangang Li Peipeng Liu Zhiguang Qin

Tor is a popular low-latency anonymous communication system which could provide anonymity and anti-censorship. Based on previous researches on de-anonymization of Tor, this paper proposes a novel approach to attack users’ guard selection which can pose great threat against Tor users' anonymity. Under the current design of Tor, once entry guards are compromised, the probability that an attacker ...

Journal: :Future Generation Comp. Syst. 2011
Xiaogang Wang Junzhou Luo Ming Yang Zhen Ling

Tor has become one of the most popular overlay networks for anonymizing TCP traffic, however, the anonymity of Tor clients is threatened by various attacks exploiting traffic analysis or Tor’s design features. Although considerable effort has beenmade to secure and improve Tor networks, little attention has been paid to various application-level attacks against Tor. In this paper, we present a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید