:Microbiology and molecular biology reviews : MMBR2005
Michael W W Adams,
One of the first hurdles to be negotiated in the postgenomic era involves the description of the entire protein content of the cell, the proteome. Such efforts are presently complicated by the various posttranslational modifications that proteins can experience, including glycosylation, lipid attachment, phosphorylation, methylation, disulfide bond formation, and proteolytic cleavage. Whereas t...
Mary Luz Mouronte,
María Luisa Vargas,
Luis Gregorio Moyano,
Francisco Javier García Algarra,
Luis Salvador Del Pozo,
To keep up with rapidly changing conditions, business systems and their associated networks are growing increasingly intricate as never before. By doing this, network management and operation costs not only rise, but are difficult even to measure. This fact must be regarded as a major constraint to system optimization initiatives, as well as a setback to derived economic benefits. In this work ...
A method of embedding a covert audio message in a cover utterance for secure communication is presented. The covert message is represented in a compressed form with possibly encryption and/or encoding for added security. One bit in each of the samples of a given cover utterance is altered in accordance with the data bits and a key. The same key is used to retrieve the embedded bits at the recei...
Modifying code after the compiler has generated it can be useful for both optimization and instrumentation. This paper compares the code modification systems of Mahler and pixie, and describes two new systems we have built that are hybrids of the two. This paper covers material presented at the CODE ’91 International Workshop on Code Generation, Schloss Dagstuhl, Germany, May 20-24, 1991.
We describe a flexible approach to automated reasoning, where non-theorems can be automatically altered to produce proved results which are related to the original. This is achieved through an interaction of the HR machine learning system, the Otter theorem prover and the Mace model generator, and uses methods inspired by Lakatos’s philosophy of mathematics. We demonstrate the effectiveness of ...
We present a theory of plan modification applicable to hierarchical no&ear planning. Our theory utilizes the validation structure of the stored plans to yield a flexible and conservative plan modification framework The validation structure, which constitutes a hierarchical explanation of correctness of the plan with respect to the planner’s own knowledge of the domain, is annotated on the plan ...
M M Puskás,
as celesticetin2) (2) have been prepared3) by synthetic anc microbiological transformation, involving modificatior of the parent antibiotics both at the sugar moiety anc the amino acid side-chain (Fig. 1). Of these new derivatives 7(S)-chloro-7-deoxylincomycin4) (3, cleocin, clindamycin) is one of the most important, possessing mon pronounced and wider spectrum of antibiotic activity, a* well a...