LC3s hire membrane breakers to attack viral shelters

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LC3s hire membrane breakers to attack viral shelters

The MAP1LC3/LC3 (microtubule associated protein 1 light chain 3) conjugation system is a key functional module in macroautophagy (henceforth autophagy) for efficient formation of autophagosomes and selective degradation of autophagosomal cargoes through the lysosome. Recently, it has been appreciated that LC3 and homologs (LC3s) have roles outside of canonical autophagy. One such example is the...

متن کامل

Learning to Hire Teams

Crowdsourcing and human computation are being employed in sophisticated projects that require the solution of a heterogeneous set of tasks. We explore the challenge of composing or hiring an effective team from an available pool of applicants for performing tasks required for such projects on an ongoing basis. How can one optimally spend budget to learn the expertise of workers as part of recru...

متن کامل

Why firms refuse to hire underbidders

A prominent theory of wage rigidity claims that a social norm against underbidding may prevent wages from falling to market clearing levels. This social norm may therefore cause downwardly rigid wages and involuntary unemployment. Recently performed questionnaire studies have thrown doubt on the conjecture that there is a social norm against underbidding. In this paper we experimentally show th...

متن کامل

Complement membrane attack and tumourigenesis

Tumour development driven by inflammation is now an established phenomenon but the role that complement plays remains uncertain. Recent evidence has suggested that various components of the complement (C) cascade may influence tumour development in disparate ways; however, little attention has been paid to that of the membrane attack complex (MAC). This is despite abundant evidence documenting ...

متن کامل

Model for network behaviour under viral attack

Computer viruses, worms and Trojan horses pose the most severe intrusion threat against an automated environment, especially if this environment is distributed and the ability to enforce physical access control is very limited. These structures are also collectively referred to as malicious software. In this paper, a model for viral attacks against computer networks is being developed. The soun...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Autophagy

سال: 2017

ISSN: 1554-8627,1554-8635

DOI: 10.1080/15548627.2017.1371396