Poking through lymphatic portals

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preformed portals facilitate dendritic cell entry into afferent lymphatic vessels

Although both processes occur at similar rates, leukocyte extravasation from the blood circulation is well investigated, whereas intravasation into lymphatic vessels has hardly been studied. In contrast to a common assumption-that intra- and extravasation follow similar molecular principles-we previously showed that lymphatic entry of dendritic cells (DCs) does not require integrin-mediated adh...

متن کامل

Poking Lawyers and Politicians

A report on the 5th Internet, Law and Politics conference hosted by the UOC in July 2009. The author, who attended the conference as rapporteur and wrote a ‘live blog’ during the two-day event, reviews some of the contributions, reflects on the theme of social networking sites (‘pro or con?’) and explores the different approaches of the disciplines of law and of political science, suggesting th...

متن کامل

Poking a hole in mitochondria

The authors have found that the two yeast mRNA capping enzymes, Cet1p and Ceg1p, are potent in vitro inhibitors of transcription. Cet1p, stimulated by its Ceg1p binding partner, stalled transcription by blocking reinitiation at already activated promoters. Conversely, elimination of Cet1p in vivo stimulated transcription. Although Cet1p is the first general repressor found to act at reinitiatio...

متن کامل

Semantically Integrating Portlets in Portals Through Annotation

Portlets are currently supported by most portal frameworks. However, there is not yet a definitive answer to portlet interoperation whereby data flows smoothly from one portlet to a neighboring one. One of the approaches is to use deep annotation. By providing additional markup about the background services, deep annotation strives to interact with these underlying services rather than with the...

متن کامل

Poking Holes in Information Hiding

ASLR is no longer a strong defense in itself, but it still serves as a foundation for sophisticated defenses that use randomization for pseudo-isolation. Crucially, these defenses hide sensitive information (such as shadow stacks and safe regions) at a random position in a very large address space. Previous attacks on randomization-based information hiding rely on complicated side channels and/...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Experimental Medicine

سال: 2009

ISSN: 1540-9538,0022-1007

DOI: 10.1084/jem.20613iti4