Poking through lymphatic portals
نویسندگان
چکیده
منابع مشابه
Preformed portals facilitate dendritic cell entry into afferent lymphatic vessels
Although both processes occur at similar rates, leukocyte extravasation from the blood circulation is well investigated, whereas intravasation into lymphatic vessels has hardly been studied. In contrast to a common assumption-that intra- and extravasation follow similar molecular principles-we previously showed that lymphatic entry of dendritic cells (DCs) does not require integrin-mediated adh...
متن کاملPoking Lawyers and Politicians
A report on the 5th Internet, Law and Politics conference hosted by the UOC in July 2009. The author, who attended the conference as rapporteur and wrote a ‘live blog’ during the two-day event, reviews some of the contributions, reflects on the theme of social networking sites (‘pro or con?’) and explores the different approaches of the disciplines of law and of political science, suggesting th...
متن کاملPoking a hole in mitochondria
The authors have found that the two yeast mRNA capping enzymes, Cet1p and Ceg1p, are potent in vitro inhibitors of transcription. Cet1p, stimulated by its Ceg1p binding partner, stalled transcription by blocking reinitiation at already activated promoters. Conversely, elimination of Cet1p in vivo stimulated transcription. Although Cet1p is the first general repressor found to act at reinitiatio...
متن کاملSemantically Integrating Portlets in Portals Through Annotation
Portlets are currently supported by most portal frameworks. However, there is not yet a definitive answer to portlet interoperation whereby data flows smoothly from one portlet to a neighboring one. One of the approaches is to use deep annotation. By providing additional markup about the background services, deep annotation strives to interact with these underlying services rather than with the...
متن کاملPoking Holes in Information Hiding
ASLR is no longer a strong defense in itself, but it still serves as a foundation for sophisticated defenses that use randomization for pseudo-isolation. Crucially, these defenses hide sensitive information (such as shadow stacks and safe regions) at a random position in a very large address space. Previous attacks on randomization-based information hiding rely on complicated side channels and/...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Experimental Medicine
سال: 2009
ISSN: 1540-9538,0022-1007
DOI: 10.1084/jem.20613iti4