Stealing histones

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stealing Reality

In this paper we discuss the threat of malware targeted at extracting information about the relationships in a real-world social network as well as characteristic information about the individuals in the network, which we dub Stealing Reality. We present Stealing Reality (SR), explain why it differs from traditional types of network attacks, and discuss why its impact is significantly more dang...

متن کامل

Histones

JAUNDICE DURING PREGNANCY. By Urs Peter Haemmerli. New York, Springer-Verlag, Inc., 1967. 111 pp. $3.80, paperbound. Jaundice During Pregnancy is an excellent monograph which should be read by all internists, obstetricians, and pediatricians, and which should be available in all medical libraries for ready reference. The author concisely summarizes the known minor alterations of the liver and i...

متن کامل

Latency-Hiding Work Stealing

With the rise of multicore computers, parallel applications no longer consist solely of computational, batch workloads, but also include applications that may, for example, take input from a user, access secondary storage or the network, or perform remote procedure calls. Such operations can incur substantial latency, requiring the program to wait for a response. In the current state of the art...

متن کامل

Hierarchical Work-Stealing

dynamic load-balancing on hierarchical platforms. In particular, we consider applications involving heavy communications on a distributed platform. The work-stealing algorithm introduced by Blumofe and Leiserson is a commonly used technique to balance load in a distributed environment but it suffers from poor performance with some communication-intensive applications. We describe here several v...

متن کامل

Stealing Your Money Through

Cyber criminals are using advanced attacks to exploit online banking systems and services to covertly steal money. This paper describes the tactics currently used by cyber criminals to conduct cyber bank robbery. The Art of Cyber Bank Robbery earn approximately $25,000. Recent botnets such as Zeus, SpyEye, and Citadel have infected millions of machines. If the same formula is applied, potential...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cell Biology

سال: 2006

ISSN: 1540-8140,0021-9525

DOI: 10.1083/jcb.1746iti2