Tales from the crypt

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tales from the crypt

Tales from the crypt ow many stem cells reside in a human colonic crypt and how do they divide and regenerate? According to the deterministic theory, a small number of " immortal " stem cells haunt a crypt, and when they divide, each generates a single replacement stem cell. The stochastic model, in contrast, contends that a crypt niche harbors many stem cells, and each cell division randomly g...

متن کامل

Tales from the Crypt

Mathematical modeling is being increasingly recognized within the biomedical sciences as an important tool that can aid the understanding of biological systems. The heavily regulated cell renewal cycle in the colonic crypt provides a good example of how modeling can be used to find out key features of the system kinetics, and help to explain both the breakdown of homeostasis and the initiation ...

متن کامل

Iron homeostasis: new tales from the crypt.

The enterocyte is a highly specialized cell of the duodenal epithelium that coordinates iron uptake and transport into the body. Until recently, the molecular mechanisms underlying iron absorption and iron homeostasis have remained a mystery. This review focuses on the proteins and regulatory mechanisms known to be present in the enterocyte precursor cell and in the mature enterocyte. The recen...

متن کامل

Tales from the crypt: a parasitoid manipulates the behaviour of its parasite host

There are many examples of apparent manipulation of host phenotype by parasites, yet few examples of hypermanipulation-where a phenotype-manipulating parasite is itself manipulated by a parasite. Moreover, few studies confirm manipulation is occurring by quantifying whether the host's changed phenotype increases parasite fitness. Here we describe a novel case of hypermanipulation, in which the ...

متن کامل

Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt

In this talk we will illustrate the everyday challenges met by embedded security practitioners by five real examples. All the examples were actually encountered while designing, developing or evaluating commercial products. This note, which is not a refereed research paper, presents the details of one of these five examples. It is intended to help the audience follow that part of our presentation.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cell Biology

سال: 2001

ISSN: 1540-8140,0021-9525

DOI: 10.1083/jcb1546rr2