Tearing down actin

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tearing down actin

n page 987, Yu et al. identify a novel cell death pathway that bypasses mito-chondria. The results indicate that various strategies exist to kill off neurons. A lot of the killing of sympathetic neurons occurs in the first week after birth. During that paring period, ‫ف‬ 50% of sympathetic neurons die due to a lack of nerve growth factor (NGF). Neurons deprived of NGF in vitro die through the c...

متن کامل

Tearing down the spindle

isassembly of the mitotic spindle takes some effort, according to Kan Cao, Yixian Zheng (Johns Hopkins University, Baltimore, MD), and colleagues, who show that an ATPase and its binding partners pull apart the spindle. The spindle is put together by assembly factors that are activated by the cyclin-dependent kinase Cdc2. The loss of Cdc2 activity at the end of mitosis has thus been the convent...

متن کامل

Tearing down the Internet

Recent advances in scale-free networks have claimed that their topologies are very weak against attacks. The inhomogeneous connectivity distribution of large-scale current communication networks, such as the Internet, could be exploited by evil hackers in order to damage these systems. However, there have not been many studies on the approaches and consequences of such targeted attacks. In this...

متن کامل

Tearing down the façades of radical innovation

a r t i c l e i n f o Managers construct organizational façades that mislead external stakeholders, organizational members, auditors, researchers, other managers, and even themselves (Nystrom & Starbuck, 1984). Very little empirical research has been conducted on how managers build these façades since Nystrom & Starbuck's first influential article. This paper reports on the creation of an organ...

متن کامل

De-perimeterisation as a cycle: tearing down and rebuilding security perimeters

If an organisation wants to secure its IT assets, where should the security mechanisms be placed? The traditional view is the hard-shell model, where an organisation secures all its assets using a fixed security border: What is inside the security perimeter is more or less trusted, what is outside is not. Due to changes in technologies, business processes and their legal environments this appro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cell Biology

سال: 2003

ISSN: 1540-8140,0021-9525

DOI: 10.1083/jcb1635iti5