Playing Hide-and-Seek with Yeast
نویسنده
چکیده
I like to think of the late 80s and early 90s as extremely exciting times in my career. I was working as a visiting graduate student in Rick Gaber’s laboratory at Northwestern University, and some of the work I did during those years turned out to be seminal for the then-fledgling field of epigenetics. Together with other scientists, I provided long-awaited in vivo functional evidence for a model proposed by Vince Allfrey in 1964, postulating that post-translational modifications of histones, particularly acetylation and deacetylation, are crucial for transcriptional regulation.
منابع مشابه
Playing Hide-and-Seek: An Abstract Game for Cyber Security
In order to begin to solve many of the problems in the domain of cyber security, they must first be transformed into abstract representations, free of complexity and paralysing technical detail. We believe that for many classic security problems, a viable transformation is to consider them as an abstract game of hide-and-seek. The tools required in this game – such as strategic search and an ap...
متن کاملA child playing hide-and-seek runs to the corner of the room and covers her eyes with a pillow while her father counts to ten, believing that if she cannot see her father, then her father cannot see her
متن کامل
Analysis of Methods for Playing Human Robot Hide-and-Seek in a Simple Real World Urban Environment
The hide-and-seek game has many interesting aspects for studying cognitive functions in robots and the interactions between mobile robots and humans. Some MOMDP (Mixed Observable Markovian Decision Processes) models and a heuristic-based method are proposed and evaluated as an automated seeker. MOMDPs are used because the hider’s position is not always known (partially observable), and the seek...
متن کاملShow your cards: the results section and the poker game.
In 5-Card Draw, one of the most popular versions of poker, you start with a specific question: “Can I win with the cards I have decided to play?” The final answer is yes or no. After looking at your initial cards (initial findings) you can be satisfied with what you have (preliminary data) or seek some new cards (new experiments). But in the end you must openly “show your cards” (results). Your...
متن کاملSteganography - A Game of Hide and Seek in Information Communication
With the growth of communication over computer networks, how to maintain the confidentiality and security of transmitted information have become some of the important issues. In order to transfer data securely to the destination without unwanted disclosure or damage, nature inspired hide and seek tricks such as, cryptography and Steganography are heavily in use. Just like the Chameleon and many...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Cell
دوره 166 شماره
صفحات -
تاریخ انتشار 2016