Cell Garbage Can , Therapeutic Carrier , or Trojan Horse ?
نویسندگان
چکیده
In multicellular organisms, cells communicate with each other via extracellular molecules such as nucleotides, lipids, short peptides, or proteins. These molecules are released in the extracellular space to bind to receptors on other cells, thus modifying intracellular signaling in the recipient cells. In addition to these single molecules, cells also release in their extracellular environment a series of complex structures called membrane vesicles, which contain numerous proteins, lipids, and even nucleic acids.1 Although known for several decades to exist, membrane vesicles have long been thought of as mere cell debris. Over the past few years, however, accumulated evidence has shown that vesicles can affect the cells they encounter by acting as signaling vehicles containing a cell-specific cargo of proteins, lipids, and genetic material that are moved to other cells where they alter function and physiology. The topic of extracellular vesicle-mediated cell–cell communication has now blossomed into a full-fledged field of research.
منابع مشابه
Exosomes: cell garbage can, therapeutic carrier, or trojan horse?
Ottawa Hospi pi pita ta tal l l Re Re Rese se s ar ar arch ch I I Ins ns nstitu tu tute te t
متن کاملHardware Trojan by Hot Carrier Injection
This paper discusses how hot carrier injection (HCI) can be exploited to create a trojan that will cause hardware failures. The trojan is produced not via additional logic circuitry but by controlled scenarios that maximize and accelerate the HCI effect in transistors. These scenarios range from manipulating the manufacturing process to varying the internal voltage distribution. This new type o...
متن کاملExploiting Semiconductor Properties for Hardware Trojans
This paper discusses the possible introduction of hidden reliability defects during CMOS foundry fabrication processes that may lead to accelerated wearout of the devices. These hidden defects or hardware Trojans can be created by deviation from foundry design rules and processing parameters. The Trojans are produced by exploiting time-based wearing mechanisms (HCI, NBTI, TDDB and EM) and/or co...
متن کاملSome Garbage In - Some Garbage Out: Asynchronous t-Byzantine as Asynchronous Benign t-resilient system with fixed t-Trojan-Horse Inputs
We show that asynchronous t faults Byzantine system is equivalent to asynchronous t-resilient system, where unbeknownst to all, the private inputs of at most t processors were altered and installed by a malicious oracle. The immediate ramification is that dealing with asynchronous Byzantine systems does not call for new topological methods, as was recently employed by various researchers: Async...
متن کامل