نتایج جستجو برای: eve

تعداد نتایج: 2609  

Journal: :Mechanisms of Development 1995
John Reinitz David H. Sharp

In this paper we analyze the formation of stripes of expression of the pair-rule gene eve. We identify detailed mechanisms which control the formation of stripes 2-5. Each stripe is formed as a result of generalized activation by bcd and ubiquitous transcription factors combined with localized repression by gap genes. Each of the eight stripe borders of these four stripes is shown to be under t...

1995
Dominic Mayers

No quantum key distribution (QKD) protocol has been proved fully secure. A remaining problem is the eavesdropper’s ability to make coherent measurements on the joint properties of large composite systems. This problem has been recently solved by Yao in the case of the security of a quantum oblivious transfer (QOT) protocol. We consider an extended OT task which, in addition to Alice and Sob, in...

Journal: :Mechanisms of Development 1995
Julie Broadus James B. Skeath Eric P. Spana Torsten Bossing Gerhard Technau Chris Q. Doe

Drosophila is an ideal system for identifying genes that control central nervous system (CNS) development. Particularly useful tools include molecular markers for subsets of neural precursors (neuroblasts) and the simple expression pattern of the even-skipped (eve) gene in a subset of neurons. Here we provide additional molecular markers for identified neuroblasts, including several with near s...

Journal: :Trans. Data Hiding and Multimedia Security 2015
Benjamin Johnson Pascal Schöttle Aron Laszka Jens Grossklags Rainer Böhme

We analyze a two-player zero-sum game between a steganographer, Alice, and a steganalyst, Eve. In this game, Alice wants to hide a secret message of length k in a binary sequence, and Eve wants to detect whether a secret message is present. The individual positions of all binary sequences are independently distributed, but have different levels of predictability. Using knowledge of this distrib...

2010
Sandra E. Black Paul J. Devereux Kjell G. Salvanes Eric Maurin Stig Jakobsen Richard Evans

A variety of public campaigns, including the “Just Say No” campaign of the 1980s and 1990s that encouraged teenagers to “Just Say No to Drugs”, are based on the premise that teenagers are very susceptible to peer influences. Despite this, very little is known about the effect of one’s peers in middle school and high school on the long-run outcomes of children. This is primarily due to two facto...

2013
Justin Crocker David L Stern

nAture methods | ADVANCE ONLINE PUBLICATION | We tested whether transcription activator–like effectors (tAles) could mediate repression and activation of endogenous enhancers in the Drosophila genome. tAle repressors (tAlers) targeting each of the five even-skipped (eve) stripe enhancers generated repression specifically of the focal stripes. tAle activators (tAleAs) targeting the eve promoter ...

2013
Kelly Bergstrom Marcus Carter Darryl Woodford Christopher A. Paul

EVE Online, released in 2003 by CCP Games, is a space-themed Massively Multiplayer Online Game (MMOG). This sandbox style MMOG has a reputation for being a difficult game with a punishing learning curve that is fairly impenetrable to new players. This has led to the widely held belief among the larger MMOG community that “EVE players are different”, as only a very particular type of player woul...

2012
P. C. Chamberlin R. O. Milligan N. Woods

This paper describes the methods used to obtain the thermal evolution and radiative output during solar flares as observed by the Extreme ultraviolet Variability Experiment (EVE) onboard the Solar Dynamics Observatory (SDO). Presented and discussed in detail are how EVE measurements, due to its temporal cadence, spectral resolution and spectral range, can be used to determine how the thermal pl...

2011
Mike Burmester

Bob died suddenly leaving his treasure to sister Alice. Eve will do anything to get it, so Alice hides the treasure together with Nipper, and promptly departs. Nipper is a low-cost RFID device that responds only to Alice’s calls— making it possible for Alice to locate the hidden treasure later (she is quite forgetful) when Eve is not around. We study the design of Nipper, the cryptographic mech...

2013
Felipe Gerhard Tilman Kispersky Gabrielle J Gutierrez Eve Marder Mark Kramer Uri Eden

Successful reconstruction of a physiological circuit with known connectivity from spiking activity alone. Text S1 Felipe Gerhard1,∗, Tilman Kispersky, Gabrielle J Gutierrez, Eve Marder, Mark Kramer, Uri Eden 1 Brain Mind Institute, Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland 2 Biology Department and Volen Center, Brandeis University, Waltham, MA 3 Group for Neural The...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید