نتایج جستجو برای: immunologic indication

تعداد نتایج: 68709  

2005
Rob Delicata Steve A. Schneider

We present a framework for reasoning about secrecy in a class of Diffie-Hellman protocols. The technique, which shares a conceptual origin with the idea of a rank function, uses the notion of a message-template to determine whether a given value is generable by an intruder in a protocol model. Traditionally, the rich algebraic structure of Diffie-Hellman messages has made it difficult to reason...

Journal: :IJTHI 2011
Jamie Murphy Richard Yee Lee Evan Swinger

This study investigated student adoption of university campus card (UCC) applications. A review of smart card, technology adoption and Unified Theory of Acceptance and Use of Technology (UTAUT) literature led to three focus groups and a survey of student perceptions and attitudes towards the university’s campus card. Perceptions of 17 UCC components differed significantly across four student va...

Journal: :The Journal of Experimental Medicine 1960
Sharad D. Deodhar

Angiotensin II was coupled with bovine gamma-globulin (BGG) through the following series of reactions. See PDF for Structure By determinations of the aromatic amine and tyrosine contents of p-aminobenzoylangiotensin II, the number of p-aminobenzoyl residues introduced per molecule of angiotensin II was calculated. Absorption spectra (between 250 and 500 mmicro) of BGG complexes of p-aminobenzoy...

Journal: :The Journal of Experimental Medicine 1960
Jan W. Steiner B. Langer D. L. Schatz R. Volpe

Twenty-three unilaterally adrenalectomized guinea pigs were injected with autologous and homologous adrenal tissue homogenates respectively, in Freund's adjuvant. Widespread adrenal lesions were found in 10 of 12 animals receiving auto-antigen and to a lesser extent in 6 of 11 animals injected with homologous pooled antigen. Widespread systemic lesions were present in both these and in control ...

Journal: :Neuron 1998
Robert B Darnell

More recent studies analyzing RNA transcripts in dissoThe nervous system and the immune system face a ciated neurons in tissue culture have suggested that common challenge: how to encode for very complex neuronal MHC gene expression may be inducible, by functions using a genome of limited size. A mere 10 the addition of cytokines or by electrical silencing with primary RNA transcripts apparentl...

Journal: :The Journal of Experimental Medicine 1970
Claudia Henry W. Page Faulk Lotte Kuhn J. M. Yoffey H. Hugh Fudenberg

The immune capabilities of the Peyer's patches have been investigated by the use of an in vitro system. Despite our failure to stimulate Peyer's patch lymphocytes in vivo it appears that Peyer's patches behave immunologically as peripheral lymphoid tissues. Cultures prepared from the dissociated Peyer's patches of normal rabbits respond to sheep erythrocytes. The response is comparable to that ...

2010
Hae Sun No Dae Woong Rhee

Driven by the development of wireless services with the advent of smart phone along with iPhone, wireless services are drawing attentions rather than PC internet based wired services. Since this technique is a mobile device judged as being in an environment suitable to provide SNS, there also need be researches. This research proposed mobile based SNS-UCC design through mobile based SNS-UCC wri...

2014
James G. Mork Dina Demner-Fushman Susan Schmidt Alan R. Aronson

The main goal of the US National Library of Medicine (NLM) Index­ ing Initiative is to explore indexing methodologies that may help the NLM In­ dexing staff keep pace with the ever increasing challenges of indexing over 700,000 MEDLINE citations each year using a vocabulary of over 27,000 MeSH Descriptors and 220,000 MeSH Supplementary Concept Records. The BioASQ Challenge has been a tremendous...

Journal: :CoRR 2011
Linpeng Tang Qin Liu

In this paper we give a brief introduction to five different distance vector routing protocols (RIP, AODV, EIGRP, RIP-MTI and Babel) and give some of our thoughts on how to solve the count to infinity problem. Our focus is how distance vector routing protocols, based on limited information, can prevent routing loops and the count to infinity problem.

2011
David Evans Anh Nguyen-Tuong John C. Knight

Moving target defenses have been proposed as a way to make it much more difficult for an attacker to exploit a vulnerable system by changing aspects of that system to present attackers with a varying attack surface. The hope is that constructing a successful exploit requires analyzing properties of the system, and that in the time it takes an attacker to learn those properties and construct the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید