نتایج جستجو برای: eve
تعداد نتایج: 2609 فیلتر نتایج به سال:
Consider a scenario in which two parties Alice and Bob as well as an opponent Eve receive the output of a binary symmetric source (e,g. installed in a satellite) over individual, not necessarily independent binary symmetric channels. Alice and Bob share no secret key initially and can only communicate over a public channel completely accessible to Eve. The authors derive a lower bound on the ra...
The even-skipped (eve) gene of Drosophila melanogaster has been intensively studied as a model for spatial and temporal control of gene expression, using in vitro and transgenic techniques. Here, the study of eve is extended, using evolutionary conservation of DNA sequences. Conservation of much of the protein, and of known regulatory elements, supports models for eve function and regulation th...
Intravascular ultrasound (IVUS) is known to be the reference tool for preoperative vessel lesion assessments and for endovascular therapy planning. Nevertheless, IVUS echograms only provide subjective information about vessel wall lesions. Since changes in the vascular tissue stiffness are characteristic of vessel pathologies, catheter-based endovascular ultrasound elastography (EVE) has been p...
Molecular evolution is an established technique for inferring gene homology but regulatory DNA turns over so rapidly that inference of ancestral networks is often impossible. In silico evolution is used to compute the most parsimonious path in regulatory space for anterior-posterior patterning linking two Dipterian species. The expression pattern of gap genes has evolved between Drosophila (fly...
Alice and Bob want to share a secret key and to communicate an independent message, both of which they desire to be kept secret from an eavesdropper Eve. We study this problem of secret communication and secret key generation when two resources are available – correlated sources at Alice, Bob, and Eve, and a noisy broadcast channel from Alice to Bob and Eve which is independent of the sources. ...
Metazoan gene expression is controlled through the action of long stretches of noncoding DNA that contain enhancers-shorter sequences responsible for controlling a single aspect of a gene's expression pattern. Models built on thermodynamics have shown how enhancers interpret protein concentration in order to determine specific levels of gene expression, but the emergent regulatory logic of a co...
Previous studies have implicated histone deacetylation and chromatin condensation as critical mechanisms of transcription repression in yeast and mammals. A specific histone deacetylase, Rpd3, interacts with a variety of sequence-specific transcriptional repressors, including Mad-Max heterodimers and members of the nuclear receptor superfamily. Here, we present evidence that a strong hypomorphi...
Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic manin-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return of entangled qubits to create a shared key. The protocols that are cryptana lyzed in this paper were proven secure with respect to some eavesdr...
Background and Aims The aim of the study was to evaluate the effectiveness of epidural volume extension (EVE) technique in terms of sensory and motor block characteristics along with hemodynamic parameters as a part of combined spinal-epidural anesthesia (CSEA). Materials and Methods A total of 60 patients undergoing hip surgeries were assigned to one of the two groups containing 30 patients ...
D espite aging and psychological and cosmetic changes, who you are as a person is fairly constant—Eve and Drummond will remain Eve and Drummond over time. The same isn’t true of your digital identity. Currently, eve@ xmlgrrl.com is tied to Eve, for example, but might later be tied to someone else or disappear entirely. This is just one of the challenges people have with digital identities. Fede...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید