نتایج جستجو برای: مقیاس macs

تعداد نتایج: 34091  

Journal: :Fertility and sterility 2004
Uwe Paasch Sonja Grunewald Ashok Agarwal Hans-Jürgen Glandera

OBJECTIVE We investigated the activation of caspases 8, 9, 1, and 3 in human ejaculated spermatozoa to study main pathways of apoptosis. Potential functional impact of this phenomenon and possible activation mechanisms were examined by [1] subjecting cells to freezing and thawing, and [2] testing the dependence of caspase activity on membrane integrity. DESIGN Experimental study. SETTING An...

2002
Kenneth L. Calvert Srinivasan Venkatraman Jim Griffioen

Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services are vulnerable to denial-of-service attacks if packet classification is based on information that can be forged, such as source and destination addresses and port numbers. Traditional message authentication codes (MACs), oft...

2016
Yan Xu Jianhui Xie Ronghua Chen Yu Cao Yuan Ping Qingwen Xu Wei Hu Dan Wu Lihua Gu Huaigu Zhou Xin Chen Ziqin Zhao Jiang Zhong Rui Li

No effective method has been developed to distinguish sperm cells originating from different men in multi-suspect sexual assault cases. Here we combined MACS and FACS to isolate single donor sperm cells from forensic mixture samples including female vaginal epithelial cells and sperm cells from multiple contributors. Sperms from vaginal swab were isolated by MACS using FITC-conjugated A kinase ...

2010
Mirjam van Eck

J Rehabil Med 42 © 2010 The Authors. doi: 10.2340/16501977-0543 Journal Compilation © 2010 Foundation of Rehabilitation Information. ISSN 1650-1977 Objective: To describe the manual ability of adolescents with cerebral palsy and to investigate the relationship of manual ability with daily activities. Design: Cross-sectional study. Subjects: Ninety-four adolescents with cerebral palsy, aged 12–1...

2000
Michael Semanko

In order to avoid birthday attacks on message authentication schemes, it has been suggested that one add randomness to the scheme. One must be careful about how randomness is added, however. This paper shows that prefixing randomness to a message before running the message through an iterated MAC leads to an attack that takes only O ( 2 +max{2l/2, 2r/2} ) queries to break, where l is the size o...

2013
Dario Catalano Dario Fiore

Homomorphic message authenticators allow the holder of a (public) evaluation key to perform computations over previously authenticated data, in such a way that the produced tag σ can be used to certify the authenticity of the computation. More precisely, a user knowing the secret key sk used to authenticate the original data, can verify that σ authenticates the correct output of the computation...

2013
Gaëtan Leurent Thomas Peyrin Lei Wang

In this paper we study the security of hash-based MAC algorithms (such as HMAC and NMAC) above the birthday bound. Up to the birthday bound, HMAC and NMAC are proven to be secure under reasonable assumptions on the hash function. On the other hand, if an n-bit MAC is built from a hash function with a l-bit state (l ≥ n), there is a well-known existential forgery attack with complexity 2. Howeve...

2013
Sven K Vogel Fabian Heinemann Grzegorz Chwastek Petra Schwille

The actin cell cortex in eukaryotic cells is a key player in controlling and maintaining the shape of cells, and in driving major shape changes such as in cytokinesis. It is thereby constantly being remodeled. Cell shape changes require forces acting on membranes that are generated by the interplay of membrane coupled actin filaments and assemblies of myosin motors. Little is known about how th...

2003
Alan Schwartz Ronald Gilson Ronald J. Gilson

This paper benefitted from presentations at the American Law and Economics Association Meetings, the National Bureau of Economics Law & Economics Summer Session (2003), the NYU Law and Finance Workshop and the University of San Diego Law and Political Theory Workshop, and from comments by Barry Adler, Jennifer Arlen, Ian Ayres, Richard Brooks, Allen Ferrell, Michael Klausner, Alvin Klevorick, J...

2017
Lisa Mailleux Ellen Jaspers Els Ortibus Cristina Simon-Martinez Kaat Desloovere Guy Molenaers Katrijn Klingels Hilde Feys

INTRODUCTION The clinical application of upper limb (UL) three-dimensional movement analysis (3DMA) in children with unilateral cerebral palsy (uCP) remains challenging, despite its benefits compared to conventional clinical scales. Moreover, knowledge on UL movement pathology and how this relates to clinical parameters remains scarce. Therefore, we investigated UL kinematics across different m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید