نتایج جستجو برای: micro stamping

تعداد نتایج: 116556  

Journal: :Proteomics 2004
Michael Mayer Jerry Yang Irina Gitlin David H Gracias George M Whitesides

We describe a method for repetitive and rapid formation of planar microarrays and gradients of proteins using patterned agarose stamps. It demonstrates: (i) micropatterning of agarose gels with feature sizes as small as 2 microm; (ii) inking of posts (diameter 50-1000 microm) on patterned agarose stamps with one or multiple (here, eight) proteins and repetitive stamping of patterns (>100 times ...

2013
Hongsheng Liu Chengxi Lei Zhongwen Xing

The innovative hot stamping press of quenchable steel mainly includes two stages: hot forming of blank at elevated temperature and quenching of hot stamped part in closed water-cooled tools. Crucial stage in hot stamping process is quenching of hot formed part in water-cooled tool to achieve final high ultimate tensile strength. In quenching stage, cooling rate of hot stamped part has a signifi...

2009
W. MATYSIAK

The present work concerns the forming of the sheet metal conical products which, combined with a vulcanized rubber blend form footings for electric power generators. Conical sheet metal elements are most often formed by the following four methods: – multi-operational stamping with stiff tools, – hydro-mechanical stamping, – spinning, – flow turning. In case of stiff tool stamping, traces on the...

Journal: :Genetics 2011
Fernando Martínez Josep Sardanyés Santiago F Elena José-Antonio Daròs

The tremendous evolutionary potential of RNA viruses allows them to thrive despite host defense mechanisms and endows them with properties such as emergence, host switching, and virulence. The frequency of mutant viruses after an infectious process results from the interplay between the error rate of the viral replicase, from purifying mechanisms acting after transcription on aberrant RNAs, and...

2006
Ahto Buldas Sven Laur

We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side hash functions used to shorten the documents before sending them to time-stamping servers and server-side hash functions used for establishing one way causal relations between time stamps. We derive necessary and sufficient conditions for client side hash functions an...

Journal: :SIAM J. Comput. 1997
Danny Dolev Nir Shavit

We introduce concurrent time-stamping, a paradigm that allows processes to temporally order concurrent events in an asynchronous shared-memory system. Concurrent time-stamp systems are powerful tools for concurrency control, serving as the basis for solutions to coordination problems such as mutual exclusion, `-exclusion, randomized consensus, and multiwriter multireader atomic registers. Unfor...

2014
Seong Keun Yoo JaeHun Cheong Hye Young Kim

Six transmembrane protein of prostate 2 (STAMP2) is a protein that has been extensively studied due to its association with prostate cancer. Currently, STAMP2 is well known for its critical role in metabolism and modulating inflammatory signals. Even so, the molecular mechanism of STAMP2 activity and its downstream effectors are still largely unknown. Here, we review the current knowledge of ST...

2015
Pooja Saxena K. Hari Prasad V. B. Chandratre Hari Prasad

This paper presents design and implementation of TDC based on time stamping using current balanced logic (CBL) buffer in 0.35 μm CMOS technology. The CBL logic buffer provides smaller delay compared to widely used current starved inverter, allowing better resolution in a given technology node. The CBL buffer based tapped delay line (TDL) provides accurate reference timing signals for time stamp...

Journal: :IACR Cryptology ePrint Archive 2007
Ahto Buldas Sven Laur

We prove in a non-black-box way that every bounded list and set commitment scheme is knowledge-binding. This is a new and rather strong security condition, which makes the security definitions for time-stamping much more natural compared to the previous definitions, which assume unpredictability of adversaries. As a direct consequence, list and set commitment schemes with partial opening proper...

2004
Ahto Buldas Märt Saarepera

It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the underlying hash function is collisionresistant but still no rigorous proofs have been published. We try to establish such proof and conclude that the existing security conditions are improper because they ignore precomputations by adversaries. After analyzing a simplistic patent filing scenario, we suggest...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید