• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 36,642
Next 10 →

Specificity and mechanism of action of some commonly used protein kinase inhibitors

by Stephen P. Davies, Helen Reddy, Matilde Caivano, Philip Cohen - Biochem. J , 2000
"... The specificities of 28 commercially available compounds reported to be relatively selective inhibitors of particular serine� threonine-specific protein kinases have been examined against a large panel of protein kinases. The compounds KT 5720, Rottlerin and quercetin were found to inhibit many prot ..."
Abstract - Cited by 532 (1 self) - Add to MetaCart
The specificities of 28 commercially available compounds reported to be relatively selective inhibitors of particular serine� threonine-specific protein kinases have been examined against a large panel of protein kinases. The compounds KT 5720, Rottlerin and quercetin were found to inhibit many protein kinases, sometimes much more potently than their presumed targets, and conclusions drawn from their use in cell-based experiments are likely to be erroneous. Ro 318220 and related bisindoylmaleimides, as well as H89, HA1077 and Y 27632, were more selective inhibitors, but still inhibited two or more protein kinases with similar potency. LY 294002 was found to inhibit casein kinase-2 with similar potency to phosphoinositide (phosphatidylinositol) 3-kinase. The compounds with the most

common mechanisms

by Brett K. Hayes, Evan Heit, Caren M. Rotello, Ingmar Visser, Richard J. Tunney, Nottingham Uk, Brett K. Hayes , 2014
"... Memory, reasoning, and categorization: parallels and ..."
Abstract - Add to MetaCart
Memory, reasoning, and categorization: parallels and

COMMON MECHANISMS FOR THE REPRESENTATION OF REAL,

by Jonathan Winawer, M. S. Neurobiology, Lera Boroditsky, O Eohfnoogy, Matthew Wilson , 2007
"... Common mechanisms for the representation of real, implied, and imagined visual motion by ..."
Abstract - Add to MetaCart
Common mechanisms for the representation of real, implied, and imagined visual motion by

Controlled and automatic human information processing

by Walter Schneider, Richard M. Shiffrin - I. Detection, search, and attention. Psychological Review , 1977
"... A two-process theory of human information processing is proposed and applied to detection, search, and attention phenomena. Automatic processing is activa-tion of a learned sequence of elements in long-term memory that is initiated by appropriate inputs and then proceeds automatically—without subjec ..."
Abstract - Cited by 874 (16 self) - Add to MetaCart
), and is controlled by the subject. A series of studies using both reaction time and accuracy measures is presented, which traces these concepts in the form of automatic detection and controlled, search through the areas of detection, search, and attention. Results in these areas are shown to arise from common

Awareness and Coordination in Shared Workspaces

by Paul Dourish, Victoria Bellotti - Proc. of the Conf. on Computer Supported Cooperative Work (CSCW´92 , 1992
"... Awareness of individual and group activities is critical to successful collaboration and is commonly supported in CSCW systems by active, information generation mecha-nisms separate from the shared workspace. These mechanisms pena~ise information providers, presuppose rel-evance to the recipient, an ..."
Abstract - Cited by 811 (14 self) - Add to MetaCart
Awareness of individual and group activities is critical to successful collaboration and is commonly supported in CSCW systems by active, information generation mecha-nisms separate from the shared workspace. These mechanisms pena~ise information providers, presuppose rel-evance to the recipient

LLVM: A compilation framework for lifelong program analysis & transformation

by Chris Lattner, Vikram Adve , 2004
"... ... a compiler framework designed to support transparent, lifelong program analysis and transformation for arbitrary programs, by providing high-level information to compiler transformations at compile-time, link-time, run-time, and in idle time between runs. LLVM defines a common, low-level code re ..."
Abstract - Cited by 852 (20 self) - Add to MetaCart
representation in Static Single Assignment (SSA) form, with several novel features: a simple, language-independent type-system that exposes the primitives commonly used to implement high-level language features; an instruction for typed address arithmetic; and a simple mechanism that can be used to implement

The Advantages of Evolutionary Computation

by David B. Fogel , 1997
"... Evolutionary computation is becoming common in the solution of difficult, realworld problems in industry, medicine, and defense. This paper reviews some of the practical advantages to using evolutionary algorithms as compared with classic methods of optimization or artificial intelligence. Specific ..."
Abstract - Cited by 541 (6 self) - Add to MetaCart
Evolutionary computation is becoming common in the solution of difficult, realworld problems in industry, medicine, and defense. This paper reviews some of the practical advantages to using evolutionary algorithms as compared with classic methods of optimization or artificial intelligence. Specific

A Sense of Self for Unix Processes

by Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff - In Proceedings of the 1996 IEEE Symposium on Security and Privacy , 1996
"... A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process ' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common ..."
Abstract - Cited by 689 (27 self) - Add to MetaCart
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process ' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common

The Ponder Policy Specification Language

by Nicodemos Damianou , Naranker Dulay , Emil Lupu , Morris Sloman - LECTURE NOTES IN COMPUTER SCIENCE , 2001
"... The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java. It supports obligation policies that are event triggered conditionaction rules for policy based management ..."
Abstract - Cited by 499 (28 self) - Add to MetaCart
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java. It supports obligation policies that are event triggered conditionaction rules for policy based management

Virtual time and global states of distributed systems.

by Friedemann Mattern - Proc. Workshop on Parallel and Distributed Algorithms, , 1989
"... Abstract A distributed system can be characterized by the fact that the global state is distributed and that a common time base does not exist. However, the notion of time is an important concept in every day life of our decentralized \ r eal world" and helps to solve problems like getting a c ..."
Abstract - Cited by 744 (5 self) - Add to MetaCart
Abstract A distributed system can be characterized by the fact that the global state is distributed and that a common time base does not exist. However, the notion of time is an important concept in every day life of our decentralized \ r eal world" and helps to solve problems like getting a
Next 10 →
Results 1 - 10 of 36,642
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University