Results 11 to 20 of about 1,219,477 (364)

A statistical mechanics approach to autopoietic immune networks [PDF]

open access: yes, 2010
The aim of this work is to try to bridge over theoretical immunology and disordered statistical mechanics. Our long term hope is to contribute to the development of a quantitative theoretical immunology from which practical applications may stem.
Abbas A K   +24 more
core   +2 more sources

T cell receptor signalling in gamma delta cell development: strength isn't everything [PDF]

open access: yes, 2011
Published version can be found here: http://www.cell.com/trends/immunology/abstract/S1471-4906%2811%2900153 ...
Pennington, DJ, Turchinovich, G
core   +1 more source

IMMUNOLOGY OF TUBERCULOSIS [PDF]

open access: yesMediterranean Journal of Hematology and Infectious Diseases, 2014
MTB ranks as the first worldwide pathogen latently infecting one third of the population and the second leading cause of death from a single infectious agent, after the human immunodeficiency virus (HIV). The development of vigorous and apparently appropriate immune response upon infection with M.tuberculosis in humans and experimental animals conflict
Bozzano F, Marras F, DE MARIA, ANDREA
openaire   +4 more sources

Uncovering the information immunology journals transmitted for COVID-19: A bibliometric and visualization analysis

open access: yesFrontiers in Immunology, 2022
BackgroundSince the global epidemic of the coronavirus disease 2019 (COVID-19), a large number of immunological studies related to COVID-19 have been published in various immunology journals.
Jiefeng Zhao   +6 more
doaj   +1 more source

Non-classical immunology. Meeting Report [PDF]

open access: yes, 2001
This large annual immunology meeting covered a wide range of subjects from biochemical protein characterizations to cell biology and the study of complex disease pathologies.
Allen, RL
core   +1 more source

Sensing Danger: Innate Immunology for Intrusion Detection [PDF]

open access: yesInformation Security Technical Report, 12(4), pp 218-227, 2007, 2008
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with little success. However, these previous systems were largely based on immunological theory from the 1970s
arxiv   +1 more source

The Immunological Synapse [PDF]

open access: yesCancer Immunology Research, 2003
AbstractThe molecular interactions underlying regulation of the immune response take place in a nanoscale gap between T cells and antigen-presenting cells, termed the immunological synapse. If these interactions are regulated appropriately, the host is defended against a wide range of pathogens and deranged host cells.
openaire   +8 more sources

Determination of a predictive cleavage motif for eluted major histocompatibility complex class II ligands [PDF]

open access: yes, 2018
CD4+ T cells have a major role in regulating immune responses. They are activated by recognition of peptides mostly generated from exogenous antigens through the major histocompatibility complex (MHC) class II pathway.
Dhanda, Sandeep Kumar   +7 more
core   +6 more sources

ImmPort, toward repurposing of open access immunological assay data for translational and clinical research [PDF]

open access: yes, 2018
Immunology researchers are beginning to explore the possibilities of reproducibility, reuse and secondary analyses of immunology data. Open-access datasets are being applied in the validation of the methods used in the original studies, leveraging ...
Bhattacharya, Sanchita   +12 more
core   +2 more sources

Immunology [PDF]

open access: yes, 2011
小澤 龍彦   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy