Results 61 to 70 of about 597,682 (300)

The Lock-free $k$-LSM Relaxed Priority Queue

open access: yes, 2015
Priority queues are data structures which store keys in an ordered fashion to allow efficient access to the minimal (maximal) key. Priority queues are essential for many applications, e.g., Dijkstra's single-source shortest path algorithm, branch-and ...
Gruber, Jakob   +3 more
core   +2 more sources

Robust quantum data locking from phase modulation [PDF]

open access: yes, 2014
Quantum data locking is a unique quantum phenomenon that allows a relatively short key to (un)lock an arbitrarily long message encoded in a quantum state, in such a way that an eavesdropper who measures the state but does not know the key has essentially
Lloyd, Seth, Lupo, Cosmo, Wilde, Mark M.
core   +3 more sources

Decreased cold‐sensing function of the transient receptor potential channel TRPM8 from tailed amphibians

open access: yesFEBS Open Bio, EarlyView.
Despite frogs avoiding low temperatures, examination of four salamander species revealed that none avoided cold and all possessed cold tolerance. Functional analysis of TRPM8, a cold sensor, showed that all salamander TRPM8s had lost their cold sensitivity.
Tadahiro Sawao   +3 more
wiley   +1 more source

Beyond the fuzzy lock-and-key: spontaneous symmetry shifts and glycan/lectin logic gates [PDF]

open access: yes, 2012
Changes in the molecular topology of glycan/lectin interaction may explain observed reaction punctuation driven by experimental gradients in reactant concentration. Adoption of a 'biological renormalization' perspective from statistical physics
Rodrick Wallace
core   +1 more source

Heterogeneous and rate-dependent streptavidin-biotin unbinding revealed by high-speed force spectroscopy and atomistic simulations [PDF]

open access: yes, 2019
Receptor-ligand interactions are essential for biological function and their binding strength is commonly explained in terms of static lock-and-key models based on molecular complementarity.
Gonzalez, Laura   +4 more
core   +4 more sources

Evolutionarily divergent DUF4465 domains have a common vitamin B12‐binding function

open access: yesFEBS Open Bio, EarlyView.
We show that DUF4465 family proteins, widespread across bacteria from gut microbiomes, hydrothermal vents, and soil, share a common vitamin B12‐binding function. These augmented β‐jellyroll proteins bind vitamin B12 via extended loops. Our findings establish sequence‐diverse DUF4465 proteins as a widespread class of B12‐binding proteins, highlighting ...
Charlea Clarke   +4 more
wiley   +1 more source

Simple key locks turbine rotor blades [PDF]

open access: yes, 1966
Symmetrical, cruciform key has end tabs which bend up to lock tubine rotor blades against axial displacement.

core   +1 more source

Molecular Docking: From Lock and Key to Combination Lock

open access: yesJournal of Molecular Medicine and Clinical Applications, 2018
Accurate modeling of protein ligand binding is an important step in structure-based drug design, is a useful starting point for finding new lead compounds or drug candidates. The 'Lock and Key' concept of protein-ligand binding has dominated descriptions of these interactions, and has been effectively translated to computational molecular docking ...
Ashutosh, Tripathi, Vytas A, Bankaitis
openaire   +2 more sources

Large‐scale bidirectional arrayed genetic screens identify OXR1 and EMC4 as modifiers of αSynuclein aggregation

open access: yesFEBS Open Bio, EarlyView.
Activation of the mitochondrial protein OXR1 increases pSyn129 αSynuclein aggregation by lowering ATP levels and altering mitochondrial membrane potential, particularly in response to MSA‐derived fibrils. In contrast, ablation of the ER protein EMC4 enhances autophagic flux and lysosomal clearance, broadly reducing α‐synuclein aggregates.
Sandesh Neupane   +11 more
wiley   +1 more source

IMPLEMENTASI ALGORITMA ELGAMAL DALAM SISTEM LOCK BRANKAS BERBASIS MIKROKONTROLER ATMEGA16 DAN SMARTPHONE ANDROID

open access: yesJurnal Ilmiah Informatika, 2016
Most of Safes lock system is still using conventional methods nowadays. The conventional method leads to the safes’ burglary. Some of the causes are the safes’ code that can be tracked easily and the key can be duplicated.
Muhammad Rofiq, Bambang Tri Wahjo Utomo
doaj   +1 more source

Home - About - Disclaimer - Privacy