𝔖 Bobbio Scriptorium
✦   LIBER   ✦

An approach to identify functional homologues and suppressors of genes in fission yeast

✍ Scribed by Beáta Grallert; Paul Nurse; B. Gallert


Publisher
Springer-Verlag
Year
1997
Tongue
English
Weight
281 KB
Volume
32
Category
Article
ISSN
0172-8083

No coin nor oath required. For personal study only.


📜 SIMILAR VOLUMES


Genomic imbalances in rhabdomyosarcoma c
✍ Edoardo Missiaglia; Joanna Selfe; Mohamed Hamdi; Daniel Williamson; Gerben Schaa 📂 Article 📅 2009 🏛 John Wiley and Sons 🌐 English ⚖ 447 KB

## Abstract Rhabdomyosarcomas (RMS) are the most common pediatric soft tissue sarcomas. They resemble developing skeletal muscle and are histologically divided into two main subtypes; alveolar and embryonal RMS. Characteristic genomic aberrations, including the __PAX3__‐ and __PAX7‐FOXO1__ fusion g

Cloning and functional expression of AtC
✍ Marie-Hélène Avelange-Macherel; Jacques Joyard 📂 Article 📅 1998 🏛 John Wiley and Sons 🌐 English ⚖ 405 KB

## Summary A mutant of __Saccharomyces cerevisiae__ deleted for the __COQ3__ gene was constructed. __COQ3__ encodes a 3,4‐dihydroxy‐5‐hexaprenylbenzoate (DHHB) methyltransferase that catalyses the fourth step in the biosynthesis of ubiquinone from __p__‐hydroxybenzoic acid. A full length cDNA encod

Expression of foreign genes in lamprey e
✍ Kusakabe, Rie ;Tochinai, Shin ;Kuratani, Shigeru 📂 Article 📅 2003 🏛 John Wiley and Sons 🌐 English ⚖ 406 KB

Evolution in development can be viewed as a sequence of changes in gene regulation. To investigate the cross-species compatibility of 5' upstream regulatory regions, we introduced exogenous gene constructs derived from a gnathostome genome into fertilized eggs of the Japanese lamprey, Lampetra japon

An innovative approach to identify the I
✍ Mateus Mosca Viana; Riverson Rios; Rossana Maria de Castro Andrade; José Neuman 📂 Article 📅 2009 🏛 John Wiley and Sons 🌐 English ⚖ 212 KB

## Abstract Denial‐of‐service (DoS) and distributed denial‐of‐service (DDoS) are two of the most severe attacks against computer networks, especially the Internet. Despite its destructive effect, planning these attacks is a feasible task. Given that most attackers usually spoof the source address i