Transforming terpene feedstock into polyketide architecture
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Telomerase contains a large RNA subunit, TER, and a protein catalytic subunit, TERT. Whether telomerase functions as a monomer or dimer has been a matter of debate. Here we report biochemical and labeling data that show that in vivo-assembled human telomer ...
A multidisciplinary and shared computerized
patient record (CPR) has been progressively
implemented since 2002 for all public hospitals
in the State of Valais, Switzerland. This paper
presents the results of a formal evaluation of
user’s satisfaction ...
Recently, two e-mail protocols were proposed claiming to provide perfect secrecy. These protocols use authentication and (Diffie-Hellman) key-exchange techniques, and as such, other standard security criteria besides perfect forward secrecy include key-rep ...
Heterotrimeric G-proteins are integral to a conserved regulatory module that influences metazoan asymmetric cell division (ACD). In the Caenorhabditis elegans zygote, GOA-1 (Galpha(o)) and GPA-16 (Galpha(i)) are involved in generating forces that pull on a ...
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bit “1”, but not the contrary), we propose integrity codes (I-codes) for a radio co ...
[...] This report presents novel data following the discovery of somatic mutations in the heterotrimeric G protein alpha q subunit (GNAQ), found in 44% of uveal melanomas, 83% of blue nevi, and 50% of melanomas arising within blue nevi. [... click on "Down ...
We present a structural attack against the Sidelnikov cryptosystem. The attack creats a private key from a give public key. Its running time is subexponential and it is effective if the parameters of the Reed-Muller code allow for efficient sampling of min ...
We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellman key agreement protocol, which is known to be vulnerable to the ``man-in-the-middle" attack if the two users ...
This paper sheds light on some of the graphical methods used by Robert Maillart to design the Salginatobel Bridge, a three-hinged concrete structure spanning 90 meters. Built in 1929, this masterpiece has since received extensive recognition both for its s ...
In this article we present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in [1]. We show how, based on the relation between the public and private key, we can construct an attack which allows any passive adversary to decrypt the encr ...