H Zhao, X Yang… - Journal of Network and Computer Applications, 2011 - Elsevier ... It is obtained by surveying the network before we deploy the wage-based incentive mechanism protocol. ... 8 Average Utility for Reporters, Querists and System 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 20 40 60 80 100 120 140 160 180 200 D ishonest F eedback P ercentage Time ...
A Crosignani, M Zuin, M Allocca… - Clinica Chimica Acta, 2011 - Elsevier ... [19]. The mechanisms for the regulation of CYP27 are not completely clarified: both protein activity and mRNA leve ls a re d ecreased by bile a cids in rats [20] while in humans af eedbackmechanism similar to that of CYP7A1 was not observed [21]. ...
M Mollapour… - Biochimica et Biophysica Acta (BBA)-Molecular …, 2011 - Elsevier ... Because endothelial nit ric ox ide synthase (eNOS) requires association with Hsp90 for it s activity, t hese a uthors pr oposed that NO -dependent inactivation of Hsp90 in endothelial cells functions asa re gulatory f eedbackmechanism to control production of NO . ...
H Mukai, K Wakamatsu - US Patent 7,893,199, 2011 - Google Patents ... Mukai, Ff, et al., "Investigation on action mechanism of novel neutrophil-activating peptides", Seikagaku, 2002, vol. ... to stimulate neutrophil (jS -hexosaminidase- secreting activity, migration activity, etc.) Identification of criptic functional peptide l-eedback structural information of ... Related articles - All 4 versions
G Costa, V Issarny, F Martinelli, I Matteucci… - Formal Methods for …, 2011 - Springer ... violated. The S×C×T mechanism is driven by both security and trust aspects. ... platform. In order to better describe how the proposed mechanism works, we present its application to a mobile application marketplace scenarios. ... Related articles - All 2 versions