Learn More
A set of programs written in C language with the GL library and under UNIX has been developed for generating compact, pleasant and non-overlapping displays of secondary structures of ribonucleic acids. The first program, rnasearch, implements a new search procedure that dynamically rearranges overlapping portions of the two-dimensional drawing while(More)
Current vector control strategies focus largely on indoor measures, such as long-lasting insecticide treated nets (LLINs) and indoor residual spraying (IRS); however mosquitoes frequently feed on sugar sources outdoors, inviting the possibility of novel control strategies. Attractive toxic sugar baits (ATSB), either sprayed on vegetation or provided in(More)
—Privacy in business processes for personalized services is currently a matter of trust, since business processes require the delegation of personal data and users are not able to control their usage and so their delegation. Existing privacy-enhancing technologies like identity management systems consider access control but not the usage of personal data.(More)
We describe the identification and submitochondrial localization of four protein kinases and of their target proteins in derepressed yeast mitochondria. The activity of one of the kinases depends on the presence of cyclic AMP (CAMP). It is soluble and localized in the mitochondrial intermembrane space. Its natural target is a polypeptide of40 kDa molecular(More)
  • 1