J. Bryan Lyles

Learn More
The amphetamines, including amphetamine (AMPH), methamphetamine (METH) and 3,4-methylenedioxymethamphetamine (MDMA), are among abused drugs in the US and throughout the world. Their abuse is associated with severe neurologic and psychiatric adverse events including the development of psychotic states. These neuropsychiatric complications might, in part, be(More)
Methylenedioxymethamphetamine (MDMA, Ecstasy) is a very popular drug of abuse. This has led to new intense concerns relevant to its nefarious neuropsychiatric effects. These adverse events might be related to the neurotoxic effects of the drug. Although the mechanisms of MDMA-induced neurotoxicity remain to be fully characterized, exposure to the drug can(More)
Methamphetamine (METH), a highly addictive drug, can cause degeneration of monoaminergic terminals and neuronal apoptosis in the mammalian brain. In the present article, we have used serial analysis of gene expression (SAGE) to investigate patterns of gene expression in the striata of rats that were given a neurotoxic dose of the drug. SAGE libraries were(More)
We investigated the effects of endogenous neurotrophin signaling on the death-survival of immature retinal ganglion cells (RGCs) in vivo. Null mutation of brain-derived neurotrophic factor [(BDNF) alone or in combination with neurotrophin 4 (NT4)] increases the peak rate of developmental RGC death as compared with normal. Null mutation of NT4 alone is(More)
The major core protein of Mason-Pfizer monkey virus was purified by DEAE ion exchange column chromatography and shown to be 27,000 daltons (p27). Following the characterization of monospecific antisera prepared against p27, a radioimmunoassay was developed with these reagents and competition experiments were done with come of the recent M-PMY-like isolates(More)
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable security services is a design requirement. On this basis we outline a reference model for rewall technology. It captures the current state of the art and proves suitable for(More)
Performing repeatable and controlled cyber experiments requires the precise description of hardware, software and testbed assets used during an experiment. An experiment specifies the assets that are required to build the system under test and the experimental framework. Different assets must be specified at different levels of detail to ensure experimental(More)
The Cyber Scientific Method (CSM) formalizes experimentation on computer systems, hardware, software, and networks on the U.S. National Cyber Range. This formalism provides rigor to cyber tests to ensure knowledge can be shared and experiment results can be viewed with confidence, knowing exactly what was tested under what conditions. Cyber Scientific Test(More)
Conference. This conference serves as the forum where designers and architects from leading companies and universities meet to discuss new technologies for switching, routing, and processing of packets. Hot Interconnects takes a broad view of networking and, in addition to traditional WAN or LAN networks, includes processor interconnects in computing(More)
Hot Interconnects is an annual conference that specializes in emerging technologies for interconnecting computer systems and subsystems, as well as networks. The conference has a high degree of industrial participation, with paper submissions, panel discussions, and tutorials that often reflect the melding of industrial and university perspectives. Hot(More)
  • 1