Learn More
Methylenedioxymethamphetamine (MDMA, Ecstasy) is a very popular drug of abuse. This has led to new intense concerns relevant to its nefarious neuropsychiatric effects. These adverse events might be related to the neurotoxic effects of the drug. Although the mechanisms of MDMA-induced neurotoxicity remain to be fully characterized, exposure to the drug can(More)
The amphetamines, including amphetamine (AMPH), methamphetamine (METH) and 3,4-methylenedioxymethamphetamine (MDMA), are among abused drugs in the US and throughout the world. Their abuse is associated with severe neurologic and psychiatric adverse events including the development of psychotic states. These neuropsychiatric complications might, in part, be(More)
We investigated the effects of endogenous neurotrophin signaling on the death-survival of immature retinal ganglion cells (RGCs) in vivo. Null mutation of brain-derived neurotrophic factor [(BDNF) alone or in combination with neurotrophin 4 (NT4)] increases the peak rate of developmental RGC death as compared with normal. Null mutation of NT4 alone is(More)
The major core protein of Mason-Pfizer monkey virus was purified by DEAE ion exchange column chromatography and shown to be 27,000 daltons (p27). Following the characterization of monospecific antisera prepared against p27, a radioimmunoassay was developed with these reagents and competition experiments were done with come of the recent M-PMY-like isolates(More)
Methamphetamine (METH), a highly addictive drug, can cause degeneration of monoaminergic terminals and neuronal apoptosis in the mammalian brain. In the present article, we have used serial analysis of gene expression (SAGE) to investigate patterns of gene expression in the striata of rats that were given a neurotoxic dose of the drug. SAGE libraries were(More)
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable security services is a design requirement. On this basis we outline a reference model for rewall technology. It captures the current state of the art and proves suitable for(More)
Performing repeatable and controlled cyber experiments requires the precise description of hardware, software and testbed assets used during an experiment. An experiment specifies the assets that are required to build the system under test and the experimental framework. Different assets must be specified at different levels of detail to ensure experimental(More)
The Cyber Scientific Method (CSM) formalizes experimentation on computer systems, hardware, software, and networks on the U.S. National Cyber Range. This formalism provides rigor to cyber tests to ensure knowledge can be shared and experiment results can be viewed with confidence, knowing exactly what was tested under what conditions. Cyber Scientific Test(More)
  • 1