Learn More
NLRP3 forms an inflammasome with its adaptor ASC, and its excessive activation can cause inflammatory diseases. However, little is known about the mechanisms that control assembly of the inflammasome complex. Here we show that microtubules mediated assembly of the NLRP3 inflammasome. Inducers of the NLRP3 inflammasome caused aberrant mitochondrial(More)
Cone photoreceptors are assembled by unknown mechanisms into geometrically regular mosaics in many vertebrate species. The formation and maintenance of photoreceptor mosaics are speculated to require differential cell-cell adhesion. However, the molecular basis for this theory has yet to be identified. The retina and many other tissues express Crumbs (Crb)(More)
Effective approaches to neuropsychiatric disorders require detailed understanding of the cellular composition and circuitry of the complex mammalian brain. Here, we present a paradigm for deconstructing the diversity of neurons defined by a specific neurotransmitter using a microfluidic dynamic array to simultaneously evaluate the expression of 96 genes in(More)
Coffee consumption has been shown to be associated with cancer of various sites in epidemiological studies. However, there is no comprehensive overview of the substantial body of epidemiologic evidence. We searched MEDLINE, EMBASE, Science Citation Index Expanded and bibliographies of retrieved articles. Prospective cohort studies were included if they(More)
The innate immune system detects pathogen- and host-derived double-stranded DNA exposed to the cytosol and induces type I interferon (IFN) and other cytokines. Here, we identified interferon-inducible tripartite-motif (TRIM) 56 as a regulator of double-stranded DNA-mediated type I interferon induction. TRIM56 overexpression enhanced IFN-β promoter(More)
The Grøstl hash function is one of the 5 final round candidates of the SHA-3 competition hosted by NIST. In this paper, we study the preimage resistance of the Grøstl hash function. We propose pseudo preimage attacks on Grøstl hash function for both 256-bit and 512-bit versions, i.e., we need to choose the initial value in order to invert the hash function.(More)
Open source J2EE Application Servers (J2EE ASs) have already attracted industrial attentions in recent years, but the reliability is still an obstacle to their wide acceptance. The detail of software failures in J2EE AS was seldom discussed in the past, although such information is valuable to evaluate and improve its reliability. In this paper, we present(More)