• Citations Per Year
Learn More
A heat stress transcription factor LlHSFA1 in lily and its relationship with LlHSFA2 was investigated, and its function in enhancing thermotolerance was confirmed by analyzing transgenic Arabidopsis thaliana overexpressed LlHSFA1. A large family of heat stress transcription factors that are involved in the heat stress response in plants can induce the(More)
Involvement of calcium (Ca2+) and different calmodulin (CaM) isoforms in heat shock (HS) signal transduction in lily (Lilium longiflorum) was investigated in this study. Application of CaCl2 enhanced the thermotolerance of lily, whereas treatment with calcium ion chelator EGTA and CaM antagonist trifluoperazine (TFP) lowered the thermotolerance. Besides,(More)
Context-based query processing methods are used to capture user intents behind query inputs. General context models are not flexible or explicable enough for inference, because they are either static or implicit. This paper improves current context model and proposes a novel query processing approach based on associated semantic context inference. In our(More)
Organ phosphorus pesticides (OPs) were first synthesized in large quantities in the 1940's and are now widely used in China. Although OPs can degrade rapidly, they are also highly toxic. Indeed, many cases of poisoning in China, especially from vegetable sources, were attributed to the presence of OPs in large quantities. Even though the use of highly toxic(More)
Data interchange in Internet is mainly for specific web applications. The data formats are simple but lack of rich semantic descriptions, which can't meet current requirements of deep web data analyzing with semantic technology. Aiming at connecting web data with semantics, we propose an automatic semantic extraction method to handle web data sets with(More)
With many security events taking place in recent years, scientists have realized vulnerability management is an important field and it brings critical effects to many information systems and services. One topic in this field is to identify similarity relationship between vulnerabilities. It can help us to alarm potential attacks. In this paper, we propose a(More)
We are presenting the most recent version of MEAD (v. 3.08), a large-scale public-domain summarizer that has been used in a number of applications, including the 2001 JHU summer workshop and the NewsInEssence project (www.newsinessence.com). A version of MEAD finished in first place on task 4 at DUC 2003 and finished in the top three on two other tasks. In(More)