Learn More
Nuclear receptors modulate the transcription of genes in direct response to small lipophilic ligands. Binding to ligands induces conformational changes in the nuclear receptors that enable the receptors to interact with several types of cofactor that are critical for transcription activation (transactivation). We previously described a distinct set of(More)
Transcriptional activation requires both access to DNA assembled as chromatin and functional contact with components of the basal transcription machinery. Using the hormone-bound vitamin D(3) receptor (VDR) ligand binding domain (LBD) as an affinity matrix, we previously identified a novel multisubunit coactivator complex, DRIP (VDR-interacting proteins),(More)
A distinct class of the biologically important subtilisin family of serine proteases functions exclusively within the cell and forms a major component of the bacilli degradome. However, the mode and mechanism of posttranslational regulation of intracellular protease activity are unknown. Here we describe the role played by a short N-terminal extension(More)
Opportunities are available resources that yield desired results. Their suitability depends on who seizes the opportunity and the context for its use. Opportunistic development relies on the availability of reusable software components to produce hybrid applications that opportunistically join such components to meet immediate functional or content needs.(More)
Workflow reconfiguration traditionally involves modifying workflow specifications to adapt to changing architectural conditions. Causes include the introduction of new services or the alteration of goals. Dynamic reconfiguration is currently achieved in workflow specifications employing Web services using techniques that modify endpoint bindings and control(More)
Security certification includes assessing an information system to verify its compliance with diverse, pre-selected security controls. The goal of certification is to identify where controls are implemented correctly and where they are violated, creating potential vulnerability risks. Certification complexity is magnified in software composed of systems of(More)
Security issues with Web services have slowed their adoption for deployment of critical services in the enterprise. Maintaining security in Web service architectures is especially difficult because of their open, standards based interfaces. Yet many organizations are moving to this technology and are faced with the challenge of certifying their environments(More)
Modern software system development includes the use of off-the-shelf components in the form of third-party software (TPS). Vendors of TPS products play an increasingly important role in the systems that incorporate their offerings. Modeling these vendors' motivations, in the form of architectural concerns and viewpoints, provides an additional tool for(More)
Constructing a complex system-of-systems (SoS) involves integrating two or more components. When integrations overcome isolating mechanisms inherent to heterogeneous components, a SoS is a software hybrid. SoS designers are challenged to create a viable hybrid that reuses significant value from autonomous, component systems while allowing for new, SoS-wide(More)