Mauricio Sánchez

Learn More
PRIMARY OBJECTIVE Brain cortical biopsies of two patients with clinical diagnosis of complicated brain trauma who had seizures, were studied by means of light and electron microscopes in order to correlate structural alterations with seizure activity. METHODS AND PROCEDURES Biopsy samples of left frontal cortex and right parietal cortex were processed by(More)
A pervasive mobile computing environment is typically composed of multiple fixed and mobile entities that interact autonomously with each other with very little central control. Many of these interactions may occur between entities that have not interacted with each other previously. Conventional security models are inadequate for regulating access to data(More)
The enzyme 5alpha-reductase is responsible for the conversion of testosterone (T) to its more potent androgen dihydrotestosterone (DHT). This steroid had been implicated in androgen-dependent diseases such as: benign prostatic hyperplasia, prostate cancer, acne and androgenic alopecia. The inhibition of 5alpha-reductase enzyme offers a potentially useful(More)
Mauritia flexuosa is a keystone species with a broad geographic distribution throughout the Amazon. Environmental changes can impact the reproductive success in a keystone species such as M. flexuosa, which results in a cascade of events that impacts many other species. The present study examined the reproductive phenology in the palm M. flexuosa between(More)
  • Rueda-Jaimes G, Navarro-Mancilla A, Camacho P, Franco J, Escobar M, Eduardo Germán +6 others
  • 2009
Introduction: Psychometric data concerning structured clinical interviews are affected by age and population characteristics. The present study was designed to investigate the test-re-test interrater reliability of a Spanish version of the Structured Clinical Interview for Major Depressive Disorder (MDD) in adolescent students from Colombia. Methods: All(More)
Due to both the number of entities and the nature of the interactions and collaborations amongst them, conventional security models are inadequate for regulating access to data and services in a pervasive mobile computing environment. Since many of these interactions occur between entities that have not interacted with each other previously, new security(More)
  • 1