Learn More
The prevalent DNA modification in higher organisms is the methylation of cytosine to 5-methylcytosine (5mC), which is partially converted to 5-hydroxymethylcytosine (5hmC) by the Tet (ten eleven translocation) family of dioxygenases. Despite their importance in epigenetic regulation, it is unclear how these cytosine modifications are reversed. Here, we(More)
The loss of the SOST gene product sclerostin leads to sclerosteosis characterized by high bone mass. In this report, we found that sclerostin could antagonize canonical Wnt signaling in human embryonic kidney A293T cells and mouse osteoblastic MC3T3 cells. This sclerostin-mediated antagonism could be reversed by overexpression of Wnt co-receptor low density(More)
Clustering analysis is a primary method for data mining. Density clustering has such advantages as: its clusters are easy to understand and it does not limit itself to shapes of clusters. But existing density-based algorithms have trouble in finding out all the meaningful clusters for datasets with varied densities. This paper introduces a new algorithm(More)
a r t i c l e i n f o Facial expression is central to human experience. Its efficiency and valid measurement are challenges that automated facial image analysis seeks to address. Most publically available databases are limited to 2D static images or video of posed facial behavior. Because posed and un-posed (aka " spontaneous ") facial expressions differ(More)
Microloan markets allow individual borrowers to raise funding from multiple individual lenders. We use a unique panel dataset which tracks the funding dynamics of borrower listings on Prosper.com, the largest microloan market in the United States. We find evidence of rational herding among lenders. Well-funded borrower listings tend to attract more funding(More)
TET proteins oxidize 5-methylcytosine (5mC) to 5-hydroxymethylcytosine (5hmC), 5-formylcytosine (5fC), and 5-carboxylcytosine (5caC). 5fC and 5caC are excised by mammalian DNA glycosylase TDG, implicating 5mC oxidation in DNA demethylation. Here, we show that the genomic locations of 5fC can be determined by coupling chemical reduction with biotin tagging.(More)
BACKGROUND Recent studies suggest that internet addiction disorder (IAD) is associated with structural abnormalities in brain gray matter. However, few studies have investigated the effects of internet addiction on the microstructural integrity of major neuronal fiber pathways, and almost no studies have assessed the microstructural changes with the(More)
Besides traditional problems such as potential bugs, (smartphone) application clones on Android markets bring new threats. That is, attackers clone the code from legitimate Android applications, assemble it with malicious code or advertisements, and publish these ``purpose-added" app clones on the same or other markets for benefits. Three inherent and(More)
Facial expression is central to human experience. Its efficient and valid measurement is a challenge that automated facial image analysis seeks to address. Most publically available databases are limited to 2D static images or video of posed facial behavior. Because posed and un-posed (aka “spontaneous”) facial expressions differ along several dimensions(More)
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant database system can operate through attacks in such a way that the system can continue delivering essential services in the face of attacks. With a focus on attacks by malicious(More)