Learn More
Clustering, as a kind of data mining methods, with the characteristic of no supervising, quick modeling is widely used in intrusion detection. However, most of the traditional clustering algorithms use a single data point as a calculating unit, and the drawback exists in time wasting to calculate one data point after another when clustering, meanwhile, a(More)
"Memory-like T cells" are a subset of thymic cells that acquire effector function through the maturation process rather than interaction with specific antigen. Disruption of genes encoding T cell signaling proteins or transcription factors have provided insights into the differentiation of such cells. In this study, we show that in BALB/c, but not C57BL/6,(More)
Dendritic cell (DC) vaccines have shown great promise in generating antitumor immune responses but have generally fallen short of producing durable cures. Determining mechanisms by which these vaccines fail will provide one strategy toward improving their success. Several manipulations of DCs have improved their migration and longevity, but the immune(More)
  • 1