Learn More
Stomata play an important role in plant innate immunity by limiting pathogen entry into leaves but molecular mechanisms regulating stomatal closure upon pathogen perception are not well understood. Here we show that the Arabidopsis thaliana L-type lectin receptor kinase-V.5 (LecRK-V.5) negatively regulates stomatal immunity. Loss of LecRK-V.5 function(More)
In this paper we focus on the design methodology to propose a design that is more flexible than ASIC solution and more efficient than the processor-based solution for H.264 video decoder. We explore the memory access bandwidth requirement and different software/hardware partitions so as to propose a configurable architecture adopting a DEM (Data Exchange(More)
Urodele amphibians (Ambystoma mexicanum), unique among vertebrates, can regenerate appendages and other body parts entirely and functionally through a scar-free healing process. The wound epithelium covering the amputated or damaged site forms early and is essential for initiating the subsequent regenerative steps. However, the molecular mechanism through(More)
Although still debated, limb regeneration in salamanders is thought to depend on the dedifferentiation of remnant tissue occurring early after amputation and generating the progenitor cells that initiate regeneration. This dedifferentiation has been demonstrated previously by showing the fragmentation of muscle fibers into mononucleated cells and by(More)
We present two methods for the precise independent focusing of orthogonal linear polarizations of light at arbitrary relative locations. Our first scheme uses a displaced lens in a polarization Sagnac interferometer to provide adjustable longitudinal and lateral focal displacements via simple geometry; the second uses uniaxial crystals to achieve the same(More)
A block cipher is a kind of symmetric encryption algorithm that operates on blocks of fixed length, often 64 or 128 bits. It transforms blocks of plaintext into blocks of ci-phertext of the same length under the provided secret key. A common characteristic of currently widely used modes of operation such as CBC, CFB and OFB is the sequential procedure,(More)
—The RSA cryptosystem is one of the widely used public key systems. The security of it is based on the intractability of factoring a large composite integer into two component primes, which is referred to as the RSA assumption. So far, the Quadratic Sieve (QS) is the fastest and general-purpose method for factoring composite numbers having less than about(More)