Learn More
Theories such as Merton [1987. A simple model of capital market equilibrium with incomplete information. Journal of Finance 42, 483–510] predict a positive relation between idiosyncratic risk and expected return when investors do not diversify their portfolio. Ang, Hodrick, Xing, and Zhang [2006. The cross-section of volatility and expected returns. Journal(More)
P58(IPK) is an Hsp40 family member known to inhibit the interferon (IFN)-induced, double-stranded RNA-activated, eukaryotic initiation factor 2alpha (eIF2alpha) protein kinase R (PKR) by binding to its kinase domain. We find that the stress of unfolded proteins in the endoplasmic reticulum (ER) activates P58(IPK) gene transcription through an ER(More)
Dendritic cells (DCs) are a phenotypically and functionally heterogenous population of leukocytes with distinct subsets serving a different set of specialized immune functions. Here we applied an in vitro whole cell panning approach using antibody phage display technology to identify cell-surface epitopes specifically expressed on human blood BDCA3(+) DCs.(More)
UNLABELLED Sterile inflammatory insults are known to activate innate immunity and propagate organ damage through the recognition of extracellular damage-associated molecular pattern (DAMP) molecules. Although DAMPs such as endogenous DNA and nuclear high-mobility group box 1 have been shown to be critical in sterile inflammation, the role of nuclear histone(More)
Powdery mildew (PM), caused by Blumeria graminis f. sp. tritici (Bgt), has become a serious disease and caused severe yield losses in the wheat production worldwide. Resistance gene(s) in wheat cultivars can be quickly overcome by newly evolved pathogen races when these genes are employed for long time or in a large area. It is urgent to search for new(More)
Melatonin is a strong anti-oxidant that has beneficial effects against early brain injury (EBI) following a subarachnoid hemorrhage (SAH) in rats; protection includes the reduction of both mortality and neurological deficits. The molecular mechanisms underlying these clinical effects in the SAH model have not been clearly identified. This study examined the(More)
To evade malicious content detection, malware authors use packers, binary tools that instigate code obfuscation. By using executable packers, modern malware can completely bypass personal firewalls and antivirus (AV) scanners.Reverse engineering (RE) has become an important approach to analyzing a program's logic flow and internal data structures, such as(More)
Hepatitis C virus (HCV), the global leading cause of chronic liver disease, has a positive-sense, ssRNA genome that encodes a large polyprotein. HCV polyprotein translation is initiated by an internal ribosome-entry site (IRES) located at the 5' end of the viral genome, in a cap-independent manner, but the regulatory mechanism of this process remains poorly(More)