Search results for "Crypt"
showing 10 items of 1111 documents
Scheduling independent stochastic tasks under deadline and budget constraints
2018
This article discusses scheduling strategies for the problem of maximizing the expected number of tasks that can be executed on a cloud platform within a given budget and under a deadline constraint. The execution times of tasks follow independent and identically distributed probability laws. The main questions are how many processors to enroll and whether and when to interrupt tasks that have been executing for some time. We provide complexity results and an asymptotically optimal strategy for the problem instance with discrete probability distributions and without deadline. We extend the latter strategy for the general case with continuous distributions and a deadline and we design an ef…
THE IMAGE PROTECTOR A Flexible Security Rule Specification Toolkit
2011
International audience; The tremendous sharing of multimedia objects on the web shed the light on several privacy concerns related in essence to the safe publishing of end users' personal data. Providing techniques to protect multimedia objects faces several difficulties due to multimedia objects' heterogeneous and complex structure on one hand, and on the other hand, the wide range of information that could be used to describe their content. In this paper, we present a flexible security rule specification toolkit for multimedia objects. Our toolkit is based on a security model and a core ontology in which we populate the model's related information and multimedia objects data. To specify s…
Automated detection of contextuality proofs with intermediate numbers of observables
2021
<div style=""><font face="arial, helvetica"><span style="font-size: 13px;">Quantum contextuality takes an important place amongst the concepts of quantum computing that bring an advantage over its classical counterpart. For a large class of contextuality </span></font><span style="font-size: 13px; font-family: arial, helvetica;">proofs, aka. observable-based proofs of the Kochen-Specker Theorem, we first formulate the</span></div><div style=""><font face="arial, helvetica"><span style="font-size: 13px;">contextuality property as the absence of solutions to a linear system. Then we explain why </span></font><span style="font-size: 13px; font-family: arial, helvetica…
A Route toward Protein Sequencing using Solid-State Nanopores Assisted by Machine Learning
2022
Solid-State Nanopores made of 2-D materials such as MoS2 have emerged as one of the most versatile sensors for single-biomolecule detection, which is essential for early disease diagnosis (biomarker detection). One of the most promising applications of SSN is DNA and protein sequencing, at a low cost and faster than the current standard methods. The detection principle relies on measuring the relatively small variations of ionic current as charged biomolecules immersed in an electrolyte traverse the nanopore, in response to an external voltage applied across the membrane. The passage of a biomolecule through the pore yields information about its structure and chemical properties, as demonst…
Computer-assisted enumeration and classification of multi-qubit doilies
2022
For N ≥ 2, an N-qubit doily is a doily living in the N-qubit symplectic polar space. These doilies are related to operator-based proofs of quantum contextuality. Following and extending the strategy of [SdBHG21] that focused exclusively on three-qubit doilies, we first bring forth several formulas giving the number of both linear and quadratic doilies for any N > 2. Then we present an effective algorithm for the generation of all N-qubit doilies. Using this algorithm for N = 4 and N = 5, we provide a classification of N-qubit doilies in terms of types of observables they feature and number of negative lines they are endowed with.
Gammarids and acanthocephalans, a multi-(cryptic) hosts and multi-parasites system?
2022
Multi-host parasites can exploit various host species that differ in abundance and susceptibility to infection, which will contribute unequally to their transmission and fitness. "Key hosts" are those contributing significantly more to the completion of the life cycle of such parasites. Three non-exclusive criteria may be used to identify a key host: its high abundance, its high exposure/susceptibility to infection, and the large number of infectious stages produced per infected individual. Many parasites with complex life cycles have evolved the ability to manipulate several traits of their intermediate hosts' phenotype, including behavior, thereby increasing the likelihood of transmission…
Le monoxyde d'azote (NO) chez les plantes. Un messager cellulaire impliqué dans la signalisation des réponses de défense - l'exemple du modèle N. tab…
2012
Nitric oxide (NO) in plants, a cell signalling messenger involved in plant defense. The case study of the N. tabacum / cryptogein model
2013
Communication vers les professionnels SPE IPM CT non renseigné car non soutenu par INRA
Rôle de la Dynamique Membranaire dans la Mise en Place des Mécanismes de Défense chez le Tabac
2011
Cryptogein, a protein secreted by the oomycete Phytophthora cryptogea, induces defense mechanisms in tobacco. Several proteins involved in the associated signaling pathway were identified and localized on the plasma membrane (PM). A fraction resistant to solubilization by detergent named DIMs for Detergent Insoluble Membranes, enriched in sterols an sphigolipids had been isolated from tobacco PM. It was proved to contain proteins previously identified as actors of the signaling cascade triggered by cryptogein. In animal cells, the dynamic association of proteins to sterol and sphingolipid rich microdomains under the influence of a biological stimulus plays an essential role in the regulatio…
Cryptogein treatment stimulates clathrin-endocytosis correlated with ROS production in tobacco cells
2007
International audience; During plant pathogen interactions, specific molecules elicit defense response of plant cells. Cryptogein, an elicitin produced by the pathogenic fungus Phytophtora cryptogea, induces a hypersensitive response (HR) in tobacco plants. The mode of action for cryptogein starts with recognition of this elicitor by an unidentified plasma membrane (PM) receptor. This ligand-receptor binding trigger a cascade of events at the PM level including rapid calcium influx, ions effluxes, extracellular medium alcalinization and plasma membrane depolarization both in tobacco plants and suspension cells. These events lead to the activation of plasma membrane-bound NADPH oxidase, Ntrb…