摘要:
Disclosed herein are methods of reducing infection of a cell by a pathogen, for example to treat or prevent a pathogen infection. Exemplary pathogens include those that use a lipid raft. The disclosure also relates to methods of identifying agents involved in pathogen infection, such as modulators of Rab9A and Rab11A.
摘要:
Host nucleic acids and host proteins that participate in viral infection, such as human immunodeficiency virus (HIV), influenza A, and Ebola virus, have been identified. Interfering with or disrupting the interaction between a host nucleic acid or host protein and a virus or viral protein confers an inhibition of or resistance to infection. Thus, interfering with such an interaction in a host subject can confer a therapeutic or prophylactic effect against a virus. The sequences identified can be used to identify agents that reduce or inhibit viral infection.
摘要:
The present invention relates to nucleic acid sequences and cellular proteins encoded by these sequences that are involved in infection or are otherwise associated with the life cycle of one or more pathogens.
摘要:
The present invention relates to nucleic acid sequences and cellular proteins encoded by these sequences that are involved in infection or are otherwise associated with the life cycle of one or more pathogens.
摘要:
The present invention relates to cellular proteins that are involved in infection or are otherwise associated with the life cycle of one or more pathogens.
摘要:
The present invention relates to nucleic acid sequences and cellular proteins encoded by these sequences that are involved in infection or are otherwise associated with the life cycle of one or more pathogens.
摘要:
Technology for finding and acting on hidden data contained in documents generated by a user in productivity applications is disclosed. The technology uses a user configurable document release policy file and a document inspector which parses a document file based on the configuration policy and either presents options to the user to make changes, implements changes automatically, or both, based on the policy definition. A method implemented at least in part by a computing device includes loading a user defined document policy configuration including data types identified as hidden data. A document is then parsed for the defined hidden data and a policy defined action is executed on the hidden data in the document in accordance with the document policy configuration.
摘要:
Row level security (RLS) and cell level security (CLS) are implemented in a database to provide secure dynamic access to database data. Encryption keys are created based on either security classification meta-data tags associated with the individual fields of an incoming data stream or on the security classification of the source network. Without prior knowledge of the incoming data security classification, the present system may generate encryption keys and, if necessary, security classification meta-data on the fly.
摘要:
Models are generated using a variety of tools and features of a model generation platform. For example, in connection with a project in which a user generates a predictive model based on historical data about a system being modeled, the user is provided through a graphical user interface a structured sequence of model generation activities to be followed, the sequence including dimension reduction, model generation, model process validation, and model re-generation. Historical multi-dimensional data is received representing multiple variables to be used as an input to a predictive model of a commercial system variables are pruned for which the data is sparse or missing, and the population of variables is adjusted to represent main effects exhibited by the data and interaction and non-linear effects exhibited by the data.
摘要:
Models are generated using a variety of tools and features of a model generation platform. For example, in connection with a project in which a user generates a predictive model based on historical data about a system being modeled, the user is provided through a graphical user interface a structured sequence of model generation activities to be followed, the sequence including dimension reduction, model generation, model process validation, and model re-generation. In connection with a project in which a user generates a predictive model based on historical data about a system being modeled, the user is enabled to validate the model development process with cross-validation between at least two subsets of the historical data; the validated model development process is enabled to be reapplied.