256,670 research outputs found

    Genetic and Biochemical Approaches for <em>In Vivo</em> and <em>In Vitro</em> Assessment of Protein Oligomerization: The Ryanodine Receptor Case Study

    Get PDF
    Oligomerization is often a structural requirement for proteins to accomplish their specific cellular function. For instance, tetramerization of the ryanodine receptor (RyR) is necessary for the formation of a functional Ca2+ release channel pore. Here, we describe detailed protocols for the assessment of protein self-association, including yeast two-hybrid (Y2H), co-immunoprecipitation (co-IP) and chemical cross-linking assays. In the Y2H system, protein self-interaction is detected by Ī²-galactosidase assay in yeast co-expressing GAL4 bait and target fusions of the test protein. Protein self-interaction is further assessed by co-IP using HA- and cMyc-tagged fusions of the test protein co-expressed in mammalian HEK293 cells. The precise stoichiometry of the protein homo-oligomer is examined by cross-linking and SDS-PAGE analysis following expression in HEK293 cells. Using these different but complementary techniques, we have consistently observed the self-association of the RyR N-terminal domain and demonstrated its intrinsic ability to form tetramers. These methods can be applied to protein-protein interaction and homo-oligomerization studies of other mammalian integral membrane proteins

    Smews: Smart and Mobile Embedded Web Server

    Get PDF
    International audienceIn this paper, we show that Web protocols and technologies are good candidates to design the Internet of Things, through a user-centric architecture (the user simply has to use a standard Web browser). We detail how this Web of Things can handle typical embedded devices interaction needs. We discuss the technical feasibility of embedded Web servers, and, thanks to an analysis of the Web protocols, we propose new cross-layer solutions for efficient tiny embedded Web servers design. The problem of event notification for Web applications is also discussed. We finally present a prototype -- named Smews -- as a proof of concept of the Web of Things. Smews implements our proposals and has been embedded in tiny devices (smart cards, sensors and other embedded devices), with a requirement of only 200~bytes of volatile memory and 7~kilo-bytes of code. We show that it is significantly faster than other state of the art solutions. We made Smews source code publically available under an open-source license

    Design of a shared whiteboard component for multimedia conferencing

    Get PDF
    This paper reports on the development of a framework for multimedia applications in the domain of tele-education. The paper focuses on the protocol design of a specific component of the framework, namely a shared whiteboard application. The relationship of this component with other components of the framework is also discussed. A salient feature of the framework is that it uses an advanced ATM-based network service. The design of the shared whiteboard component is considered representative for the design as a whole, and is used to illustrate how a flexible protocol architecture utilizing innovative network functions and satisfying demanding user requirements can be developed

    A conceptual architecture for semantic web services development and deployment

    Get PDF
    Several extensions of the Web Services Framework (WSF) have been proposed. The combination with Semantic Web technologies introduces a notion of semantics, which can enhance scalability through automation. Service composition to processes is an equally important issue. Ontology technology ā€“ the core of the Semantic Web ā€“ can be the central building block of an extension endeavour. We present a conceptual architecture for ontology-based Web service development and deployment. The development of service-based software systems within the WSF is gaining increasing importance. We show how ontologies can integrate models, languages, infrastructure, and activities within this architecture to support reuse and composition of semantic Web services

    Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model

    Full text link
    We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowledge that remain secure against concurrent man-in-the-middle attacks. In an effort to reduce the setup assumptions required for efficient zero-knowledge arguments of knowledge that remain secure against concurrent man-in-the-middle attacks, we consider a model, which we call the Authenticated Public-Key (APK) model. The APK model seems to significantly reduce the setup assumptions made by the CRS model (as no trusted party or honest execution of a centralized algorithm are required), and can be seen as a slightly stronger variation of the Bare Public-Key (BPK) model from \cite{CGGM,MR}, and a weaker variation of the registered public-key model used in \cite{BCNP}. We then define and study man-in-the-middle attacks in the APK model. Our main result is a constant-round concurrent non-malleable zero-knowledge argument of knowledge for any polynomial-time relation (associated to a language in NP\mathcal{NP}), under the (minimal) assumption of the existence of a one-way function family. Furthermore,We show time-efficient instantiations of our protocol based on known number-theoretic assumptions. We also note a negative result with respect to further reducing the setup assumptions of our protocol to those in the (unauthenticated) BPK model, by showing that concurrently non-malleable zero-knowledge arguments of knowledge in the BPK model are only possible for trivial languages

    A QoS-Aware Routing Protocol for Real-time Applications in Wireless Sensor Networks

    Get PDF
    The paper presents a quality of service aware routing protocol which provides low latency for high priority packets. Packets are differentiated based on their priority by applying queuing theory. Low priority packets are transferred through less energy paths. The sensor nodes interact with the pivot nodes which in turn communicate with the sink node. This protocol can be applied in monitoring context aware physical environments for critical applications.Comment: 10 pages. arXiv admin note: text overlap with arXiv:1001.5339 by other author
    • ā€¦
    corecore