62 research outputs found

    NMR Derived Model of GTPase Effector Domain (GED) Self Association: Relevance to Dynamin Assembly

    Get PDF
    Self-association of dynamin to form spiral structures around lipidic vesicles during endocytosis is largely mediated by its ‘coiled coil’ GTPase Effector Domain (GED), which, in vitro, self-associates into huge helical assemblies. Residue-level structural characterizations of these assemblies and understanding the process of association have remained a challenge. It is also impossible to get folded monomers in the solution phase. In this context, we have developed here a strategy to probe the self-association of GED by first dissociating the assembly using Dimethyl Sulfoxide (DMSO) and then systematically monitoring the refolding into helix and concomitant re-association using NMR spectroscopy, as DMSO concentration is progressively reduced. The short segment, Arg109 - Met116, acts as the nucleation site for helix formation and self-association. Hydrophobic and complementary charge interactions on the surfaces drive self-association, as the helices elongate in both the directions resulting in an antiparallel stack. A small N-terminal segment remains floppy in the assembly. Following these and other published results on inter-domain interactions, we have proposed a plausible mode of dynamin self assembly

    Способы перевода аббревиатур и сокращений в области компьютерных технологий (на примере русского и немецкого языков)

    Get PDF
    Выпускная квалификационная работа 75 с., 2 главы, 42 источника. Предмет исследования: способы перевода аббревиатур и сокращений в области компьютерных технологий с немецкого языка на русский язык. Объектом исследования: аббревиатуры и сокращения, относящиеся к области компьютерных технологий. Цель работы: выявить эффективные способы перевода аббревиатур и сокращений в области компьютерных технологий с немецкого языка на русский. Результаты исследования: были сформулированы особенности перевода аббревиатур и сокращений в области компьютерных технологий Степень внедрения/апробация работы: Было опубликовано две статьи Область применения: лингвистика, языкознание, переводоведение.Graduation thesis: 75 pg., 2 chapters, 42 resources. Subject of research: translation methods of acronyms and reductions in the field of computer technology from German into Russian. Object of research: Acronyms and reductions in the field of computer technology. Purpose of research: : to identify the translation methods of acronyms and reductions in the field of computer technology from German into Russian. Results of research: The features of the translation of acronyms and reductions in the area of computer technology has been revealed. Degree of implementation /work approbation: two articles were published. Field of application: Linguistic, theory of translatio

    A best practice fall prevention exercise program to improve balance, strength / power, and psychosocial health in older adults: study protocol for a randomized controlled trial

    Full text link

    Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors

    No full text
    Computer systems often provide hardware support for isolation mechanisms like privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, or at least significantly weaken the isolation that these mechanisms offer. Extending a processor with new architectural or micro-architectural features, brings a risk of introducing new such side-channel attacks. This paper studies the problem of extending a processor with new features without weakening the security of the isolation mechanisms that the processor offers. We propose to use full abstraction as a formal criterion for the security of a processor extension, and we instantiate that criterion to the concrete case of extending a microprocessor that supports enclaved execution with secure interruptibility of these enclaves. This is a very relevant instantiation as several recent papers have shown that interruptibility of enclaves leads to a variety of software-based side-channel attacks. We propose a design for interruptible enclaves, and prove that it satisfies our security criterion. We also implement the design on an open-source enclave-enabled microprocessor, and evaluate the cost of our design in terms of performance and hardware size

    Securing Interruptible Enclaved Execution on Small Microprocessors

    No full text
    Computer systems often provide hardware support for isolation mechanisms such as privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, or at least significantly weaken, the isolation that these mechanisms offer. Extending a processor with new architectural or micro-architectural features brings a risk of introducing new software-based side-channel attacks. This article studies the problem of extending a processor with new features without weakening the security of the isolation mechanisms that the processor offers. Our solution is heavily based on techniques from research on programming languages. More specifically, we propose to use the programming language concept of full abstraction as a general formal criterion for the security of a processor extension. We instantiate the proposed criterion to the concrete case of extending a microprocessor that supports enclaved execution with secure interruptibility. This is a very relevant instantiation, as several recent papers have shown that interruptibility of enclaves leads to a variety of software-based side-channel attacks. We propose a design for interruptible enclaves and prove that it satisfies our security criterion. We also implement the design on an open-source enclave-enabled microprocessor and evaluate the cost of our design in terms of performance and hardware size
    corecore