Now showing items 1-20 of 43

      Subject
      Caenorhabditis elegans; caloric restriction; calorie restriction; replicative life span; target of rapamycin; yeast. [1]
      CAN1, gene expression, aging, translation efficiency, protein abundance, [1]
      Cartesian product networks embedding interconnection networks star graph. [1]
      Cayley color graphs, vertex-disjoint [1]
      Cell Cycle Checkpoints, Microbial Viability, Stochastic Processes, Yeasts/physiology [1]
      Cetrimonium Cetrimonium Compounds/chemistry Environmental Monitoring Kinetics Micelles Naphthalenes/chemistry Polysorbates/chemistry Sodium Dodecyl Sulfate/chemistry Solutions/chemistry Surface-Active Agents/chemistry Volatilization [1]
      Chemical kinetics. nicotinic, acetylcholine receptor, antiepileptic drugs, noncompetitive inhibition, patch clamp, molecular docking [1]
      Chemical mixtures, chemical protective clothing, degradation, dermal protection, gloves, personal protective equipment [1]
      chemical protective clothing, exam gloves, penetration, PPE, water-leak test [1]
      chemical protective clothing; dermal protection; exam gloves; personal protective equipment [1]
      chemical rearrangement, covalent bonds, open framework, dimensionality [1]
      chemical structure, Copper, Ligands, Crystal Structures, Layers [1]
      chemo-resistance, microRNA, ovarian cancer [1]
      China; Nighttime stable lights; Nitrogen oxides; Regression model; Remote sensing; Spatial analysis [1]
      Chloroplast, DNA replication, novobiocin, nalidixic acid, DNA gyrase [1]
      Chromium, Nodulation, Nitrogenase, Soybean [2]
      chronological lifespan, replicative lifespan, caloric restriction, calorie restriction, dietary restriction, glucose, mitochondria [1]
      Ciphers , Engines , Encryption , Timing , Throughput , Protocols [1]
      Cloud Computing, Slight Homomorphic Signature, Identity Attributes, Access Controlling Server, Boheh-Boyen Signature [1]
      Collected Sensing Data, VANETs, RD4, Role-Differentiated Cooperative Deceptive Data-Detection and Filtering [1]