Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Trojan horses

The efficiency of inactivation by covalent bond formation vs release of the reactive species into solution has been described by its partition ratio. The most efficient inactivators have catalytic partition ratios of 0, in which case each inhibitor molecule leads to inactivation of the enzyme. To this date, many of these inhibitors have been designed, and alternative names like suicide substrate, Trojan Horse inactivator, enzyme induced inactivator, inhibitor, and latent inactivator have been used for this class of inhibitors. A number of comprehensive reviews are available (26—32). [Pg.322]

Parada CA, Roeder RG (1996) Enhanced processivity of RNA polymerase II triggered by Tat-induced phosphorylation of its carboxy-terminal domain. Nature 384(6607) 375-378 Peluso R, Haase A, Stowring L, Edwards M, Ventura P (1985) A Trojan Horse mechanism for the spread of visna virus in monocytes. Virology 147(1) 231-236 Peng G, Greenwell-Wild T, Nares S, Jin W, Lei KJ, Rangel ZG, Munson PJ, Wahl SM (2007) Myeloid differentiation and susceptibility to HIV-1 are linked to APOBEC3 expression. Blood 110(l) 393-400... [Pg.115]

Bangham, A. D., Surrogate cells or Trojan horses, BioEssays 1081-1088 (1995). [Pg.280]

Among a number of indirect methods which have been suggested for nuclear astrophysics applications the Trojan Horse Method (THM) is particularly suitable in the case of (p,a), (n,a),(n,p) reactions. In the following we will not discuss in details the method, so we refer to [3] for further details. [Pg.171]

Sontag, E. Protein phosphatase 2A the Trojan Horse of cellular signaling. Cell Signal. 13 7-16, 2001. [Pg.412]

Hajjar, D.P., and Haberland, M.E., 1997, lipoprotein trafficking in vascular cells. Molecular Trojan horses and cellular saboteurs, JBiol Chem. 272 22975-229778. [Pg.144]

Heterogeneous Catalysts for Liquid-Phase Oxidations Philosophers Stones or Trojan Horses R.A. Sheldon, et al. Acc. Chem. Res. 1998,31,485. [Pg.268]

Budzikiewicz H (2001) Siderophore-Antibiotic Conjugates used as Trojan Horses against Pseudomonas aeruginosa. Curr Top Med Chem 1 73... [Pg.56]

Two distinct approaches can be envisioned in the development of siderophore-drug conjugates. A strategy of drug delivery utilizing the pathogen s own iron-transport system to act as a delivery system has been referred to as the Trojan Horse approach. Examples in which sulfonamides 194 , penicillins, cephalosporins and other antibiotics attached to DFO which exhibit antibacterial activity were reported. [Pg.801]

In effect, antimalarial trojan horse drugs of this type should deliver a double blow to the parasite by exploiting the presence of high concentrations of ferrous ion present in the parasite food vacuole as the trigger for protease inhibitor release. In model studies with prototype 81d, in the presence of ferrous ions, these systems readily degrade to produce the desired chalcone (82b, R = H, in 45% yield from 81d), in tandem with secondary carbon-centred radical 82a (Scheme 29). Furthermore, analogues 81d-f have superior in vitro antimalarial activity to that of arteflene (<25 nM in vitro versus Plasmodium falciparum, arteflene >50 nM). The other product obtained is the diol (82c), a product of two-electron reduction of the endoperoxide bridge. [Pg.1323]

Curing African Sleeping Sickness with a Biochemical Trojan Horse... [Pg.862]

First, the protein itself can be infused directly into the cerebrospinal fluid or implanted in a biodegradable, slow-release preparation. Second, the active protein can travel across the blood-brain barrier by hiding inside a Trojan horse molecule... [Pg.120]

An attractive strategy to improve CNS drug delivery is to link a nontransportable drug with a vector to the BBB. These moieties can work as molecular Trojan horses to transport across the BBB attached proteins, DNA molecules, and drug micro- and nanocarriers facilitating their penetration through the BBB. The choice of a vector moiety and a type of a linker is crucial for the success of this method of drug delivery. [Pg.596]

Sheldon, R.A., Wallau, M., Arends, I.W.C.E. and Schuchardt, U. (1998) Heterogeneous catalysts for liquid-phase oxidations philosophers stones or Trojan horses Acc. Chem. Res., 31, 485. [Pg.124]

IT security must be far sighted. The nature of computer networking makes threats at a distance into potential threats near by. Some threats propagate exponentially, a virus for example. Others are broadcast, software product and patch errors for example. And others travel at a more sporadic unpredictable pace, Trojan horses and worms for example. For networked systems, IT security must address threats from every system connected to or ever connected to the system by any means. [Pg.28]


See other pages where Trojan horses is mentioned: [Pg.911]    [Pg.911]    [Pg.447]    [Pg.650]    [Pg.875]    [Pg.96]    [Pg.239]    [Pg.345]    [Pg.295]    [Pg.253]    [Pg.75]    [Pg.439]    [Pg.237]    [Pg.348]    [Pg.363]    [Pg.117]    [Pg.208]    [Pg.607]    [Pg.140]    [Pg.167]    [Pg.292]    [Pg.3]    [Pg.48]    [Pg.157]    [Pg.353]    [Pg.918]    [Pg.478]    [Pg.602]   
See also in sourсe #XX -- [ Pg.48 ]

See also in sourсe #XX -- [ Pg.179 ]

See also in sourсe #XX -- [ Pg.1292 ]




SEARCH



Horse

Trojan

Trojan horse effect

Trojan horse inactivators

Trojan horse inhibitors—

Trojan horse strategy

© 2024 chempedia.info