3 resultados para PROX

em Queensland University of Technology - ePrints Archive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Blood vascular cells and lymphatic endothelial cells (BECs and LECs, respectively) form two separate vascular systems and are functionally distinct cell types or lineages with characteristic gene expression profiles. Interconversion between these cell types has not been reported. Here, we show that in conventional in vitro angiogenesis assays, human BECs of fetal or adult origin show altered gene expression that is indicative of transition to a lymphatic-like phenotype. This change occurs in BECs undergoing tubulogenesis in fibrin, collagen or Matrigel assays, but is independent of tube formation per se, because it is not inhibited by a metalloproteinase inhibitor that blocks tubulogenesis. It is also reversible, since cells removed from 3D tubules revert to a BEC expression profile upon monolayer culture. Induction of the lymphatic-like phenotype is partially inhibited by co-culture of HUVECs with perivascular cells. These data reveal an unexpected plasticity in endothelial phenotype, which is regulated by contact with the ECM environment and/or cues from supporting cells.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Australasian Information Security Conference (AISC) 2011 was held on 18th-19th January 2011 in Perth, Australia, as a part of the Australasian Computer Science Week 2011. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for Australasian and other researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Australasian Information Security Conference (AISC) 2012 was held at RMIT University in Melbourne, Australia, as a part of the Australasian Computer Science Week, January 30 - February 3, 2012. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.