1 We employed a Bayesian phylogeography approach to characteriz
2 In study 2,
we employed a big data approach to explore the time course of
3 Here,
we employed a combination of behavioral, molecular and comput
4 As scaffold,
we employed a double-stranded DNA rotaxane for its ability to
5 populations without substantially altering cell phenotypes,
we employed a fluorescence activated cell sorting method to i
6 In this study,
we employed a gene-centered approach utilizing the yeast one-
7 gulatory networks that control this differentiation switch,
we employed a high-throughput microfluidic imaging system tha
8 In this study,
we employed a hybrid diffuse optical system consisting of dif
9 We employed a mathematical model to reveal the penetration de
10 We employed a murine model of influenza infection to identify
11 orylation of guide strands correlating with gene knockdown,
we employed a peptide-nucleic acid (PNA) hybridization assay.
12 We employed a phage-displayed ubiquitin variant (UbV) library
13 ness of factors in initiating PIWI-directed gene silencing,
we employed a Piwi-interacting RNA (piRNA)-targeted reporter
14 To unravel this puzzle,
we employed a poly(A) tag sequencing protocol and uncovered a
15 We employed a two-component strategy, allowing peptide and li
16 We employed a within-session behavioral-economic (BE) procedu
17 We employed affinity purification and immunoblotting to valid
18 In this study,
we employed an adapted change detection paradigm to investiga
19 We employed an established observe/imitate task of emotional
20 In this study,
we employed an integrated approach that combines computationa
21 Here,
we employed an integrative strategy for the repositioning of
22 Here
we employed backscattering interferometry (BSI), a free-solut
23 We employed ChIP-seq and 4sU-RNA-seq to identify aberrant DNA
24 We employed ChIP-sequencing for H3K4me3 to examine effects of
25 We employed coarse-grained Langevin dynamics simulations to m
26 We employed data from a sucrose injection experiment in the B
27 In this study,
we employed data from ChEMBL20 to examine the evolution of sc
28 In this study,
we employed explorative mass spectrometry to profile proteome
29 Here,
we employed fluorescence resonance energy transfer (FRET)-bas
30 Herein,
we employed fluorescently labeled alpha-syn preformed fibrils
31 To prove the concept,
we employed free energy perturbation (FEP) coupled with lambd
32 Here,
we employed high-resolution confocal microscopy to analyze nu
33 d BRG1 subunit of the SWI/SNF chromatin remodeling complex,
we employed in vitro models of melanocyte differentiation in
34 We employed infrared spectro-electrochemistry and site-select
35 Here
we employed iterative deletion mapping to elucidate how the N
36 Here,
we employed laboratory experiments to measure the influence o
37 We employed molecular cloning to examine how PTEN's stability
38 neurodegeneration and loss of brain mass in the cKO cortex,
we employed mRNA sequencing (mRNA-Seq), immunohistochemistry,
39 Here,
we employed multiscale analyses to identify and characterize
40 Here
we employed neuroanatomical tracers to map projections from t
41 In task 2,
we employed pictures of partially exposed snakes, lizards, an
42 We employed quantitative proteomics to characterize Hat1-depe
43 Here,
we employed quantitative proteomics to profile protein expres
44 As our first proof-of-principle
we employed the bacterial chemotaxis protein CheY as our rece
45 In this study,
we employed the next generation high-throughput deep sequenci
46 both in virulence activating and non-activating conditions,
we employed the ScanLag methodology.
47 To clarify these discrepancies,
we employed the technology of direct electron counting to obt
48 In both contests,
we employed the tyrosine-protein kinase Yes as an example tar
49 escribed somatic variants in vascular overgrowth syndromes,
we employed tumor genetic profiling via high-depth next-gener
50 te sexual reproduction in U. botrytis, under the conditions
we employed,
while the reciprocal heterologous complementatio