A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is
Summa Rf 450 Joseph Lerch kunst Maller in Leutschau mit dank richtig bezahlet Joseph Lerch mp." ... Gyakran élénk levelezés vagy megbeszélések készítették elő az iratot, ezért abból olykor éppen a -szá- A SZOBAFESTŐ SZERZŐDÉSE FABRICIUS JAKAB IGNÁC EDELÉNYBEN (1780), JOHANN BINNERTH ÉS JOSEPH LERCH ...doi:10.1556/080.2015.64.1.10 fatcat:nfim3vxsjvhlnd2gvd7uyzwjxq
The present paper attempts to reveal the ways in which medical knowledge was produced and communicated on the example of crude oil exploration by a Prussian physician in Russian service, Johann Jacob Lerche ... Crude oil was one of the most remarkable mineral wonders of the Pre-Caspian region which Lerche visited twice (1732)(1733)(1734)(1735)(1745)(1746)(1747). ... Laudan, op. cit., Johann Jacob Lerche, p. 42. (black/white) and natural gas. ...doi:10.4467/0023589xkhnt.20.010.11991 fatcat:jbfs7rnn4fa33fgyelwpqpysl4
Standard-Nutzungsbedingungen: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Zwecken und zum Privatgebrauch gespeichert und kopiert werden. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich machen, vertreiben oder anderweitig nutzen. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, gelten abweichend von diesendoi:10.1080/09645292.2017.1305329 fatcat:bqvc3o3xlbb3jbpgictczt36re
more »... bedingungen die in der dort genannten Lizenz gewährten Nutzungsrechte. Abstract This paper studies the determinants of academic success using a unique administrative data set of a German university. We show that high school grades are strongly associated with both graduation probabilities and final grades, whereas variables measuring social origin or income have only a smaller impact. Moreover, the link between high school performance and university success is shown to vary substantially across faculties. In some fields of study, the probability of graduating is rather low, while grades are quite good conditional on high school performance. In others, weaker students have a greater chance of graduating, but grades are more differentiated.
The aim of the present study was to investigate the edema induced by leukotriene D., (LTD.). Edema is the gross effect of increased blood flow and capillary permeability. Our objective was to elucidate the effect of LTD. on edema generation without the influence of the concomitantly increased blood flow induced by this potent vasodilator. A new method was outlined measuring the exudation through skin windows of a macromolecular tracer ([ 13 'l]albumin) and a micromolecular tracer ([ 99doi:10.1111/1523-1747.ep12265527 pmid:3889168 fatcat:zjggktvk2bchvbucihllb7rmha
more »... hnetat). Exudation of [ 131 1]albumin is a function of enhanced vascular permeability and interstitial transport and blood flow, whereas that of [ 90 Tc) pertechnetat is mainly a function of blood flow. Thus a ratio of the 2 exudate measurements gives a specific estimate of the changes in vascular permeability and interstitial transport. Histamine was employed to establish the method. A doseresponse relation was found for histamine in the dose range of 10-• to 10-7 M . The effect of 10-5 M LTD. on vascular permeability and interstitial transport of macromolecules was indistinguishable from that of histamine in the same concentration. This property together with their well-known vasodilatory cap~bilities indicate that the leukotrienes of the slowreactmg substance of anaphylaxis may p lay a role in the vascular changes in the allergic-inflammatory reaction. Increased microvascular pe rmeability to proteins a nd edem a fo rmation a re som e o f the cardina l signs of a n inflammato ry r eactio n . When studying t he role of int1a mmato ry mediato rs t h e edema-ge nerating capability t herefore attracts considerable atte ntio n . The concept prevails, that int1 a mmato ry ede ma can be ge ne rated by 2 types o f m ediato rs: those that inc rease the permeabi lity of the vessels and those that potentiate this e~fec~ by in c reasing blood flow by capilla ry recrUitmen t [1,2]. It IS o! interest to sepa rate these two different prope rt ies. The purpose of t he present study was to investigate leukot riene D., (LTD") , o ne of t he newly discove red const itue nts of s lowreacting subs ta nce of a naphy laxis. LTD, has been s hown to cause wheal formatio n [3-5], a nd to be a potent vasodilator in t h e human s kin  . W e wis hed to e luc idate t he effect of this mediator o n t he vasc ul a r pe rmeability, sepa rate from its vasadilating/recruiting properti es. A new tec hnique was outlined for m easurements of exudation of m ac romo lecules ([' "'!] a lbumin) and mic romolecules ([ 99 T c] pertec hnetat) in humans, induced by an infla mmatory m edi a-M a nu sc ript received Augu st 7, 1984; accepted for publication Nove mber 5, 1984. * Presented at the J oint Intern ational Meeting of The Society for Investigative Dermatology, Inc. and the European Society for Dermato logical Research, Was hingto n, D.C., April 27-May 1, 1983. t Dr. Bisgaard is a research fellow of t he Danish Medical Research Co unciL Reprint requests to: Hans Bisgaa rd, M.D ., Vester S~gade 20, 6.tv, DK-1601 Copenhage n, Denmark . Abbreviations: L TD 4 : Jeuk otri ene D, PBS: 10% ph osphatebuffered saline solution, pH 7.4 427 tor. C hanges in the rat io of these 2 diffus ion-limited indicators in an exudate from a skin window would reflect the m ediato rinduced changes in the vascular permeability a nd the in te rstitial transport. MATERIALS AND METHODS Three men and nine women, aged 24-76 years, were studied. The fully informed volunteers were chose n from the patien ts in the dermatologic ward. The patients were suffering from condylomata acumin ata or stasis ulcers, but none had coll agenoses, vascu litis, endocrine diseases, ge neralized dermatoses, or atopic diseases. Local treatment, vasoactive medication, and steroids were excluded for at least 8 days prior to the investigation . Twelve specially des igned suction cups with a n aperture of 12 mm were placed on the abdominal skin. The development of blisters was foll owed closely through transparent cups. In order to prevent capillary lesions, t he cups were removed as soon as a blister formed over the wh ole aperture of the cup. Blisters developed within 3-4 h after exposure to a negative pressure of 140 mmHg. The tops of the blisters we re peeled off with sterile tweeze rs, leaving a glossy skin window, demarcated by the basa l laye r, and with no visible vascular lesions or pinpoin t capillaries. The skin windows were sealed with polyethylene domes with a hemisphere of 0.6 ml rising from an aperture of 16 mm . The top could be penetrated by a 30-gauge needle through a self-sealing T efl on membrane, thus ensuring totally in ert hydrophobic chambers. The chambers were attached to the skin with double-adhes ive tape and filled with a 10% phosphate-buffered saline solution, pH 7.4 , (PBS) . After the chambers had been left undisturbed for 1 h, a weighed amoun t of 15-20 11 Cu [ 13 1 l] albumin (Kjeller, Norway) and about 500 11Cu ['"'Tc]pertec hnetat (Am ersham) were injected into a cubital ve in. Subsequently, the chambers were emptied and refill ed wi th test solutions, as follows: In 11 perso ns , histamin e chloride (Sigma) was applied in molar co ncent rations of 10-', 10-•, 10-u, and 10-7 . In another 6 persons LTD, (kindly provided by J. Rokac h, Merck-Frosst Laboratories, Quebec) was applied in a co ncentration of w-• M (leuk otrienes were stored at -80"C until 1 h before use). PBS was used as a diluent as well as a co ntroL All tests were perform ed in dupli cate. After 30 min all chambers were emptied, followed by ge ntle wiping of the skin windows with absorption paper, which was counted together with the collected exudates in a liquid scint illation co un ter. T he skin windows were photographed and t he areas were calculated in duplicate from these photos, usin g a weighin g method. Throughout the trial the patients remained in a supine position. The thyroid uptake of radioactive iodine was blocked by potassium iodide, administered in a daily oral dose of 100 mg for 5 days. Statistical Analyses Wilcoxon's test for paired and unpaired differences and Pratt's test were used. The central tendency of the figures was expressed by the median values and the variation by the quartiles. RESULTS To ensure t hat free 13 1 I did not inva lidate the resu lts, t he ra dioactivity of the exudates from 2 subjects was measured before and afte r prote in precipi tation . The supe rnata n ts contained no detectable amounts of free 13 1 1. The noncolored samp les of blister fluid were a nalyzed by spectrophotometry, and n o m easura ble am ounts of hemoglobin we re detected. No measurable radioactivity was found in t he cha mbers before or a fte r t he investigatio n .
The oxygen evolution reaction (OER) through water oxidation is a key process for multiple energy storage technologies required for a sustainable energy economy such as the formation of the fuel hydrogen from water and electricity, or metal-air batteries. Herein, we investigate the suitability of Cu 2 FeSnS 4 for the OER and demonstrate its superiority over iron sulfide, iron (oxy) hydroxides and benchmark noble-metal catalysts in alkaline media. Electrodeposited Cu 2 FeSnS 4 yields the currentdoi:10.1002/cctc.201901705 fatcat:uqzxwmeeonherk52vabprq3eeq
more »... ensities of 10 and 1000 mA/cm 2 at overpotentials of merely 228 and 330 mV, respectively. State-of-the-art analytical methods are applied before and after electrocatalysis to uncover the fate of the Cu 2 FeSnS 4 precatalyst under OER conditions and to deduce structure-activity relationships. Cu 2 FeSnS 4 is the first compound reported for OER among the broad class of stannite structure type materials containing multiple members with highly active earth-abundant transition-metals for OER.
We revisit open string mirror symmetry for the elliptic curve, using matrix factorizations for describing D-branes on the B-model side. We show how flat coordinates can be intrinsically defined in the Landau-Ginzburg model, and derive the A-model partition function counting disk instantons that stretch between three D-branes. In mathematical terms, this amounts to computing the simplest Fukaya product m_2 from the LG mirror theory. In physics terms, this gives a systematic method fordoi:10.1088/1126-6708/2006/11/006 fatcat:enqoc4glcbb7fgkqxllfbg4e3m
more »... non-perturbative Yukawa couplings for intersecting brane configurations.
Today, every application uses software libraries. Yet, while a lot of research exists w.r.t. analyzing applications, research that targets the analysis of libraries independent of any application is scarce. This is unfortunate, because, for developers of libraries, such as the Java Development Kit (JDK), it is crucial to ensure that the library behaves as intended regardless of how it is used. To fill this gap, we discuss the construction of call graphs for libraries that abstract over alldoi:10.1145/2950290.2950312 dblp:conf/sigsoft/ReifEHLM16 fatcat:frluc7stzrg6hpdk5lkpbbrfpu
more »... tial library usages. Call graphs are particularly relevant as they are a precursor of many advanced analyses, such as inter-procedural data-flow analyses. We show that the current practice of using call graph algorithms designed for applications to analyze libraries leads to call graphs that, at the same time, lack relevant call edges and contain unnecessary edges. This motivates the need for call graph construction algorithms dedicated to libraries. Unlike algorithms for applications, call graph construction algorithms for libraries must take into consideration the goals of subsequent analyses. Specifically, we show that it is essential to distinguish between the scenario of an analysis for potential exploitable vulnerabilities from the scenario of an analysis for general software quality attributes, e.g., dead methods or unused fields. This distinction affects the decision about what constitutes the library-private implementation, which therefore, needs special treatment. Thus, building one call graph that satisfies all needs is not sensical. Overall, we observed that the proposed call graph algorithms reduce the number of call edges up to 30% when compared to existing approaches.
Over the past years, widely used platforms such as the Java Class Library have been under constant attack through vulnerabilities that involve a combination of two taint-analysis problems: an integrity problem allowing attackers to trigger sensitive operations within the platform, and a confidentiality problem allowing the attacker to retrieve sensitive information or pointers from the results of those operations. While existing static taint analyses are good at solving either of thosedoi:10.1145/2635868.2635878 dblp:conf/sigsoft/LerchHBM14 fatcat:rnqajudkcnb5rbwiisnaqwujoy
more »... we show that they scale prohibitively badly when being applied to situations that require the exploitation of both an integrity and confidentiality problem in combination. The main problem is the huge attack surface of libraries such as the Java Class Library, which exposes thousands of methods potentially controllable by an attacker. In this work we thus present FlowTwist, a novel taintanalysis approach that works inside-out, i.e., tracks data flows from potentially vulnerable calls to the outer level of the API which the attacker might control. This inside-out analysis requires a careful, context-sensitive coordination of both a backward and a forward taint analysis. In this work, we expose a design of the analysis approach based on the IFDS algorithm, and explain several extensions to IFDS that enable not only this coordination but also a helpful reporting of error situations to security analysts. Experiments with the Java Class Library show that, while a simple forward taint-analysis approach does not scale even with much machine power, FlowTwist's algorithm is able to fully analyze the library within 10 minutes.
Purpose: We aimed to gain insight into frequencies of genetic variants in genes implicated in neurodevelopmental disorder with epilepsy (NDD+E) by investigating large cohorts of patients in a diagnostic setting. Methods: We analyzed variants in NDD+E using epilepsy gene panel sequencing performed between 2013 and 2017 by two large diagnostic companies. We compared variant frequencies in 6,994 panels to other 8,588 recently published panels as well as exome-wide de novo variants in 1,942doi:10.1101/602524 fatcat:c4stfbkuwnb3plx5vm66bdey4i
more »... als with NDD+E and 10,937 controls. Results: Genes with highest frequencies of ultra-rare variants in NDD+E comprised SCN1A, KCNQ2, SCN2A, CDKL5, SCN8A and STXBP1, concordant with the two other epilepsy cohorts we investigated. Only 46% of the analysed 262 dominant and X-linked panel genes contained ultra-rare variants in patients. Among genes with contradictory evidence of association with epilepsy CACNB4, CLCN2, EFHC1, GABRD, MAGI2 and SRPX2 showed equal frequencies in cases and controls. Conclusion: We show that improvement of panel design increased diagnostic yield over time, but panels still display genes with low or no diagnostic yield. With our data, we hope to improve current diagnostic NDD+E panel design and provide a resource of ultrarare variants in individuals with NDD+E to the community.
Copyright © 2018 Dahl, Woodworth, Lerche, Cramer, Nielsen, Moser, Thomsen, Borregaard and Cowland. ...doi:10.3389/fimmu.2018.02717 fatcat:bpzzfm4cvjba3ns5p6exrx7s54
An established way to steal the income of app developers, or to trick users into installing malware, is the creation of repackaged apps. These are clones of -typically -successful apps. To conceal their nature, they are often obfuscated by their creators. But, given that it is a common best practice to obfuscate apps, a trivial identification of repackaged apps is not possible. The problem is further intensified by the prevalent usage of libraries. In many apps, the size of the overall codedoi:10.1145/3106237.3106305 dblp:conf/sigsoft/GlanzAERHLM17 fatcat:dnjfenp7zza33pqbs2y7am66y4
more »... is basically determined by the used libraries. Therefore, two apps, where the obfuscated code bases are very similar, do not have to be repackages of each other. To reliably detect repackaged apps, we propose a two step approach which first focuses on the identification and removal of the library code in obfuscated apps. This approach -LibDetectrelies on code representations which abstract over several parts of the underlying bytecode to be resilient against certain obfuscation techniques. Using this approach, we are able to identify on average 70% more used libraries per app than previous approaches. After the removal of an app's library code, we then fuzzy hash the most abstract representation of the remaining app code to ensure that we can identify repackaged apps even if very advanced obfuscation techniques are used. This makes it possible to identify repackaged apps. Using our approach, we found that ≈ 15% of all apps in Android app stores are repackages.
Lerche KG, Berlin, and was used as received. ...doi:10.1002/ppsc.202000108 fatcat:rhtkqwh5k5csrcee52nvnsuole
The development of efficient data flow analyses is a complicated task. As requirements change and special cases have to be considered, implementations may get hard to maintain, test and reuse. We propose to design these analyses regarding the principle of separation of concerns. Therefore, in this paper we present a reference design for data flow analyses in the context of the IFDS/IDE algorithm. We conducted a case study in order to inspect the level of reuse that can be achieved with ourdoi:10.1145/2771284.2771289 dblp:conf/pldi/LerchH15 fatcat:jkel22utvvg7lotig7zdut6ena
more »... n and found it to be helpful for the efficient development of new analyses.
This work was supported by grants of the Deutsche Forschungsgemeinschaft (SFB 665 to Markus Schuelke, Robert Nitsch, Dietmar Schmitz; SFB 1080 to Robert Nitsch and Johannes Vogt, and SFB 1193 CONFLICT ... to Johannes Vogt), the European Research Council (ERC-AG "LiPsyD" to Robert Nitsch), the Stiftung Charité, and the NeuroCure Cluster of Excellence of the DFG (Exc 257) to Tatiana Korotkova, Alexey Ponomarenko ...doi:10.1101/282871 fatcat:ocon6evstveotorpg4j32ui26a
« Previous Showing results 1 — 15 out of 1,558 results