Author of the publication

Building a new conceptual framework for receptor heteromers

, , , , , , , , , , , , , , , , , and . Nat Chem Biol, 5 (3): 131-4 (March 2009)Ferre, Sergi Baler, Ruben Bouvier, Michel Caron, Marc G Devi, Lakshmi A Durroux, Thierry Fuxe, Kjell George, Susan R Javitch, Jonathan A Lohse, Martin J Mackie, Ken Milligan, Graeme Pfleger, Kevin D G Pin, Jean-Philippe Volkow, Nora D Waldhoer, Maria Woods, Amina S Franco, Rafael Research Support, N.I.H., Extramural United States Nature chemical biology Nat Chem Biol. 2009 Mar;5(3):131-4..

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building a new conceptual framework for receptor heteromers, , , , , , , , , and 8 other author(s). Nat Chem Biol, 5 (3): 131-4 (March 2009)Ferre, Sergi Baler, Ruben Bouvier, Michel Caron, Marc G Devi, Lakshmi A Durroux, Thierry Fuxe, Kjell George, Susan R Javitch, Jonathan A Lohse, Martin J Mackie, Ken Milligan, Graeme Pfleger, Kevin D G Pin, Jean-Philippe Volkow, Nora D Waldhoer, Maria Woods, Amina S Franco, Rafael Research Support, N.I.H., Extramural United States Nature chemical biology Nat Chem Biol. 2009 Mar;5(3):131-4..Gender Impact on Information Security in the Arab World., and . ICGS3, volume 534 of Communications in Computer and Information Science, page 200-207. Springer, (2015)The threats of social networking: Old wine in new bottles?, , and . Inf. Secur. Tech. Rep., 16 (2): 38-43 (2011)Competence measure in social networks., and . ICCST, page 1-6. IEEE, (2017)Estimating the Number of Defects at a WWW Site., , and . WebNet, page 377-381. AACE, (1999)Web Centric Education - a Challenge for Process Redesign., , and . WebNet, page 372-376. AACE, (1999)BulB - Visualising Bulletin Board Activity., , , , , and . ICEIS (4), page 31-35. (2004)An Approach to Textual Steganography., and . ICGS3, volume 92 of Communications in Computer and Information Science, page 48-54. Springer, (2010)From ZeuS to Zitmo: Trends in Banking Malware., , and . TrustCom/BigDataSE/ISPA (1), page 1386-1391. IEEE, (2015)Serving Enhanced Hypermedia Information., , and . ECIR, volume 2291 of Lecture Notes in Computer Science, page 86-92. Springer, (2002)