Author of the publication

Building a new conceptual framework for receptor heteromers

, , , , , , , , , , , , , , , , , and . Nat Chem Biol, 5 (3): 131-4 (March 2009)Ferre, Sergi Baler, Ruben Bouvier, Michel Caron, Marc G Devi, Lakshmi A Durroux, Thierry Fuxe, Kjell George, Susan R Javitch, Jonathan A Lohse, Martin J Mackie, Ken Milligan, Graeme Pfleger, Kevin D G Pin, Jean-Philippe Volkow, Nora D Waldhoer, Maria Woods, Amina S Franco, Rafael Research Support, N.I.H., Extramural United States Nature chemical biology Nat Chem Biol. 2009 Mar;5(3):131-4..

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building a new conceptual framework for receptor heteromers, , , , , , , , , and 8 other author(s). Nat Chem Biol, 5 (3): 131-4 (March 2009)Ferre, Sergi Baler, Ruben Bouvier, Michel Caron, Marc G Devi, Lakshmi A Durroux, Thierry Fuxe, Kjell George, Susan R Javitch, Jonathan A Lohse, Martin J Mackie, Ken Milligan, Graeme Pfleger, Kevin D G Pin, Jean-Philippe Volkow, Nora D Waldhoer, Maria Woods, Amina S Franco, Rafael Research Support, N.I.H., Extramural United States Nature chemical biology Nat Chem Biol. 2009 Mar;5(3):131-4..The threats of social networking: Old wine in new bottles?, , and . Inf. Secur. Tech. Rep., 16 (2): 38-43 (2011)Gender Impact on Information Security in the Arab World., and . ICGS3, volume 534 of Communications in Computer and Information Science, page 200-207. Springer, (2015)Competence measure in social networks., and . ICCST, page 1-6. IEEE, (2017)Estimating the Number of Defects at a WWW Site., , and . WebNet, page 377-381. AACE, (1999)A Conceptual Model to Predict Social Engineering Victims., and . ICGS3, IEEE, (2019)Second-Language Help for Windows Applications., , and . BCS HCI, page 129-138. Springer, (1996)Genre-Based Information Hiding., and . ICGS3/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 104-111. Springer, (2011)It's not Greek to me: terminology and the second language problem., and . ACM SIGCHI Bull., 31 (2): 17-24 (1999)Contact centres and identity theft., and . Int. J. Electron. Secur. Digit. Forensics, 2 (1): 92-100 (2009)