scispace - formally typeset
Search or ask a question
Author

Chris J. Mitchell

Bio: Chris J. Mitchell is an academic researcher from Royal Holloway, University of London. The author has contributed to research in topics: Authentication & Cryptography. The author has an hindex of 48, co-authored 397 publications receiving 10982 citations. Previous affiliations of Chris J. Mitchell include Johns Hopkins University & University of Portland.


Papers
More filters
Journal ArticleDOI
29 May 2014-Nature
TL;DR: A draft map of the human proteome is presented using high-resolution Fourier-transform mass spectrometry to discover a number of novel protein-coding regions, which includes translated pseudogenes, non-c coding RNAs and upstream open reading frames.
Abstract: The availability of human genome sequence has transformed biomedical research over the past decade. However, an equivalent map for the human proteome with direct measurements of proteins and peptides does not exist yet. Here we present a draft map of the human proteome using high-resolution Fourier-transform mass spectrometry. In-depth proteomic profiling of 30 histologically normal human samples, including 17 adult tissues, 7 fetal tissues and 6 purified primary haematopoietic cells, resulted in identification of proteins encoded by 17,294 genes accounting for approximately 84% of the total annotated protein-coding genes in humans. A unique and comprehensive strategy for proteogenomic analysis enabled us to discover a number of novel protein-coding regions, which includes translated pseudogenes, non-coding RNAs and upstream open reading frames. This large human proteome catalogue (available as an interactive web-based resource at http://www.humanproteomemap.org) will complement available human genome and transcriptome data to accelerate biomedical research in health and disease.

1,965 citations

Journal ArticleDOI
TL;DR: It is argued that this new conceptual framework allows many of the important recent advances in associative learning research to be retained, but recast in a model that provides a firmer foundation for both immediate application and future research.
Abstract: The past 50 years have seen an accumulation of evidence suggesting that associative learning depends on high-level cognitive processes that give rise to propositional knowledge. Yet, many learning theorists maintain a belief in a learning mechanism in which links between mental representations are formed automatically. We characterize and highlight the differences between the propositional and link approaches, and review the relevant empirical evidence. We conclude that learning is the consequence of propositional reasoning processes that cooperate with the unconscious processes involved in memory retrieval and perception. We argue that this new conceptual framework allows many of the important recent advances in associative learning research to be retained, but recast in a model that provides a firmer foundation for both immediate application and future research.

685 citations

Book
01 Jan 2000
TL;DR: The importance of seasonal climate variability and seasonal forecasting to the Australian economy has been discussed in this paper, where seasonal climate forecasting has been used to forecast dryland crops in northern Australia.
Abstract: Contributors. Preface. Section I: Introduction. 1. The importance of climate variability and seasonal forecasting to the Australian economy B. White. 2. The relevance of seasonal climate forecasting to a rural producer S. Plant. 3. Understanding and predicting the world's climate system M. Cane. 4. A general systems approach to applying seasonal climate forecasts G. Hammer. Section II: Seasonal Climate Forecasting. 5. The development and delivery of current seasonal climate forecasting capabilities in Australia R. Stone, G. de Hoedt. 6. The potential for improved statistical seasonal climate forecasts W. Drosdowsky, R. Allan. 7. Global climatic models and their potential for seasonal climatic forecasting B. Hunt, A.C. Hirst. 8. Operational experience with climate model predictions N. Nicholls, et al. 9. Stochastic down-scaling of general circulation model simulations B. Bates, et al. 10. Statistical methods for deriving seasonal climate forecasts from GCM's R. Stone, et al. Section III: Farm Scale Agricultural Decisions. 11. Using seasonal climate forecasts to manage dryland crops in northern Australia - Experiences from the 1997/98 seasons H. Meinke, Z. Hochman. 12. The potential value of seasonal climate forecasting in managing cropping systems P. Carberry, et al. 13. Comparing the value of seasonal climate forecasting systems in managing cropping systems G. Hammer, et al. 14. Managing climatic variability in Queensland's grazing lands -- New approaches P. Johnston,et al. 15. Simulation of grazing strategies for beef production in north-east Queensland G. McKeon, et al. 16. Managing climate variability in grazing enterprises: A Case study for Dalrymple shire, north-eastern Australia A. Ash, et al. 17. Seasonal climate forecasting and the management of rangelands: Do production benefits translate into enterprise profits? M.S. Smith, et al. 18. Building knowledge and skills to use seasonal climate forecasts in property management planning J. Clewett, et al. 19. Opoortunities to improve the use of seasonal climate forecasts N. Nicholls. Section IV: Regional and National Scale Agricultural Decisions. 20. Aussie GRASS: Australian grassland and rangeland assessment by spatial simulation J. Carter, et al. 21. Using seasonal climate forecasts in forecasting the Australian wheat crop D. Stephens, et al. 22. Can seasonal climate forecasts predict movements in grain prices? S. Chapman, et al. Section V: Natural Systems. 23. Climate variability, seasonal forecasting and invertebrate pests -- The need for a synoptic view R. Sutherst. 24. ENSO regulation of Indo-Pacific green turtle populations C. Limpus, N. Nicholls. 25. Streamflow variability, seasonal forecasting and water resources systems F. Chiew, et al. 26. The effect of climate on the incidence of vector-borne viral diseases in Australia: The potential value of seasonal forecasting J. Mackenzie, et al. Section VI: Synthesis. 27. Applying seasonal climate forecasts in agricultural and natural ecosystems -- a synthesis

299 citations

Proceedings ArticleDOI
31 Mar 2008
TL;DR: This paper proposes a new authentication protocol which provides the identified privacy and security features and is also efficient and shows that it requires less tag-side storage and computation than other similarly structured RFID protocols.
Abstract: In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy and security features and is also efficient. The new protocol resists tag information leakage, tag location tracking, replay attacks, denial of service attacks, backward traceability, forward traceability (under an assumption), and server impersonation (also under an assumption). We also show that it requires less tag-side storage and computation than other similarly structured RFID protocols.

255 citations

Book ChapterDOI
09 Jul 2003
TL;DR: A taxonomy of SSO approaches is presented and some of the SSO schemes, services and products into that context enables decisions about the design and selection of future approaches to SSO to be made within a more structured context and reveals some important differences in the security properties that can be provided by various approaches.
Abstract: At present, network users have to manage one set of authentication credentials (usually a username/password pair) for every service with which they are registered Single Sign-On (SSO) has been proposed as a solution to the usability, security and management implications of this situation Under SSO, users authenticate themselves only once and are logged into the services they subsequently use without further manual interaction Several architectures for SSO have been developed, each with different properties and underlying infrastructures This paper presents a taxonomy of these approaches and puts some of the SSO schemes, services and products into that context This enables decisions about the design and selection of future approaches to SSO to be made within a more structured context; it also reveals some important differences in the security properties that can be provided by various approaches

233 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

28 Jul 2005
TL;DR: PfPMP1)与感染红细胞、树突状组胞以及胎盘的单个或多个受体作用,在黏附及免疫逃避中起关键的作�ly.
Abstract: 抗原变异可使得多种致病微生物易于逃避宿主免疫应答。表达在感染红细胞表面的恶性疟原虫红细胞表面蛋白1(PfPMP1)与感染红细胞、内皮细胞、树突状细胞以及胎盘的单个或多个受体作用,在黏附及免疫逃避中起关键的作用。每个单倍体基因组var基因家族编码约60种成员,通过启动转录不同的var基因变异体为抗原变异提供了分子基础。

18,940 citations

Book
01 Jan 1996
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Abstract: From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper.

13,597 citations

Journal ArticleDOI
23 Jan 2015-Science
TL;DR: In this paper, a map of the human tissue proteome based on an integrated omics approach that involves quantitative transcriptomics at the tissue and organ level, combined with tissue microarray-based immunohistochemistry, to achieve spatial localization of proteins down to the single-cell level.
Abstract: Resolving the molecular details of proteome variation in the different tissues and organs of the human body will greatly increase our knowledge of human biology and disease. Here, we present a map of the human tissue proteome based on an integrated omics approach that involves quantitative transcriptomics at the tissue and organ level, combined with tissue microarray-based immunohistochemistry, to achieve spatial localization of proteins down to the single-cell level. Our tissue-based analysis detected more than 90% of the putative protein-coding genes. We used this approach to explore the human secretome, the membrane proteome, the druggable proteome, the cancer proteome, and the metabolic functions in 32 different tissues and organs. All the data are integrated in an interactive Web-based database that allows exploration of individual proteins, as well as navigation of global expression patterns, in all major tissues and organs in the human body.

9,745 citations

Book ChapterDOI
15 Aug 1999
TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Abstract: Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. We also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.

6,757 citations