scispace - formally typeset
Search or ask a question
Author

Chris J. Mitchell

Bio: Chris J. Mitchell is an academic researcher from Royal Holloway, University of London. The author has contributed to research in topics: Authentication & Cryptography. The author has an hindex of 48, co-authored 397 publications receiving 10982 citations. Previous affiliations of Chris J. Mitchell include Johns Hopkins University & University of Portland.


Papers
More filters
Journal ArticleDOI
TL;DR: Three eyeblink conditioning experiments investigated whether the linear trend in eyeblink CRs in the Perruchet effect is a result of changes in associative strength of the conditioned stimulus, US sensitization, or learning the precise timing of the US.
Abstract: P. Perruchet (1985b) showed a double dissociation of conditioned responses (CRs) and expectancy for an airpuff unconditioned stimulus (US) in a 50% partial reinforcement schedule in human eyeblink conditioning. In the Perruchet effect, participants show an increase in CRs and a concurrent decrease in expectancy for the airpuff across runs of reinforced trials; conversely, participants show a decrease in CRs and a concurrent increase in expectancy for the airpuff across runs of nonreinforced trials. Three eyeblink conditioning experiments investigated whether the linear trend in eyeblink CRs in the Perruchet effect is a result of changes in associative strength of the conditioned stimulus (CS), US sensitization, or learning the precise timing of the US. Experiments 1 and 2 demonstrated that the linear trend in eyeblink CRs is not the result of US sensitization. Experiment 3 showed that the linear trend in eyeblink CRs is present with both a fixed and a variable CS–US interval and so is not the result of learning the precise timing of the US. The results are difficult to reconcile with a single learning process model of associative learning in which expectancy mediates CRs.

31 citations

Journal ArticleDOI
TL;DR: Members of the serine/threonine PKC (protein kinase C) family perform diverse functions in multiple cell types, as well as regulation of secretion in response to glucose and muscarinic receptor agonists.
Abstract: Members of the serine/threonine PKC (protein kinase C) family perform diverse functions in multiple cell types. All members of the family are activated in signalling cascades triggered by occupation of cell surface receptors, but the cPKC (conventional PKC) and nPKC (novel PKC) isoforms are also responsive to fatty acid metabolites. PKC isoforms are involved in various aspects of pancreatic beta-cell function, including cell proliferation, differentiation and death, as well as regulation of secretion in response to glucose and muscarinic receptor agonists. Recently, the nPKC isoform, PKCepsilon, has also been implicated in the loss of insulin secretory responsiveness that underpins the development of Type 2 diabetes.

31 citations

Journal ArticleDOI
TL;DR: Self-reported shock expectancies and skin conductance responses were consistent with blocking of learning of the instrumental contingency by prior training of the Pavlovian contingency, and vice versa, supporting the idea that a common learning mechanism underlies both Pavlovians and instrumental conditioning.

30 citations

01 Jan 1992
TL;DR: Possible coding and scanning methods for two-dimensional position-sensing are reviewed and encoding schemes for one type of scanning method, namely ‘Window-scanning’, are examined in some detail.
Abstract: Possible coding and scanning methods for two-dimensional position-sensing are reviewed. Encoding schemes for one type of scanning method, namely ‘Window-scanning’, are examined in some detail.

30 citations

Journal ArticleDOI
TL;DR: The authors examined the effect of negative priming on affective judgement and concluded that decreased processing fluency decreases liking of previously ignored stimuli. But, they did not examine the effects of negative pruning on the affective judgment.
Abstract: The mere exposure effect is the commonly observed increase in pleasantness ratings of stimuli that have been given prior exposure. According to the fluency attribution account of the mere exposure effect, repeated presentations of a stimulus lead to increased ease of processing, which in turn is attributed to pleasantness. If so, processing fluency manipulated by means other than repetition should influence liking. In the present experiment, processing fluency was manipulated using a negative priming procedure, and its influence on affective judgement was examined. Previously ignored stimuli were responded to slower (negative priming) and were rated as less pleasant than controls. It was concluded that decreased processing fluency decreases liking of previously ignored stimuli.

30 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

28 Jul 2005
TL;DR: PfPMP1)与感染红细胞、树突状组胞以及胎盘的单个或多个受体作用,在黏附及免疫逃避中起关键的作�ly.
Abstract: 抗原变异可使得多种致病微生物易于逃避宿主免疫应答。表达在感染红细胞表面的恶性疟原虫红细胞表面蛋白1(PfPMP1)与感染红细胞、内皮细胞、树突状细胞以及胎盘的单个或多个受体作用,在黏附及免疫逃避中起关键的作用。每个单倍体基因组var基因家族编码约60种成员,通过启动转录不同的var基因变异体为抗原变异提供了分子基础。

18,940 citations

Book
01 Jan 1996
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Abstract: From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper.

13,597 citations

Journal ArticleDOI
23 Jan 2015-Science
TL;DR: In this paper, a map of the human tissue proteome based on an integrated omics approach that involves quantitative transcriptomics at the tissue and organ level, combined with tissue microarray-based immunohistochemistry, to achieve spatial localization of proteins down to the single-cell level.
Abstract: Resolving the molecular details of proteome variation in the different tissues and organs of the human body will greatly increase our knowledge of human biology and disease. Here, we present a map of the human tissue proteome based on an integrated omics approach that involves quantitative transcriptomics at the tissue and organ level, combined with tissue microarray-based immunohistochemistry, to achieve spatial localization of proteins down to the single-cell level. Our tissue-based analysis detected more than 90% of the putative protein-coding genes. We used this approach to explore the human secretome, the membrane proteome, the druggable proteome, the cancer proteome, and the metabolic functions in 32 different tissues and organs. All the data are integrated in an interactive Web-based database that allows exploration of individual proteins, as well as navigation of global expression patterns, in all major tissues and organs in the human body.

9,745 citations

Book ChapterDOI
15 Aug 1999
TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Abstract: Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. We also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.

6,757 citations