×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of hiroshi-nakagawa
Problems in Technology to Use Anonymized Personal Data
406 views
Human cyclin D1 oncogene and esophageal squamous cell carcinoma
213 views
ChemInform Abstract: A Concise Route to (-)-Kainic Acid
216 views
ChemInform Abstract: Stereocontrolled Approach to Acromelic Acids
218 views
Ubiquitin-mediated proteasomal degradation of ABC transporters: a new aspect of genetic polymorphisms and clinical impacts
212 views
Prolog program transformations and tree manipulation algorithms
215 views
Stereocontrolled approach to acromelic acids
218 views
Pulmonary Vein Isolation During Atrial Fibrillation: : Insight into the Mechanism of Pulmonary Vein Firing
214 views
Safeguards against acute pancreatitis associated with endoscopic papillary balloon dilatation
213 views
Hydration-coupled protein boson peak measured by incoherent neutron scattering
217 views
Identification of two biologically crucial hydroxyl groups of (−)-epigallocatechin gallate in osteoclast culture
215 views
Expression of vascular endothelial growth factor by photodynamic therapy with mono-l-aspartyl chlorin e6 (NPe6) in oral squamous cell carcinoma
212 views
Use of a 3-dimensional electroanatomical mapping system for catheter ablation of macroreentrant right atrial tachycardia following atriotomy
214 views
Detection of freeze-injured Escherichia coli O157:H7 cells from foods by resuscitation prior to selective enrichment
212 views
705-5 Comparison of Radiofrequency Lesions in the Canine Left Ventricle Using a Saline Irrigated Electrode Versus Temperature Control
212 views
The T cell factor (TCF)-B-catenin complex is present in nuclei but paradoxically transcriptionally inactive in esophageal cancer
213 views
Identification of novel Egfr downstream target molecules in esophageal carcinogenesis
214 views
Privacy Protectin Models and Defamation caused by k-anonymity
401 views
Boundary Between Pseudonymity and Anonymity
496 views
Privacy Protection Technologies: Introductory Overview
291 views
Next >