Protection against infarction afforded by preconditioning is mediated by A1 adenosine receptors in rabbit heart.
…, J Thornton, DM Van Winkle, AW Stanley, RA Olsson… - Circulation, 1991 - Am Heart Assoc
BACKGROUND Preconditioning (5 minutes of ischemia followed by 10 minutes of recovery)
renders the heart very resistant to infarction from subsequent ischemia. This study tests …
renders the heart very resistant to infarction from subsequent ischemia. This study tests …
Cardiovascular purinoceptors
RA Olsson, JD Pearson - Physiological reviews, 1990 - journals.physiology.org
It is now 75 years since the first recorded administration of adenosine to humans (1310) and
60 years since the first description, by Drury and Szent-Gyorgyi (356), of the actions of …
60 years since the first description, by Drury and Szent-Gyorgyi (356), of the actions of …
Intravenous pretreatment with A1-selective adenosine analogues protects the heart against infarction.
JD Thornton, GS Liu, RA Olsson, JM Downey - Circulation, 1992 - Am Heart Assoc
BACKGROUND Recent data from this laboratory indicate that pretreatment with adenosine
can protect the heart against infarction via A1-receptors, but because of systemic hypotension…
can protect the heart against infarction via A1-receptors, but because of systemic hypotension…
8-Cyclopentyl-1,3-dipropylxanthine (DPCPX) — a selective high affinity antagonist radioligand for A1 adenosine receptors
…, M Reddington, U Schwabe, RA Olsson - Naunyn-Schmiedeberg's …, 1987 - Springer
The properties of 8-cyclopentyl-1,3-dipropylxanthine (DPCPX) as an antagonist ligand for A
1 adenosine receptors were examined and compared with other radioligands for this …
1 adenosine receptors were examined and compared with other radioligands for this …
Reverse engineering of design patterns from java source code
N Shi, RA Olsson - 21st IEEE/ACM International Conference on …, 2006 - ieeexplore.ieee.org
Recovering design patterns can enhance existing source code analysis tools by bringing
program understanding to the design level. This paper presents a new, fully automated pattern …
program understanding to the design level. This paper presents a new, fully automated pattern …
Evidence that the adenosine A3 receptor may mediate the protection afforded by preconditioning in the isolated rabbit heart
GS Liu, SC Richards, RA Olsson… - Cardiovascular …, 1994 - academic.oup.com
Objective: Agonists selective for the A 1 adenosine receptor mimic the protective effect of
ischaemic preconditioning against infarction in the rabbit heart. Unselective adenosine …
ischaemic preconditioning against infarction in the rabbit heart. Unselective adenosine …
A methodology for testing intrusion detection systems
…, M Chung, B Mukherjee, RA Olsson - IEEE Transactions …, 1996 - ieeexplore.ieee.org
… Olsson received the BA degree in mathematics and computer science and the MA degree
in mathematics from the State University of New York, College at Potsdam. He received the …
in mathematics from the State University of New York, College at Potsdam. He received the …
Detecting disruptive routers: A distributed network monitoring approach
…, S Cheung, N Puketza, B Mukherjee, RA Olsson - IEEE …, 1998 - ieeexplore.ieee.org
An attractive target for a computer system attacker is the router. An attacker in control of a
router can disrupt communication by dropping or misrouting packets passing through the router…
router can disrupt communication by dropping or misrouting packets passing through the router…
The A2A adenosine receptor mediates coronary vasodilation
…, A Monopoli, G Lozza, E Ongini, RA Olsson… - … of Pharmacology and …, 1998 - ASPET
The coronary vasodilation caused by adenosine is due to activation of A 2 adenosine receptors
(A 2 AdoRs), but the subtype or subtypes of A 2 AdoR (A 2A and/or A 2B ) that mediate …
(A 2 AdoRs), but the subtype or subtypes of A 2 AdoR (A 2A and/or A 2B ) that mediate …
MCF: A malicious code filter
RW Lo, KN Levitt, RA Olsson - Computers & Security, 1995 - Elsevier
The goal of this research is to develop a method to detect malicious code (eg computer
viruses, worms, Trojan horses, and time/logic bombs) and security-related vulnerabilities in …
viruses, worms, Trojan horses, and time/logic bombs) and security-related vulnerabilities in …