Are you sure you want to leave this community? Leaving the community will revoke any permissions you have been granted in this community.
(Regina Feederle, Elisabeth Kremmer - Helmholtz Center Munich, H Leonhardt - Ludwig Maximilians University Munich Cat# ROT-M_6G6, RRID:AB_3713431)Copy Citation Copied
URL: http://antibodyregistry.org/AB_3713431
Proper Citation: (Regina Feederle, Elisabeth Kremmer - Helmholtz Center Munich, H Leonhardt - Ludwig Maximilians University Munich Cat# ROT-M_6G6, RRID:AB_3713431)
Target Antigen: mRFP1; mCherry; mPlum; mOrange
Host Organism: Mouse
Clonality: monoclonal
Comments: Applications: Western Blot (WB)
Expand AllWe found {{ ctrl2.mentions.all_count }} mentions in open access literature.
We have not found any literature mentions for this resource.
We are searching literature mentions for this resource.
Most recent articles:
{{ mention._source.dc.creators[0].familyName }} {{ mention._source.dc.creators[0].initials }}, et al. ({{ mention._source.dc.publicationYear }}) {{ mention._source.dc.title }} {{ mention._source.dc.publishers[0].name }}, {{ mention._source.dc.publishers[0].volume }}({{ mention._source.dc.publishers[0].issue }}), {{ mention._source.dc.publishers[0].pagination }}. (PMID:{{ mention._id.replace('PMID:', '') }})
A list of researchers who have used the resource and an author search tool
A list of researchers who have used the resource and an author search tool. This is available for resources that have literature mentions.
No rating or validation information has been found for Red FP Antibody.
No alerts have been found for Red FP Antibody.
Source: Antibody Registry
dkNET can assist you in preparing authentication plans for antibodies to comply with the NIH Submission Policy. The information can be used while planning your experiments or submitting grant applications. The authentication plan for antibodies is based on methods suggested in "A proposal for validation of antibodies" (Uhlen M et. al., 2016), the guideline published in the Journal of Comparative Neurology (Saper C, 2005)(2), and the example " Authentication of of Key Biological and/or Chemical Resources "(Bandrowski A). For best practices for authenticating antibodies, check our Authentication Reports services.