5,551 research outputs found

    HaTS: Hardware-Assisted Transaction Scheduler

    Get PDF
    In this paper we present HaTS, a Hardware-assisted Transaction Scheduler. HaTS improves performance of concurrent applications by classifying the executions of their atomic blocks (or in-memory transactions) into scheduling queues, according to their so called conflict indicators. The goal is to group those transactions that are conflicting while letting non-conflicting transactions proceed in parallel. Two core innovations characterize HaTS. First, HaTS does not assume the availability of precise information associated with incoming transactions in order to proceed with the classification. It relaxes this assumption by exploiting the inherent conflict resolution provided by Hardware Transactional Memory (HTM). Second, HaTS dynamically adjusts the number of the scheduling queues in order to capture the actual application contention level. Performance results using the STAMP benchmark suite show up to 2x improvement over state-of-the-art HTM-based scheduling techniques

    SoK: Cryptographically Protected Database Search

    Full text link
    Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches. Since protected search was introduced in 2000, the area has grown rapidly; systems are offered by academia, start-ups, and established companies. However, there is no best protected search system or set of techniques. Design of such systems is a balancing act between security, functionality, performance, and usability. This challenge is made more difficult by ongoing database specialization, as some users will want the functionality of SQL, NoSQL, or NewSQL databases. This database evolution will continue, and the protected search community should be able to quickly provide functionality consistent with newly invented databases. At the same time, the community must accurately and clearly characterize the tradeoffs between different approaches. To address these challenges, we provide the following contributions: 1) An identification of the important primitive operations across database paradigms. We find there are a small number of base operations that can be used and combined to support a large number of database paradigms. 2) An evaluation of the current state of protected search systems in implementing these base operations. This evaluation describes the main approaches and tradeoffs for each base operation. Furthermore, it puts protected search in the context of unprotected search, identifying key gaps in functionality. 3) An analysis of attacks against protected search for different base queries. 4) A roadmap and tools for transforming a protected search system into a protected database, including an open-source performance evaluation platform and initial user opinions of protected search.Comment: 20 pages, to appear to IEEE Security and Privac

    Data-driven through-life costing to support product lifecycle management solutions in innovative product development

    Get PDF
    Innovative product usually refers to product that comprises of creativity and new ideas. In the development of such a new product, there is often a lack of historical knowledge and data available to be used to perform cost estimation accurately. This is due to the fact that traditional cost estimation methods are used to predict costs only after a product model has been built, and not at an early design stage when there is little data and information available. In light of this, original equipment manufacturers are also facing critical challenges of becoming globally competitive and increasing demands from customer for continuous innovation. To alleviate these situations this research has identified a new approach to cost modelling with the inclusion of product lifecycle management solutions to address innovative product development.The aim of this paper, therefore, is to discuss methods of developing an extended-enterprise data-driven through-life cost estimating method for innovative product development

    Selection Of A Novel Aptamer Against Vitronectin Using Capillary Electrophoresis And Next Generation Sequencing

    Get PDF
    Breast cancer (BC) results in ≃40,000 deaths each year in the United States and even among survivors treatment of the disease may have devastating consequences, including increased risk for heart disease and cognitive impairment resulting from the toxic effects of chemotherapy. Aptamer-mediated drug delivery can contribute to improved treatment outcomes through the selective delivery of chemotherapy to BC cells, provided suitable cancer-specific antigens can be identified. We report here the use of capillary electrophoresis in conjunction with next generation sequencing to develop the first vitronectin (VN) binding aptamer (VBA-01; Kd 405 nmol/l, the first aptamer to vitronectin (VN; Kd = 405 nmol/l), a protein that plays an important role in wound healing and that is present at elevated levels in BC tissue and in the blood of BC patients relative to the corresponding nonmalignant tissues. We used VBA-01 to develop DVBA-01, a dimeric aptamer complex, and conjugated doxorubicin (Dox) to DVBA-01 (7:1 ratio) using pH-sensitive, covalent linkages. Dox conjugation enhanced the thermal stability of the complex (60.2 versus 46.5°C) and did not decrease affinity for the VN target. The resulting DVBA-01-Dox complex displayed increased cytotoxicity to MDA-MB-231 BC cells that were cultured on plasticware coated with VN (1.8 × 10⁻⁶mol/l) relative to uncoated plates (2.4 × 10⁻⁶ mol/l), or plates coated with the related protein fibronectin (2.1 × 10⁻⁶ mol/l). The VBA-01 aptamer was evaluated for binding to human BC tissue using immunohistochemistry and displayed tissue specific binding and apparent association with BC cells. In contrast, a monoclonal antibody that preferentially binds to multimeric VN primarily stained extracellular matrix and vessel walls of BC tissue. Our results indicate a strong potential for using VN-targeting aptamers to improve drug delivery to treat BC

    The ReSIST Resilience Knowledge Base

    No full text
    We describe a prototype knowledge base that uses semantic web technologies to provide a service for querying a large and expanding collection of public data about resilience, dependability and security. We report progress and identify opportunities to support resilience-explicit computing by developing metadata-based descriptions of resilience mechanisms that can be used to support design time and, potentially, run-time decision making

    Thermal and Lighting Consumption Savings in Classrooms Retrofitted with Shading Devices in a Hot Climate

    Get PDF
    Most educational buildings in southern Spain do not meet current energy requirements as weak thermal envelopes and the lack of cooling systems lead to severe discomfort in classrooms, especially when temperatures are above 30 °C. Given that global warming is expected to worsen this situation in coming decades, one of the first steps to be taken is to protect window openings from high levels of solar radiation by adding shading devices to reduce indoor temperatures and improve visual comfort. The aim of this research is to evaluate the reduction in thermal and lighting consumption in a classroom where a solar protection system in the form of an egg-crate shading device was installed. Two classrooms—one with an egg-crate device and another with no shading system—were monitored and compared for a whole year. The use of an egg-crate device in these classrooms reduced indoor operative temperatures during warmer periods while also improving indoor natural illuminance levels. Moreover, annual electric air conditioning consumption decreased by approximately 20%, with a 50% reduction in electric lighting consumption. These savings in electricity were largely conditioned by the use patterns observed in these ambient systems.Spanish government BIA2014-53949-RMinistry of Economy and Competitiveness, Spanish GovernmentEuropean Regional Development Fun

    CRISPR-Mediated VHL Knockout Generates an Improved Model for Metastatic Renal Cell Carcinoma.

    Get PDF
    Metastatic renal cell carcinoma (mRCC) is nearly incurable and accounts for most of the mortality associated with RCC. Von Hippel Lindau (VHL) is a tumour suppressor that is lost in the majority of clear cell RCC (ccRCC) cases. Its role in regulating hypoxia-inducible factors-1α (HIF-1α) and -2α (HIF-2α) is well-studied. Recent work has demonstrated that VHL knock down induces an epithelial-mesenchymal transition (EMT) phenotype. In this study we showed that a CRISPR/Cas9-mediated knock out of VHL in the RENCA model leads to morphologic and molecular changes indicative of EMT, which in turn drives increased metastasis to the lungs. RENCA cells deficient in HIF-1α failed to undergo EMT changes upon VHL knockout. RNA-seq revealed several HIF-1α-regulated genes that are upregulated in our VHL knockout cells and whose overexpression signifies an aggressive form of ccRCC in the cancer genome atlas (TCGA) database. Independent validation in a new clinical dataset confirms the upregulation of these genes in ccRCC samples compared to adjacent normal tissue. Our findings indicate that loss of VHL could be driving tumour cell dissemination through stabilization of HIF-1α in RCC. A better understanding of the mechanisms involved in this phenomenon can guide the search for more effective treatments to combat mRCC
    • 

    corecore