217 research outputs found

    Insulinoma Presenting as an Unusual Cause of Marital Discord

    Get PDF
    Months before this patient’s near collapse, the metabolic derangements caused by his cancer manifested in his marriage. This case demonstrates the need to consider insulinoma in healthy appearing patients who experience behavioral disturbances that otherwise might be treated only with counseling

    Auditory pathways: are 'what' and 'where' appropriate?

    Get PDF
    New evidence confirms that the auditory system encompasses temporal, parietal and frontal brain regions, some of which partly overlap with the visual system. But common assumptions about the functional homologies between sensory systems may be misleading

    On quantum chosen-ciphertext attacks and learning with errors

    Get PDF
    Quantum computing is a significant threat to classical public-key cryptography. In strong “quantum access” security models, numerous symmetric-key cryptosystems are also vulnerable. We consider classical encryption in a model which grants the adversary quantum oracle access to encryption and decryption, but where the latter is restricted to non-adaptive (i.e., pre-challenge) queries only. We define this model formally using appropriate notions of ciphertext indistinguishability and semantic security (which are equivalent by standard arguments) and call it QCCA1 in analogy to the classical CCA1 security model. Using a bound on quantum random-access codes, we show that the standard PRF-based encryption schemes are QCCA1-secure when instantiated with quantum-secure primitives. We then revisit standard IND-CPA-secure Learning with Errors (LWE) encryption and show that leaking just one quantum decryption query (and no other queries or leakage of any kind) allows the adversary to recover the full secret key with constant success probability. In the classical setting, by contrast, recovering the key requires a linear number of decryption queries. The algorithm at the core of our attack is a (large-modulus version of) the well-known Bernstein-Vazirani algorithm. We emphasize that our results should not be interpreted as a weakness of these cryptosystems in their stated security setting (i.e., post-quantum chosen-plaintext secrecy). Rather, our results mean that, if these cryptosystems are exposed to chosen-ciphertext attacks (e.g., as a result of deployment in an inappropriate real-world setting) then quantum attacks are even more devastating than classical ones

    On non-adaptive quantum chosen-ciphertext attacks and Learning with Errors

    Get PDF
    Large-scale quantum computing is a significant threat to classical public-key cryptography. In strong “quantum access” security models, numerous symmetric-key cryptosystems are also vulnerable. We consider classical encryption in a model which grants the adversary quantum oracle access to encryption and decryption, but where the latter is restricted to non-adaptive (i.e., pre-challenge) queries only. We define this model formally using appropriate notions of

    New Techniques for Static Symmetry Breaking in Many-Sorted Finite Model Finding

    Get PDF
    © 2023 IEEE. J. Poremba, N. A. Day and A. Vakili, "New Techniques for Static Symmetry Breaking in Many-Sorted Finite Model Finding," in IEEE Transactions on Software Engineering, vol. 49, no. 6, pp. 3487-3503, 1 June 2023, doi: 10.1109/TSE.2023.3256939.Symmetry in finite model finding problems of many-sorted first-order logic (MSFOL) can be exploited to reduce the number of interpretations considered during search, thereby improving solver performance for tools such as the Alloy Analyzer. We present a framework to soundly compose static symmetry breaking schemes for MSFOL: 1) one for functions with distinct sorts in the domain and range; 2) one for functions where the range sort appears in the domain; and 3) one for predicates. We provide a novel presentation of sort inference in the context of symmetry breaking that yields a new mathematical link between sorts and symmetries. We empirically investigate how our symmetry breaking approaches affect solving performance.This work was supported in part by the Natural Sciences and Engineering Research Council of Canada (NSERC)

    High STEAP1 expression is associated with improved outcome of Ewing's sarcoma patients

    Get PDF
    Background Ewing's sarcoma (ES) is the second most common bone or soft-tissue sarcoma in childhood and adolescence and features a high propensity to metastasize. The six-transmembrane epithelial antigen of the prostate 1 (STEAP1) is a membrane-bound mesenchymal stem cell marker highly expressed in ES. Here, we investigated the role of STEAP1 as an immunohistological marker for outcome prediction in patients with ES. Patients and methods Membranous STEAP1 immunoreactivity was analyzed using immunohistochemistry in 114 primary pre-chemotherapy ES of patients diagnosed from 1983 to 2010 and compared with clinical parameters and patient outcome. Median follow-up was 3.85 years (range 0.43-17.51). Results A total of 62.3% of the ES samples displayed detectable STEAP1 expression with predominant localization of the protein at the plasma membrane. High membranous STEAP1 immunoreactivity was found in 53.5%, which correlated with better overall survival (P=0.021). Accordingly, no or low membranous STEAP1 expression was identified as an independent risk factor in multivariate analysis (hazard ratio 2.65, P=0.036). Conclusion High membranous STEAP1 expression predicts improved outcome and may help to define a specific subgroup of ES patients, who might benefit from adapted therapy regimen

    Анализ эффективности деятельности предприятия сферы услуг в современных условиях

    Get PDF
    В данной работе исследуются финансовые результаты деятельности предприятия сферы услуг. Цель работы заключается в проведении анализа эффективности деятельности предприятия, оказывающего услуги в сфере гостиничного бизнеса и общественного питания, согласно специфике практических данных. В процессе исследования проводился анализ экономических показателей эффективности деятельности предприятия.This paper examines the financial performance of the enterprise services. The purpose of the work is to conduct an analysis of the effectiveness of the company, providing services in the hotel business and catering, according to the specifics of practical data. In the process of the study, an analysis of the economic performance indicators of the enterprise was carried out
    corecore