226 research outputs found

    Relationship between emergency presentation, systemic inflammatory response, and cancer-specific survival in patients undergoing potentially curative surgery for colon cancer

    Get PDF
    Background Emergency presentation is recognized to be associated with poorer cancer-specific survival following curative resection for colorectal cancer. The present study examined the hypothesis that an enhanced systemic inflammatory response, prior to surgery, might explain the impact of emergency presentation on survival. Methods In all, 188 patients undergoing potentially curative resection for colorectal cancer were studied. Of these, 55 (29%) presented as emergencies. The systemic inflammatory response was assessed using the Glasgow Prognostic Score (mGPS), which is the combination of an elevated C-reactive protein (>10 mg/L) and hypoalbuminemia (<35 g/L). Results In the emergency group, tumor stage was greater (P < 0.01), more patients received adjuvant therapy (P < 0.01) more patients had an elevated mGPS (P < 0.01), and more patients died of their disease (P < 0.05). The minimum follow-up was 12 months; the median follow-up of the survivors was 48 months. Emergency presentation was associated with poorer 3-year cancer-specific survival in those patients aged 65 to 74 years (P < 0.01), in both males and females (P < 0.05), in the deprived (P < 0.01), in patients with tumor-node-metastasis (TNM) stage II disease (P < 0.01), in those who received no adjuvant therapy (P < 0.01), and in the mGPS 0 and 1 groups (P < 0.05) groups. On multivariate survival analysis of patients undergoing potentially curative surgery for TNM stage II colon cancer, emergency presentation (P < 0.05) and mGPS (P < 0.05) were independently associated with cancer-specific survival. Conclusions These results suggest that emergency presentation and the presence of systemic inflammatory response prior to surgery are linked and account for poorer cancer-specific survival in patients undergoing potentially curative surgery for colon cancer. Both emergency presentation and an elevated mGPS should be taken into account when assessing the likely outcome of these patients

    The impact of age, sex and socioeconomic deprivation on outcomes in a colorectal cancer screening programme

    Get PDF
    <p>Background: Population-based colorectal cancer screening has been shown to reduce cancer specific mortality and is used across the UK. Despite evidence that older age, male sex and deprivation are associated with an increased incidence of colorectal cancer, uptake of bowel cancer screening varies across demographic groups. The aim of this study was to assess the impact of age, sex and deprivation on outcomes throughout the screening process.</p> <p>Methods: A prospectively maintained database, encompassing the first screening round of a faecal occult blood test screening programme in a single geographical area, was analysed.</p> <p>Results: Overall, 395 096 individuals were invited to screening, 204 139 (52%) participated and 6 079 (3%) tested positive. Of the positive tests, 4 625 (76%) attended for colonoscopy and cancer was detected in 396 individuals (9%). Lower uptake of screening was associated with younger age, male sex and deprivation (all p<0.001). Only deprivation was associated with failure to proceed to colonoscopy following a positive test (p<0.001). Despite higher positivity rates in those that were more deprived (p<0.001), the likelihood of detecting cancer in those attending for colonoscopy was lower (8% most deprived vs 10% least deprived, p = 0.003).</p> <p>Conclusion: Individuals who are deprived are less likely to participate in screening, less likely to undergo colonoscopy and less likely to have cancer identified as a result of a positive test. Therefore, this study suggests that strategies aimed at improving participation of deprived individuals in colorectal cancer screening should be directed at all stages of the screening process and not just uptake of the test.</p&gt

    Dependent types from counterexamples

    Full text link

    Using Flow Specifications of Parameterized Cache Coherence Protocols for Verifying Deadlock Freedom

    Full text link
    We consider the problem of verifying deadlock freedom for symmetric cache coherence protocols. In particular, we focus on a specific form of deadlock which is useful for the cache coherence protocol domain and consistent with the internal definition of deadlock in the Murphi model checker: we refer to this deadlock as a system- wide deadlock (s-deadlock). In s-deadlock, the entire system gets blocked and is unable to make any transition. Cache coherence protocols consist of N symmetric cache agents, where N is an unbounded parameter; thus the verification of s-deadlock freedom is naturally a parameterized verification problem. Parametrized verification techniques work by using sound abstractions to reduce the unbounded model to a bounded model. Efficient abstractions which work well for industrial scale protocols typically bound the model by replacing the state of most of the agents by an abstract environment, while keeping just one or two agents as is. However, leveraging such efficient abstractions becomes a challenge for s-deadlock: a violation of s-deadlock is a state in which the transitions of all of the unbounded number of agents cannot occur and so a simple abstraction like the one above will not preserve this violation. In this work we address this challenge by presenting a technique which leverages high-level information about the protocols, in the form of message sequence dia- grams referred to as flows, for constructing invariants that are collectively stronger than s-deadlock. Efficient abstractions can be constructed to verify these invariants. We successfully verify the German and Flash protocols using our technique

    SMT-based Model Checking for Recursive Programs

    Full text link
    We present an SMT-based symbolic model checking algorithm for safety verification of recursive programs. The algorithm is modular and analyzes procedures individually. Unlike other SMT-based approaches, it maintains both "over-" and "under-approximations" of procedure summaries. Under-approximations are used to analyze procedure calls without inlining. Over-approximations are used to block infeasible counterexamples and detect convergence to a proof. We show that for programs and properties over a decidable theory, the algorithm is guaranteed to find a counterexample, if one exists. However, efficiency depends on an oracle for quantifier elimination (QE). For Boolean Programs, the algorithm is a polynomial decision procedure, matching the worst-case bounds of the best BDD-based algorithms. For Linear Arithmetic (integers and rationals), we give an efficient instantiation of the algorithm by applying QE "lazily". We use existing interpolation techniques to over-approximate QE and introduce "Model Based Projection" to under-approximate QE. Empirical evaluation on SV-COMP benchmarks shows that our algorithm improves significantly on the state-of-the-art.Comment: originally published as part of the proceedings of CAV 2014; fixed typos, better wording at some place

    Variable Reuse for Efficient Image Computation

    Get PDF
    Image computation, that is, computing the set of states reachable from a given set in one step, is a crucial component in typical tools for BDD-based symbolic reachability analysis. It has been shown that the size of the intermediate BDDs during image computation can be dramatically reduced via conjunctive partitioning of the transition relation and ordering the conjuncts for facilitating early quantification. In this paper, we propose to enhance the effectiveness of these techniques by reusing the quantified variables. Given an ordered set of conjuncts, if the last conjunct that uses a variable u appears before the first conjunct that uses another variable v, then v can be renamed to u, assuming u will be quantified immediately after its last use. In general, multiple variables can share the same identifier so the BDD nodes that are inactive but not garbage collected may be activated. We give a polynomial-time algorithm for generating the optimum number of variables that are required for image computation and show how to modify the image computation accounting for variable reuse. The savings for image computation are demonstrated on ISCAS\u2789 and Texas\u2797 benchmark models

    Role of dipolar and exchange interactions in the positions and widths of EPR transitions for the single-molecule magnets Fe8 and Mn12

    Full text link
    We examine quantitatively the temperature dependence of the linewidths and line shifts in electron paramagnetic resonance experiments on single crystals of the single-molecule magnets Fe8_8 and Mn12_{12}, at fixed frequency, with an applied magnetic field along the easy axis. We include inter-molecular spin-spin interactions (dipolar and exchange) and distributions in both the uniaxial anisotropy parameter DD and the Land\'{e} gg-factor. The temperature dependence of the linewidths and the line shifts are mainly caused by the spin-spin interactions. For Fe8_8 and Mn12_{12}, the temperature dependence of the calculated line shifts and linewidths agrees well with the trends of the experimental data. The linewidths for Fe8_8 reveal a stronger temperature dependence than those for Mn12_{12}, because for Mn12_{12} a much wider distribution in DD overshadows the temperature dependence of the spin-spin interactions. For Fe8_8, the line-shift analysis suggests two competing interactions: a weak ferromagnetic exchange coupling between neighboring molecules and a longer-ranged dipolar interaction. This result could have implications for ordering in Fe8_8 at low temperatures.Comment: published versio

    Complementarity in classical dynamical systems

    Full text link
    The concept of complementarity, originally defined for non-commuting observables of quantum systems with states of non-vanishing dispersion, is extended to classical dynamical systems with a partitioned phase space. Interpreting partitions in terms of ensembles of epistemic states (symbols) with corresponding classical observables, it is shown that such observables are complementary to each other with respect to particular partitions unless those partitions are generating. This explains why symbolic descriptions based on an \emph{ad hoc} partition of an underlying phase space description should generally be expected to be incompatible. Related approaches with different background and different objectives are discussed.Comment: 18 pages, no figure

    Partial model checking with ROBDDs

    Full text link

    Subsumer-First: Steering Symbolic Reachability Analysis

    Full text link
    Abstract. Symbolic reachability analysis provides a basis for the veri-fication of software systems by offering algorithmic support for the ex-ploration of the program state space when searching for proofs or coun-terexamples. The choice of exploration strategy employed by the anal-ysis has direct impact on its success, whereas the ability to find short counterexamples quickly and—as a complementary task—to efficiently perform the exhaustive state space traversal are of utmost importance for the majority of verification efforts. Existing exploration strategies can optimize only one of these objectives which leads to a sub-optimal reach-ability analysis, e.g., breadth-first search may sacrifice the exploration ef-ficiency and chaotic iteration can miss minimal counterexamples. In this paper we present subsumer-first, a new approach for steering symbolic reachability analysis that targets both minimal counterexample discovery and efficiency of exhaustive exploration. Our approach leverages the re-sult of fixpoint checks performed during symbolic reachability analysis to bias the exploration strategy towards its objectives, and does not require any additional computation. We demonstrate how the subsumer-first ap-proach can be applied to improve efficiency of software verification tools based on predicate abstraction. Our experimental evaluation indicates the practical usefulness of the approach: we observe significant efficiency improvements (median value 40%) on difficult verification benchmarks from the transportation domain.
    • …
    corecore