851 research outputs found
Recommended from our members
Keeping your options open: insights from Dppa2/4 into how epigenetic priming factors promote cell plasticity.
The concept of cellular plasticity is particularly apt in early embryonic development, where there is a tug-of-war between the stability and flexibility of cell identity. This balance is controlled in part through epigenetic mechanisms. Epigenetic plasticity dictates how malleable cells are to change by adjusting the potential to initiate new transcriptional programmes. The higher the plasticity of a cell, the more readily it can adapt and change its identity in response to external stimuli such as differentiation cues. Epigenetic plasticity is regulated in part through the action of epigenetic priming factors which establish this permissive epigenetic landscape at genomic regulatory elements to enable future transcriptional changes. Recent studies on the DNA binding proteins Developmental Pluripotency Associated 2 and 4 (Dppa2/4) support their roles as epigenetic priming factors in facilitating cell fate transitions. Here, using Dppa2/4 as a case study, the concept of epigenetic plasticity and molecular mechanism of epigenetic priming factors will be explored. Understanding how epigenetic priming factors function is key not only to improve our understanding of the tight control of development, but also to give insights into how this goes awry in diseases of cell identity, such as cancer
On the Unicity of Smartphone Applications
Prior works have shown that the list of apps installed by a user reveal a lot
about user interests and behavior. These works rely on the semantics of the
installed apps and show that various user traits could be learnt automatically
using off-the-shelf machine-learning techniques. In this work, we focus on the
re-identifiability issue and thoroughly study the unicity of smartphone apps on
a dataset containing 54,893 Android users collected over a period of 7 months.
Our study finds that any 4 apps installed by a user are enough (more than 95%
times) for the re-identification of the user in our dataset. As the complete
list of installed apps is unique for 99% of the users in our dataset, it can be
easily used to track/profile the users by a service such as Twitter that has
access to the whole list of installed apps of users. As our analyzed dataset is
small as compared to the total population of Android users, we also study how
unicity would vary with larger datasets. This work emphasizes the need of
better privacy guards against collection, use and release of the list of
installed apps.Comment: 10 pages, 9 Figures, Appeared at ACM CCS Workshop on Privacy in
Electronic Society (WPES) 201
Dovetail: Stronger Anonymity in Next-Generation Internet Routing
Current low-latency anonymity systems use complex overlay networks to conceal
a user's IP address, introducing significant latency and network efficiency
penalties compared to normal Internet usage. Rather than obfuscating network
identity through higher level protocols, we propose a more direct solution: a
routing protocol that allows communication without exposing network identity,
providing a strong foundation for Internet privacy, while allowing identity to
be defined in those higher level protocols where it adds value.
Given current research initiatives advocating "clean slate" Internet designs,
an opportunity exists to design an internetwork layer routing protocol that
decouples identity from network location and thereby simplifies the anonymity
problem. Recently, Hsiao et al. proposed such a protocol (LAP), but it does not
protect the user against a local eavesdropper or an untrusted ISP, which will
not be acceptable for many users. Thus, we propose Dovetail, a next-generation
Internet routing protocol that provides anonymity against an active attacker
located at any single point within the network, including the user's ISP. A
major design challenge is to provide this protection without including an
application-layer proxy in data transmission. We address this challenge in path
construction by using a matchmaker node (an end host) to overlap two path
segments at a dovetail node (a router). The dovetail then trims away part of
the path so that data transmission bypasses the matchmaker. Additional design
features include the choice of many different paths through the network and the
joining of path segments without requiring a trusted third party. We develop a
systematic mechanism to measure the topological anonymity of our designs, and
we demonstrate the privacy and efficiency of our proposal by simulation, using
a model of the complete Internet at the AS-level
Pasture condition guides for the Murchison River catchment
Knowledge of the pasture resource and its capabilities is essential to sustainable use of the rangelands. Rangeland managers must be able to recognise firstly the different pasture types, and secondly, the differences between present condition classes for each type. Both factors affect the stock carrying capacity, and appropriate pastoral management of a pasture. This guide has been produced for use by pastoralists to assist them to recognise and assess the condition of the perennial pasture resource of their own properties. The guide describes the condition states found in 10 of the most widespread pastures of the Murchison River catchment (Fig. 1). This region has been the subject of a detailed inventory and mapping, as part of the rangeland survey programme conducted in 1985-87 by the departments of Agriculture and Land Administration. Results of this survey provide the basis for this guide. The guide has been produced with funding support from the National Soil Conservation Programme as part of the Murchison Catchment Management Project
Guidelines for Negotiating Scientific Collaboration
Whether it's sharing reagents with a laboratory on the other side of the world or working with the postdoc at the neighboring bench, some simple rules of collaboration might help
Austerity, political control and supplier selection in English local government: implications for autonomy in multi-level systems
Analysis of 60,000 contracts awarded by English councils between 2015-19 reveals that austerity constraints are a key predictor of councils outsourcing services to for-profit suppliers, regardless of their political control. Conservative Party-controlled councils are also more likely to contract with for-profit suppliers, although we found no link between Labour-controlled councils and not-for-profit suppliers, nor evidence that political or budgetary factors influence whether councils contract with providers based in their own region. We argue that centrally imposed funding cuts, and a belief that for-profit suppliers represent a cheaper option, could be overriding Labour Party councils’ ideological preference for not-for-profit providers
- …