58,046 research outputs found
Recommended from our members
Complete response of skull base inverted papilloma to chemotherapy: Case report.
BackgroundInverted papilloma (IP) is the most common benign sinonasal neoplasm. Endoscopic techniques, improved understanding of pathophysiology, and novel surgical approaches have allowed rhinologists to treat IPs more effectively, with surgery being the mainstay of therapy. Frontal sinus IP poses a challenge for surgical therapy due to complex anatomy and potentially difficult surgical access.ObjectivesWe reported a unique case of a massive frontal sinus IP that presented with intracranial and orbital extension, with near resolution after chemotherapy.MethodsA retrospective case review of a patient with a frontal sinus IP treated at a tertiary academic medical center.ResultsA 75-year-old male patient presented with nasal obstruction, purulent nasal discharge, and a growing left supraorbital mass. Endoscopy demonstrated a mass that filled both frontal and ethmoid sinuses, with orbital invasion. There also was substantial erosion of the posterior table, which measured 1.73 × 1.40 cm. A biopsy specimen demonstrated IP with carcinoma in situ. The patient was deemed unresectable on initial evaluation and, subsequently, underwent chemotherapy (carboplatin and paclitaxel). The tumor had a dramatic response to chemotherapy, and the patient elected for definitive surgery to remove any residual disease. During surgery, only a small focus of IP was found along the superior wall of the frontal sinus. No tumor was found elsewhere, including at the site of skull base erosion. The final pathology was IP without carcinoma in situ or dysplasia.ConclusionThis was the first reported case of chemotherapeutic "debulking" of IP, which facilitated surgical resection, despite substantial intracranial and orbital involvement. Although nearly all IPs can be treated surgically, rare cases, such as unresectable tumors, may benefit from systemic chemotherapy
I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy
In this paper, we show how to exploit real-time communication applications to
determine the IP address of a targeted user. We focus our study on Skype,
although other real-time communication applications may have similar privacy
issues. We first design a scheme that calls an identified targeted user
inconspicuously to find his IP address, which can be done even if he is behind
a NAT. By calling the user periodically, we can then observe the mobility of
the user. We show how to scale the scheme to observe the mobility patterns of
tens of thousands of users. We also consider the linkability threat, in which
the identified user is linked to his Internet usage. We illustrate this threat
by combining Skype and BitTorrent to show that it is possible to determine the
file-sharing usage of identified users. We devise a scheme based on the
identification field of the IP datagrams to verify with high accuracy whether
the identified user is participating in specific torrents. We conclude that any
Internet user can leverage Skype, and potentially other real-time communication
systems, to observe the mobility and file-sharing usage of tens of millions of
identified users.Comment: This is the authors' version of the ACM/USENIX Internet Measurement
Conference (IMC) 2011 pape
Model ochrony dóbr niematerialnych na uczelniach polskich
The article provides an analysis of intangible goods protection at polish universities. The paper
focuses on two main issues: who, by virtue of law, is entitled to intangible good created at
university and whether or how to protect it. While the first aspect is regulated by law, the second
one is left to decision of entitled person as a part of his IP policy. Establishing the owner of invention/
copyrights, author concentrates on main notions that require in-depth analysis: coauthorship,
employee invention, work for hire, scope of employment at universities. Further, the
article gives brief review of IP management policies at polish universities including possible modes
of IP protection and university commercialization regulations. The analysis is based on relevant
polish legal acts and exemplary universities internal regulations concerning IP management.
Were needed comparative remarks to German, French and United States legal solutions were
givenZaprezentowana analiza ochrony dóbr niematerialnych, w pierwszym rzędzie stawia pytanie:
kto jest twórcą i komu z mocy ustawy przysługuje prawo do dobra niematerialnego? Istotne jest
tutaj ustalenie, czy dokonanie dobra mieści się w zakresie obowiązków pracowniczych, co nie
zawsze jest oczywiste. W dalszej kolejności omówione są kwestie związane z przeniesieniem praw
oraz dylematy, jak i w ogóle „czy” dane dobro chronić, jak z prawa korzystać. O ile rozwiązanie
kwestii podmiotu pierwotnie uprawnionego do dobra niematerialnego należy do ustawodawcy, o
tyle problematyka eksploatacji prawa i jego przeniesienia należy już do decyzji uprawnionego.
Problem jest szczególnie złożony w przypadku dóbr własności przemysłowej, gdyż tutaj, w przeciwieństwie
do prawa autorskiego, prawo wyłączne nie powstaje ex lege z chwilą stworzenia
dobra.Druk materiałów sfinansowano ze środków Ministerstwa Nauki i Szkolnictwa
Wyższego w ramach projektu „Kreator innowacyjności – wsparcie innowacyjnej
przedsiębiorczości akademickiej”
Perancangan Sistem Konektifitas Intranet-internet Dengan Menggunakan Konsep Nat
Intranet can be related to the Internet, and vice versa. To connect your intranet to the internet a lot of things to watch for the efficient and effective connectivity. Some important things that are addressing and internet security. Internet protocol used in the TCP / IP (Transmission Control Protocol / Internet Protocol), requires that every host or intend to connect computers into a network must have a unique IP address. So that when the intranet was about to be connected to the internet or any host computer that is connected must have an IP address in accordance with the rules of the addressing used in the internet. The concept of NAT (Network Address Translator) provides a solution to overcome the limitations of available IP addresses. Masquereding IP is the internet service which is the application of the concept of NAT that can reduce the demand for new IP addresses connecting ourselves into the internet and intranet can improve security. Masquereding IP is one of the additional capabilities on LINUX operating system
- …