57 research outputs found

    High Resolution Genome-Wide Analysis of Chromosomal Alterations in Burkitt's Lymphoma

    Get PDF
    Additional chromosomal abnormalities are currently detected in Burkitt's lymphoma. They play major roles in the progression of BL and in prognosis. The genes involved remain elusive. A whole-genome oligonucleotide array CGH analysis correlated with karyotype and FISH was performed in a set of 27 Burkitt's lymphoma-derived cell lines and primary tumors. More than half of the 145 CNAs<2 Mb were mapped to Mendelian CNVs, including GSTT1, glutathione s-transferase and BIRC6, an anti-apoptotic protein, possibly predisposing to some cancers. Somatic cell line-specific CNVs localized to the IG locus were consistently observed with the 244 K aCGH platform. Among 136 CNAs >2 Mb, gains were found in 1q (12/27), 13q (7/27), 7q (6/27), 8q(4/27), 2p (3/27), 11q (2/27) and 15q (2/27). Losses were found in 3p (5/27), 4p (4/27), 4q (4/27), 9p (4/27), 13q (4/27), 6p (3/27), 17p (3/27), 6q (2/27),11pterp13 (2/27) and 14q12q21.3 (2/27). Twenty one minimal critical regions (MCR), (range 0.04–71.36 Mb), were delineated in tumors and cell lines. Three MCRs were localized to 1q. The proximal one was mapped to 1q21.1q25.2 with a 6.3 Mb amplicon (1q21.1q21.3) harboring BCA2 and PIAS3. In the other 2 MCRs, 1q32.1 and 1q44, MDM4 and AKT3 appeared as possible drivers of these gains respectively. The 13q31.3q32.1 <89.58–96.81> MCR contained an amplicon and ABCC4 might be the driver of this amplicon. The 40 Kb 2p16.1 <60.96–61> MCR was the smallest gained MCR and specifically encompassed the REL oncogene which is already implicated in B cell lymphomas. The most frequently deleted MCR was 3p14.1 <60.43–60.53> that removed the fifth exon of FHIT. Further investigations which combined gene expression and functional studies are essential to understand the lymphomagenesis mechanism and for the development of more effective, targeted therapeutic strategies

    Guidelines for the use and interpretation of assays for monitoring autophagy (3rd edition)

    Get PDF
    In 2008 we published the first set of guidelines for standardizing research in autophagy. Since then, research on this topic has continued to accelerate, and many new scientists have entered the field. Our knowledge base and relevant new technologies have also been expanding. Accordingly, it is important to update these guidelines for monitoring autophagy in different organisms. Various reviews have described the range of assays that have been used for this purpose. Nevertheless, there continues to be confusion regarding acceptable methods to measure autophagy, especially in multicellular eukaryotes. For example, a key point that needs to be emphasized is that there is a difference between measurements that monitor the numbers or volume of autophagic elements (e.g., autophagosomes or autolysosomes) at any stage of the autophagic process versus those that measure fl ux through the autophagy pathway (i.e., the complete process including the amount and rate of cargo sequestered and degraded). In particular, a block in macroautophagy that results in autophagosome accumulation must be differentiated from stimuli that increase autophagic activity, defi ned as increased autophagy induction coupled with increased delivery to, and degradation within, lysosomes (inmost higher eukaryotes and some protists such as Dictyostelium ) or the vacuole (in plants and fungi). In other words, it is especially important that investigators new to the fi eld understand that the appearance of more autophagosomes does not necessarily equate with more autophagy. In fact, in many cases, autophagosomes accumulate because of a block in trafficking to lysosomes without a concomitant change in autophagosome biogenesis, whereas an increase in autolysosomes may reflect a reduction in degradative activity. It is worth emphasizing here that lysosomal digestion is a stage of autophagy and evaluating its competence is a crucial part of the evaluation of autophagic flux, or complete autophagy. Here, we present a set of guidelines for the selection and interpretation of methods for use by investigators who aim to examine macroautophagy and related processes, as well as for reviewers who need to provide realistic and reasonable critiques of papers that are focused on these processes. These guidelines are not meant to be a formulaic set of rules, because the appropriate assays depend in part on the question being asked and the system being used. In addition, we emphasize that no individual assay is guaranteed to be the most appropriate one in every situation, and we strongly recommend the use of multiple assays to monitor autophagy. Along these lines, because of the potential for pleiotropic effects due to blocking autophagy through genetic manipulation it is imperative to delete or knock down more than one autophagy-related gene. In addition, some individual Atg proteins, or groups of proteins, are involved in other cellular pathways so not all Atg proteins can be used as a specific marker for an autophagic process. In these guidelines, we consider these various methods of assessing autophagy and what information can, or cannot, be obtained from them. Finally, by discussing the merits and limits of particular autophagy assays, we hope to encourage technical innovation in the field

    Monoclonal antibody against a Burkitt lymphoma-associated antigen.

    No full text

    Activation of wild-type p53 by MDM2 inhibitors: a new strategy for lymphoma treatment

    No full text
    Ana&iuml;s Pujals,1&ndash;3,* Lo&euml;titia Favre,4,* Philippe Gaulard,1&ndash;3 Jo&euml;lle Wiels41Department of Pathology, Assistance Publique-H&ocirc;pitaux de Paris, CHU Henri Mondor, 2Facult&eacute; de M&eacute;decine, Universit&eacute; Paris-Est Cr&eacute;teil, 3Inserm U955, Institut Mondor de Recherche Biom&eacute;dicale, 4UMR 8126 CNRS, Institut Gustave Roussy, Universit&eacute; Paris-Sud, Villejuif, France*These authors contributed equally to this workAbstract: The tumor suppressor TP53 is frequently mutated or inactivated in human cancers. Mutations of TP53 are less common in lymphomas than in other tumors, but the protein is often inhibited by the overexpression of its main regulator &ndash; MDM2. In the past 10 years, major efforts have been made to develop drugs that can reactivate p53 and restore its functions. This review focuses on recent advances in the development of small inhibitors of MDM2, which are potentially relevant for the treatment of B- and T-cell lymphomas. We will describe the current state of development of these drugs and discuss their mechanism of action in these hematological malignancies.Keywords: lymphoma, p53, nutlin, apoptosis, MDM

    The landing gear case study: challenges and experiments

    Get PDF
    International audienceEmbedded critical systems need to be validated very thoroughly; it usually results in very long and onerous test phases. Formal techniques, in particular formal specification languages and associated proof tools, could be an advantageous alternative, or at least a good complement and allow a significant reduction of test phases. However, for these techniques to be used in practice, one issue to consider is their efficiency and scalability on complex industrial systems.Case studies have played an essential role in the history of formal methods. They have allowed to illustrate the application of formal techniques for modelling and verification, to compare different methods in terms of expressivity, performance and easiness of use. They have also permitted to enact the progress made by these methods.Dagstuhl seminar 9523 is about the famous Steam Boiler case study in 1995 had a lot of impact on the formal methods community. This case study allowed the assessment of formal techniques, the comparison of different formal techniques, the identification of areas for future work

    Checking Secure Interactions of Smart Card

    No full text
    Abstract. This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de ned that associates levels to applet attributes and methods and de nes authorized ows between levels. We propose a technique based on model checking to verify that actual information ows between applets are authorized. We illustrate our approach on applets involved in an electronic purse running on Java enabled smart cards
    • 

    corecore