3,764 research outputs found

    Typing tumors using pathways selected by somatic evolution.

    Get PDF
    Many recent efforts to analyze cancer genomes involve aggregation of mutations within reference maps of molecular pathways and protein networks. Here, we find these pathway studies are impeded by molecular interactions that are functionally irrelevant to cancer or the patient's tumor type, as these interactions diminish the contrast of driver pathways relative to individual frequently mutated genes. This problem can be addressed by creating stringent tumor-specific networks of biophysical protein interactions, identified by signatures of epistatic selection during tumor evolution. Using such an evolutionarily selected pathway (ESP) map, we analyze the major cancer genome atlases to derive a hierarchical classification of tumor subtypes linked to characteristic mutated pathways. These pathways are clinically prognostic and predictive, including the TP53-AXIN-ARHGEF17 combination in liver and CYLC2-STK11-STK11IP in lung cancer, which we validate in independent cohorts. This ESP framework substantially improves the definition of cancer pathways and subtypes from tumor genome data

    The Design of Efficient Internetwork Authentication for Ubiquitous Wireless Communications

    Get PDF
    A variety of wireless technologies have been standardized and commercialized, but no single solution is considered the best to satisfy all communication needs due to different coverage and bandwidth limitations. Therefore, internetworking between heterogeneous wireless networks is extremely important for ubiquitous and high performance wireless communications. The security problem is one of the major challenges in internetworking. To date, most research on internetwork authentication has focused on centralized authentication approaches, where the home network participates in each authentication process. For high latency between the home and visiting networks, such approaches tend to be inefficient. In this paper, we describe chained authentication, which requires collaboration between adjacent networks without involvement of the home network. After categorizing chained protocols, we propose a novel design of chained authentication methods under 3G-WLAN internetworking. The experiments show that proactive context transfer and ticket forwarding reduce the 3G authentication latency to 36.8% and WLAN EAP-TLS latency to 23.1% when RTT between visiting and home networks is 200 ms

    Breakdown of the perturbative renormalization group at certain quantum critical points

    Full text link
    It is shown that the presence of multiple time scales at a quantum critical point can lead to a breakdown of the loop expansion for critical exponents, since coefficients in the expansion diverge. Consequently, results obtained from finite-order perturbative renormalization-group treatments may be not be an approximation in any sense to the true asymptotic critical behavior. This problem manifests itself as a non-renormalizable field theory, or, equivalently, as the presence of a dangerous irrelevant variable. The quantum ferromagnetic transition in disordered metals provides an example.Comment: 4pp, 1 eps fi
    corecore