398 research outputs found
Interventions for cold homes: a rapid review of the health impacts
\ua9 The Author(s) 2024. Published by Oxford University Press on behalf of the European Public Health Association. Background: Cold homes are associated with an increased risk of adverse health outcomes for older people. To mitigate this risk, homes need to be heated to an appropriate temperature. This review aims to identify interventions designed to improve heating and temperatures within homes and summarize its impact on health, health service utilization and cost effectiveness. Methods: A rapid review was conducted. Studies assessing the effects of structural, financial, or behavioural interventions designed to improve home temperatures of residents aged 18\ufe years were eligible. Searches were carried out in four databases. A search for grey literature, and backward and forward citation searching were performed. Data were summarized in a narrative synthesis and mapped using EPPI-Reviewer and EPPI-Mapper software. Results: Eighteen studies reported across 19 publications were included. Structural interventions were associated with better mental health and quality of life, a reduction in health service utilization, and improvements in satisfaction with internal home temperature, social interactions and financial difficulties. The impact on physical health outcomes varied by age, gender and long-term conditions. Evidence about the impact of behavioural interventions was inconsistent. Conclusion: Structural improvements to increase home temperatures may offer the potential to improve some aspects of health. However, the impact on physical health, including which groups are most likely to benefit, is unclear. Key gaps include the lack of evidence about the impact of financial interventions, and the impact of all types of interventions, on quality of life, mortality and costs
Symbolic Computation via Program Transformation
Symbolic computation is an important approach in automated program analysis.
Most state-of-the-art tools perform symbolic computation as interpreters and
directly maintain symbolic data. In this paper, we show that it is feasible,
and in fact practical, to use a compiler-based strategy instead. Using compiler
tooling, we propose and implement a transformation which takes a standard
program and outputs a program that performs semantically equivalent, but
partially symbolic, computation. The transformed program maintains symbolic
values internally and operates directly on them hence the program can be
processed by a tool without support for symbolic manipulation.
The main motivation for the transformation is in symbolic verification, but
there are many other possible use-cases, including test generation and concolic
testing. Moreover using the transformation simplifies tools, since the symbolic
computation is handled by the program directly. We have implemented the
transformation at the level of LLVM bitcode. The paper includes an experimental
evaluation, based on an explicit-state software model checker as a verification
backend
Symbolic Partial-Order Execution for Testing Multi-Threaded Programs
We describe a technique for systematic testing of multi-threaded programs. We
combine Quasi-Optimal Partial-Order Reduction, a state-of-the-art technique
that tackles path explosion due to interleaving non-determinism, with symbolic
execution to handle data non-determinism. Our technique iteratively and
exhaustively finds all executions of the program. It represents program
executions using partial orders and finds the next execution using an
underlying unfolding semantics. We avoid the exploration of redundant program
traces using cutoff events. We implemented our technique as an extension of
KLEE and evaluated it on a set of large multi-threaded C programs. Our
experiments found several previously undiscovered bugs and undefined behaviors
in memcached and GNU sort, showing that the new method is capable of finding
bugs in industrial-size benchmarks.Comment: Extended version of a paper presented at CAV'2
A Configurable CEGAR Framework with Interpolation-Based Refinements
International audienceCorrectness of software components in a distributed system is a key issue to ensure overall reliability. Formal verification techniques such as model checking can show design flaws at early stages of development. Abstraction is a key technique for reducing complexity by hiding information, which is not relevant for verification. Counterexample-Guided Abstraction Refinement (CEGAR) is a verification algorithm that starts from a coarse abstraction and refines it iteratively until the proper precision is obtained. Many abstraction types and refinement strategies exist for systems with different characteristics. In this paper we show how these algorithms can be combined into a configurable CEGAR framework. In our framework we also present a new CEGAR configuration based on a combination of abstractions, being able to perform better for certain models. We demonstrate the use of the framework by comparing several configurations of the algorithms on various problems, identifying their advantages and shortcomings
Immuno-Therapy with Anti-CTLA4 Antibodies in Tolerized and Non-Tolerized Mouse Tumor Models
Monoclonal antibodies specific for cytotoxic T lymphocyte-associated antigen 4 (anti-CTLA4) are a novel form of cancer immunotherapy. While preclinical studies in mouse tumor models have shown anti-tumor efficacy of anti-CTLA4 injection or expression, anti-CTLA4 treatment in patients with advanced cancers had disappointing therapeutic benefit. These discrepancies have to be addressed in more adequate pre-clinical models. We employed two tumor models. The first model is based on C57Bl/6 mice and syngeneic TC-1 tumors expressing HPV16 E6/E7. In this model, the HPV antigens are neo-antigens, against which no central tolerance exists. The second model involves mice transgenic for the proto-oncogen neu and syngeneic mouse mammary carcinoma (MMC) cells. In this model tolerance to Neu involves both central and peripheral mechanisms. Anti-CTLA4 delivery as a protein or expression from gene-modified tumor cells were therapeutically efficacious in the non-tolerized TC-1 tumor model, but had no effect in the MMC-model. We also used the two tumor models to test an immuno-gene therapy approach for anti-CTLA4. Recently, we used an approach based on hematopoietic stem cells (HSC) to deliver the relaxin gene to tumors and showed that this approach facilitates pre-existing anti-tumor T-cells to control tumor growth in the MMC tumor model. However, unexpectedly, when used for anti-CTLA4 gene delivery in this study, the HSC-based approach was therapeutically detrimental in both the TC-1 and MMC models. Anti-CTLA4 expression in these models resulted in an increase in the number of intratumoral CD1d+ NKT cells and in the expression of TGF-β1. At the same time, levels of pro-inflammatory cytokines and chemokines, which potentially can support anti-tumor T-cell responses, were lower in tumors of mice that received anti-CTLA4-HSC therapy. The differences in outcomes between the tolerized and non-tolerized models also provide a potential explanation for the low efficacy of CTLA4 blockage approaches in cancer immunotherapy trials
Efficient Interpolation for the Theory of Arrays
Existing techniques for Craig interpolation for the quantifier-free fragment
of the theory of arrays are inefficient for computing sequence and tree
interpolants: the solver needs to run for every partitioning of the
interpolation problem to avoid creating -mixed terms. We present a new
approach using Proof Tree Preserving Interpolation and an array solver based on
Weak Equivalence on Arrays. We give an interpolation algorithm for the lemmas
produced by the array solver. The computed interpolants have worst-case
exponential size for extensionality lemmas and worst-case quadratic size
otherwise. We show that these bounds are strict in the sense that there are
lemmas with no smaller interpolants. We implemented the algorithm and show that
the produced interpolants are useful to prove memory safety for C programs.Comment: long version of the paper at IJCAR 201
Model Checking Boot Code from AWS Data Centers
This paper describes our experience with symbolic model checking in an industrial setting. We have proved that the initial boot code running in data centers at Amazon Web Services is memory safe, an essential step in establishing the security of any data center. Standard static analysis tools cannot be easily used on boot code without modification owing to issues not commonly found in higher-level code, including memory-mapped device interfaces, byte-level memory access, and linker scripts. This paper describes automated solutions to these issues and their implementation in the C Bounded Model Checker (CBMC). CBMC is now the first source-level static analysis tool to extract the memory layout described in a linker script for use in its analysis
In vivo Expansion of Naïve CD4+CD25high FOXP3+ Regulatory T Cells in Patients with Colorectal Carcinoma after IL-2 Administration
Regulatory T cells (Treg cells) are increased in context of malignancies and their expansion can be correlated with higher disease burden and decreased survival. Initially, interleukin 2 (IL-2) has been used as T-cell growth factor in clinical vaccination trials. In murine models, however, a role of IL-2 in development, differentiation, homeostasis, and function of Treg cells was established. In IL-2 treated cancer patients a further Treg-cell expansion was described, yet, the mechanism of expansion is still elusive. Here we report that functional Treg cells of a naïve phenotype - as determined by CCR7 and CD45RA expression - are significantly expanded in colorectal cancer patients. Treatment of 15 UICC stage IV colorectal cancer patients with IL-2 in a phase I/II peptide vaccination trial further enlarges the already increased naïve Treg-cell pool. Higher frequencies of T-cell receptor excision circles in naïve Treg cells indicate IL-2 dependent thymic generation of naïve Treg cells as a mechanism leading to increased frequencies of Treg cells post IL-2 treatment in cancer patients. This finding could be confirmed in naïve murine Treg cells after IL-2 administration. These results point to a more complex regulation of Treg cells in context of IL-2 administration. Future strategies therefore might aim at combining IL-2 therapy with novel strategies to circumvent expansion and differentiation of naïve Treg cells
Influence of Prior Influenza Vaccination on Antibody and B-Cell Responses
Currently two vaccines, trivalent inactivated influenza vaccine (TIV) and live attenuated influenza vaccine (LAIV), are licensed in the USA. Despite previous studies on immune responses induced by these two vaccines, a comparative study of the influence of prior influenza vaccination on serum antibody and B-cell responses to new LAIV or TIV vaccination has not been reported. During the 2005/6 influenza season, we quantified the serum antibody and B-cell responses to LAIV or TIV in adults with differing influenza vaccination histories in the prior year: LAIV, TIV, or neither. Blood samples were collected on days 0, 7–9 and 21–35 after immunization and used for serum HAI assay and B-cell assays. Total and influenza-specific circulating IgG and IgA antibody secreting cells (ASC) in PBMC were detected by direct ELISPOT assay. Memory B cells were also tested by ELISPOT after polyclonal stimulation of PBMC in vitro. Serum antibody, effector, and memory B-cell responses were greater in TIV recipients than LAIV recipients. Prior year TIV recipients had significantly higher baseline HAI titers, but lower HAI response after vaccination with either TIV or LAIV, and lower IgA ASC response after vaccination with TIV than prior year LAIV or no vaccination recipients. Lower levels of baseline HAI titer were associated with a greater fold-increase of HAI titer and ASC number after vaccination, which also differed by type of vaccine. Our findings suggest that the type of vaccine received in the prior year affects the serum antibody and the B-cell responses to subsequent vaccination. In particular, prior year TIV vaccination is associated with sustained higher HAI titer one year later but lower antibody response to new LAIV or TIV vaccination, and a lower effector B-cell response to new TIV but not LAIV vaccination
Distribution and Molecular Evolution of Bacillus anthracis Genotypes in Namibia
The recent development of genetic markers for Bacillus anthracis has made it possible to monitor the spread and distribution of this pathogen during and between anthrax outbreaks. In Namibia, anthrax outbreaks occur annually in the Etosha National Park (ENP) and on private game and livestock farms. We genotyped 384 B. anthracis isolates collected between 1983–2010 to identify the possible epidemiological correlations of anthrax outbreaks within and outside the ENP and to analyze genetic relationships between isolates from domestic and wild animals. The isolates came from 20 animal species and from the environment and were genotyped using a 31-marker multi-locus-VNTR-analysis (MLVA) and, in part, by twelve single nucleotide polymorphism (SNP) markers and four single nucleotide repeat (SNR) markers. A total of 37 genotypes (GT) were identified by MLVA, belonging to four SNP-groups. All GTs belonged to the A-branch in the cluster- and SNP-analyses. Thirteen GTs were found only outside the ENP, 18 only within the ENP and 6 both inside and outside. Genetic distances between isolates increased with increasing time between isolations. However, genetic distance between isolates at the beginning and end of the study period was relatively small, indicating that while the majority of GTs were only found sporadically, three genetically close GTs, accounting for more than four fifths of all the ENP isolates, appeared dominant throughout the study period. Genetic distances among isolates were significantly greater for isolates from different host species, but this effect was small, suggesting that while species-specific ecological factors may affect exposure processes, transmission cycles in different host species are still highly interrelated. The MLVA data were further used to establish a model of the probable evolution of GTs within the endemic region of the ENP. SNR-analysis was helpful in correlating an isolate with its source but did not elucidate epidemiological relationships
- …