39 research outputs found

    Circulating lymphocytes reflect the local immune response in patients with colorectal carcinoma

    Get PDF
    Tumor-infiltrating lymphocytes (TILs) correlate with the number and size of the surrounding lymph nodes in patients with colorectal carcinoma (CRC) and reflect the quality of the antitumor immune response. In this prospective study, we analyzed whether this response correlated with the circulating lymphocytes in peripheral blood (PB). In 47 patients with newly diagnosed CRC, flow cytometry was performed to analyze the B cells, T cells, NK cells, and a variety of their subsets in PB. The results were correlated with TILs in the resected tumor and with the number and size of the surrounding lymph nodes in nodal negative (N- patients (LN5: number of lymph nodes measuring ≥5 mm) and the metastasis-to-lymph node size ratio (MSR) in nodal positive patients (N+). Differences between the number of TILs could be seen between N+ and N- patients, dependent on the LN5 and MSR categories, with higher values in N- cases and in patients with a higher LN5 category or a lower MSR. Additionally, higher values of various circulating lymphocyte subgroups were observed in these patients. For the total PB lymphocytes, CD8 cells, and some of their subgroups, a positive correlation with the TILs was found. This study shows that circulating lymphocytes—in particular, cytotoxic T cells—correlate with the local antitumor immune response displayed by TILs and lymph node activation. Our findings indicate that local and generalized antitumor immune responses are concordant with their different components

    A process mining maturity model: Enabling organizations to assess and improve their process mining activities

    Get PDF
    Organizations employ process mining to discover, check, or enhance process models based on data from information systems to improve business processes. Even though process mining is increasingly relevant in academia and organizations, achieving process mining excellence and generating business value through its application is elusive. Maturity models can help to manage interdisciplinary teams in their efforts to plan, implement, and manage process mining in organizations. However, while numerous maturity models on business process management (BPM) are available, recent calls for process mining maturity models indicate a gap in the current knowledge base. We systematically design and develop a comprehensive process mining maturity model that consists of five factors comprising 23 elements, which organizations need to develop to apply process mining sustainably and successfully. We contribute to the knowledge base by the exaptation of existing BPM maturity models, and validate our model through its application to a real-world scenario

    Valuation of Systematic Risk in the Cross-Section of Credit Default Swap Spreads

    No full text
    We analyze the pricing of systematic risk factors in credit default swap (CDS) contracts in a two-stage empirical framework. Firstly we estimate contract-specific sensitivities (betas) to several systematic risk factors by time-series regressions using quoted CDS spreads of 339 U.S. entities from January 2004 to December 2010. Secondly, we show that these contract-specific sensitivities are cross-sectionally priced in CDS spreads after controlling for individual risk factors. We find that the credit market climate, the Cross-market Correlation, and the market volatility explain CDS spread changes and that their corresponding sensitivities (betas) are particularly priced in the cross-section. Our basic risk factors explain about 83% (90%) of the CDS spreads prior to (during) the crisis

    TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication

    No full text
    Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, a wallet-based authentication tool that improves previous solutions for protecting web-based authentication. In contrast to other wallet-based solutions, TruWallet provides (i) strong protection for users' credentials and sensitive data by cryptographically binding them to the user's platform configuration based on Trusted Computing technology, (ii) an automated login procedure where the server is authenticated independently from (SSL) certificates, thus limiting the possibility of attacks based on hijacked certificates and allowing less dependency on the SSL PKI model, and (iii) a secure migration protocol for transferring wallet data to other platforms. Our implementation uses a small virtualization-based security kernel with trusted computing support and works with standard SSL-based authentication solutions for the web, where only minor modifications and extensions are required. It is interoperable so that we can re-use existing operating systems and applications like web browsers
    corecore