50 research outputs found

    An active buffer management technique for providing interactive functions in broadcast video-on-demand systems

    Get PDF
    Multicast delivery is an efficient approach to the provision of a video-on-demand (VoD) service. Interacting with the video stream is a desirable feature for users. However, it is a challenging task to provide the functionality in the multicast environment because a lot of users share multicast delivery channels. In this paper, we propose an active buffer management technique to provide interactive functions in broadcast VoD systems. In our scheme, the client can selectively prefetch segments from broadcast channels based on the observation of the play point in its local buffer. The content of the buffer is adjusted in such a way that the relative position of the play point is kept in the middle part of the buffer. Our simulations show that the active buffer management scheme can implement interactive actions through buffering with a high probability in a wide range of user interaction levels. © 2005 IEEE

    Carry-Over Round Robin: A Simple Cell Scheduling Mechaniasm for ATM Networks

    Get PDF
    We propose a simple cell scheduling mechanism for ATM networks. The proposed mechanism, named Carry-Over Round Robin (CORR), is an extension of weighted round robin scheduling. We show that albeit its simplicity, CORR achieves tight bounds on end-to-end delay and near perfect fairness. Using a variety of video traffic traces we show that CORR often outperforms some of the more complex scheduling disciplines such as Packet-by-Packet Generalized Processor Sharing (PGPS). (Also cross-referenced as UMIACS-TR-96-45

    A Yersinia Effector with Enhanced Inhibitory Activity on the NF-κB Pathway Activates the NLRP3/ASC/Caspase-1 Inflammasome in Macrophages

    Get PDF
    A type III secretion system (T3SS) in pathogenic Yersinia species functions to translocate Yop effectors, which modulate cytokine production and regulate cell death in macrophages. Distinct pathways of T3SS-dependent cell death and caspase-1 activation occur in Yersinia-infected macrophages. One pathway of cell death and caspase-1 activation in macrophages requires the effector YopJ. YopJ is an acetyltransferase that inactivates MAPK kinases and IKKβ to cause TLR4-dependent apoptosis in naïve macrophages. A YopJ isoform in Y. pestis KIM (YopJKIM) has two amino acid substitutions, F177L and K206E, not present in YopJ proteins of Y. pseudotuberculosis and Y. pestis CO92. As compared to other YopJ isoforms, YopJKIM causes increased apoptosis, caspase-1 activation, and secretion of IL-1β in Yersinia-infected macrophages. The molecular basis for increased apoptosis and activation of caspase-1 by YopJKIM in Yersinia-infected macrophages was studied. Site directed mutagenesis showed that the F177L and K206E substitutions in YopJKIM were important for enhanced apoptosis, caspase-1 activation, and IL-1β secretion. As compared to YopJCO92, YopJKIM displayed an enhanced capacity to inhibit phosphorylation of IκB-α in macrophages and to bind IKKβ in vitro. YopJKIM also showed a moderately increased ability to inhibit phosphorylation of MAPKs. Increased caspase-1 cleavage and IL-1β secretion occurred in IKKβ-deficient macrophages infected with Y. pestis expressing YopJCO92, confirming that the NF-κB pathway can negatively regulate inflammasome activation. K+ efflux, NLRP3 and ASC were important for secretion of IL-1β in response to Y. pestis KIM infection as shown using macrophages lacking inflammasome components or by the addition of exogenous KCl. These data show that caspase-1 is activated in naïve macrophages in response to infection with a pathogen that inhibits IKKβ and MAPK kinases and induces TLR4-dependent apoptosis. This pro-inflammatory form of apoptosis may represent an early innate immune response to highly virulent pathogens such as Y. pestis KIM that have evolved an enhanced ability to inhibit host signaling pathways

    YopJ-Induced Caspase-1 Activation in Yersinia-Infected Macrophages: Independent of Apoptosis, Linked to Necrosis, Dispensable for Innate Host Defense

    Get PDF
    Yersinia outer protein J (YopJ) is a type III secretion system (T3SS) effector of pathogenic Yersinia (Yersinia pestis, Yersinia enterocolitica and Yersinia pseudotuberculosis) that is secreted into host cells. YopJ inhibits survival response pathways in macrophages, causing cell death. Allelic variation of YopJ is responsible for differential cytotoxicity in Yersinia strains. YopJ isoforms in Y. enterocolitica O:8 (YopP) and Y. pestis KIM (YopJKIM) strains have high cytotoxic activity. In addition, YopJKIM-induced macrophage death is associated with caspase-1 activation and interleukin-1β (IL-1β secretion. Here, the mechanism of YopJKIM-induced cell death, caspase-1 activation, and IL-1β secretion in primary murine macrophages was examined. Caspase-3/7 activity was low and the caspase-3 substrate poly (ADP-ribose) polymerase (PARP) was not cleaved in Y. pestis KIM5-infected macrophages. In addition, cytotoxicity and IL-1β secretion were not reduced in the presence of a caspase-8 inhibitor, or in B-cell lymphoma 2 (Bcl-2)-associated X protein (Bax)/Bcl-2 homologous antagonist/killer (Bak) knockout macrophages, showing that YopJKIM-mediated cell death and caspase-1 activation occur independent of mitochondrial-directed apoptosis. KIM5-infected macrophages released high mobility group protein B1 (HMGB1), a marker of necrosis, and microscopic analysis revealed that necrotic cells contained active caspase-1, indicating that caspase-1 activation is associated with necrosis. Inhibitor studies showed that receptor interacting protein 1 (RIP1) kinase and reactive oxygen species (ROS) were not required for cytotoxicity or IL-β release in KIM5-infected macrophages. IL-1β secretion was reduced in the presence of cathepsin B inhibitors, suggesting that activation of caspase-1 requires cathepsin B activity. Ectopically-expressed YopP caused higher cytotoxicity and secretion of IL-1β in Y. pseudotuberculosis-infected macrophages than YopJKIM. Wild-type and congenic caspase 1 knockout C57BL/6 mice were equally susceptible to lethal infection with Y. pseudotuberculosis ectopically expressing YopP. These data suggest that YopJ-induced caspase-1 activation in Yersinia-infected macrophages is a downstream consequence of necrotic cell death and is dispensable for innate host resistance to a strain with enhanced cytotoxicity

    Reducing the environmental impact of surgery on a global scale: systematic review and co-prioritization with healthcare workers in 132 countries

    Get PDF
    Abstract Background Healthcare cannot achieve net-zero carbon without addressing operating theatres. The aim of this study was to prioritize feasible interventions to reduce the environmental impact of operating theatres. Methods This study adopted a four-phase Delphi consensus co-prioritization methodology. In phase 1, a systematic review of published interventions and global consultation of perioperative healthcare professionals were used to longlist interventions. In phase 2, iterative thematic analysis consolidated comparable interventions into a shortlist. In phase 3, the shortlist was co-prioritized based on patient and clinician views on acceptability, feasibility, and safety. In phase 4, ranked lists of interventions were presented by their relevance to high-income countries and low–middle-income countries. Results In phase 1, 43 interventions were identified, which had low uptake in practice according to 3042 professionals globally. In phase 2, a shortlist of 15 intervention domains was generated. In phase 3, interventions were deemed acceptable for more than 90 per cent of patients except for reducing general anaesthesia (84 per cent) and re-sterilization of ‘single-use’ consumables (86 per cent). In phase 4, the top three shortlisted interventions for high-income countries were: introducing recycling; reducing use of anaesthetic gases; and appropriate clinical waste processing. In phase 4, the top three shortlisted interventions for low–middle-income countries were: introducing reusable surgical devices; reducing use of consumables; and reducing the use of general anaesthesia. Conclusion This is a step toward environmentally sustainable operating environments with actionable interventions applicable to both high– and low–middle–income countries

    Comparison of Scalable Key Distribution Schemes for Secure Group Communication

    Get PDF
    Scalable secure key distribution is the most important feature of a scalable secure group communication protocol. Most of the existing scalable secure group communication protocols are based on a hierarchical key distribution tree. These schemes can be classified as hierarchical node based schemes and hierarchical key based schemes. In this paper; we compare recently proposed hierarchical key distribution schemes through simulation using real-life multicast group membership traces. Our simulations show that hierarchical node based approaches better distribute encryption cost among the entities of a multicast group. However hierarchical node based schemes “trust” internal nodes of a key distribution tree. We show that the dual encryption protocol recently proposed by us overcomes the aforementioned limitation of hierarchical node based schemes, with a marginal performance penalty

    DISEC: A Distributed Framework for Scalable Secure Many-to-Many Communication

    Get PDF
    Secure one-to-many multicasting has been a popular research area in the recent past. Secure many-to-many multicasting is becoming popular with applications such as private conferencing and distributed interactive simulation. Most of the existing secure multicasting protocols use a centralized group manager to enforce access control and for key distribution. In the presence of multiple senders it is desirable to delegate group management responsibility to all the senders. We propose a distributed group key management scheme to support secure many-to-many communication. We divide key distribution overhead evenly among the senders. Our protocol is scalable and places equal trust in all the senders

    A Dual Encryption Protocol for Scalable Secure Multicasting

    Get PDF
    In this paper we propose a dual encryption protocol for scalable secure multicasting. Multicasting is a scalable solution for group communication. It howevel; poses several unique security problems. We use hierarchical subgrouping to achieve scalability. Third party hosts or members of the multicast group are designated as subgroup managers. They are responsible for secret key distribution and group membership management at the subgroup level. Unlike existing secure multicast protocols, our protocol need not trust the subgroup managers with the distribution of data encryption keys. The dual encryption protocol proposed in this paper distributes encrypted data encryption keys via subgroup managers. We also present a class$cation of the existing secure multicast protocols, compare their relative merits and show the advantages of our protocol
    corecore