746 research outputs found
Clinical significance of epithelial-to-mesenchymal transition in laryngeal carcinoma: Its role in the different subsites
Background: During epithelial-to-mesenchymal transition, cancer cells lose adhesion capacity gaining migratory properties. The role of the process on prognosis has been evaluated in 50 cases of laryngeal carcinoma. Methods: E-cadherin, N-cadherin, β-catenin, α-catenin, γ-catenin, caveolin-1, and vimentin immunohistochemical expression were evaluated using a double score based on staining intensity and cellular localization. Results: Cytoplasmic E-cadherin and α/γ catenin staining were associated with a decrease in survival, cytoplasmic β-catenin was associated with advanced stage, and N-cadherin and vimentin expression were associated with poor differentiation and tumor relapse. On the basis of cancer cells, epithelial or mesenchymal morphological and immunophenotypic similarity we identified 4 main subgroups correlated with a transition to a more undifferentiated phenotype, which have a different pattern of relapse and survival. Conclusion: The negative prognostic role of epithelial-to-mesenchymal transition has been confirmed and a predictive role in glottic tumors has been suggested, leading us to propose epithelial-to-mesenchymal transition as an additional adverse feature in laryngeal carcinoma
Detecting time-fragmented cache attacks against AES using Performance Monitoring Counters
Cache timing attacks use shared caches in multi-core processors as side
channels to extract information from victim processes. These attacks are
particularly dangerous in cloud infrastructures, in which the deployed
countermeasures cause collateral effects in terms of performance loss and
increase in energy consumption. We propose to monitor the victim process using
an independent monitoring (detector) process, that continuously measures
selected Performance Monitoring Counters (PMC) to detect the presence of an
attack. Ad-hoc countermeasures can be applied only when such a risky situation
arises. In our case, the victim process is the AES encryption algorithm and the
attack is performed by means of random encryption requests. We demonstrate that
PMCs are a feasible tool to detect the attack and that sampling PMCs at high
frequencies is worse than sampling at lower frequencies in terms of detection
capabilities, particularly when the attack is fragmented in time to try to be
hidden from detection
PerfWeb: How to Violate Web Privacy with Hardware Performance Events
The browser history reveals highly sensitive information about users, such as
financial status, health conditions, or political views. Private browsing modes
and anonymity networks are consequently important tools to preserve the privacy
not only of regular users but in particular of whistleblowers and dissidents.
Yet, in this work we show how a malicious application can infer opened websites
from Google Chrome in Incognito mode and from Tor Browser by exploiting
hardware performance events (HPEs). In particular, we analyze the browsers'
microarchitectural footprint with the help of advanced Machine Learning
techniques: k-th Nearest Neighbors, Decision Trees, Support Vector Machines,
and in contrast to previous literature also Convolutional Neural Networks. We
profile 40 different websites, 30 of the top Alexa sites and 10 whistleblowing
portals, on two machines featuring an Intel and an ARM processor. By monitoring
retired instructions, cache accesses, and bus cycles for at most 5 seconds, we
manage to classify the selected websites with a success rate of up to 86.3%.
The results show that hardware performance events can clearly undermine the
privacy of web users. We therefore propose mitigation strategies that impede
our attacks and still allow legitimate use of HPEs
Involvement of pro-inflammatory cytokines and growth factors in the pathogenesis of Dupuytren's contracture: a novel target for a possible future therapeutic strategy?
Dupuytren's contracture (DC) is a benign fibro-proliferative disease of the hand causing fibrotic nodules and fascial cords which determine debilitating contracture and deformities of fingers and hands. The present study was designed to characterize pro-inflammatory cytokines and growth factors involved in the pathogenesis, progression and recurrence of this disease, in order to find novel targets for alternative therapies and strategies in controlling DC. The expression of pro-inflammatory cytokines and of growth factors was detected by immunohistochemistry in fibrotic nodules and normal palmar fascia resected respectively from patients affected by DC and carpal tunnel syndrome (CTS; as negative controls). Reverse transcription (RT)-PCR analysis and immunofluorescence were performed to quantify the expression of transforming growth factor (TGF)-β1, interleukin (IL)-1β and vascular endothelial growth factor (VEGF) by primary cultures of myofibroblasts and fibroblasts isolated from Dupuytren's nodules. Histological analysis showed high cellularity and high proliferation rate in Dupuytren's tissue, together with the presence of myofibroblastic isotypes; immunohistochemical staining for macrophages was completely negative. In addition, a strong expression of TGF-β1, IL-1β and VEGF was evident in the extracellular matrix and in the cytoplasm of fibroblasts and myofibroblasts in Dupuytren's nodular tissues, as compared with control tissues. These results were confirmed by RT-PCR and by immunofluorescence in pathological and normal primary cell cultures. These preliminary observations suggest that TGF-β1, IL-1β and VEGF may be considered potential therapeutic targets in the treatment of Dupuytren's disease (DD)
Z' Physics
The limits on extra neutral gauge bosons, which could be reached at LEP2, are
reviewed. Exclusion and discovery limits are discussed for f\bar f and WW
production.Comment: 20 pages Latex, 7 figures included by epsfig, Contribution to the
Proceedings the workshop "Physics at LEP2", Geneva, 199
Error Reduction Program
The details of a study to select, incorporate and evaluate the best available finite difference scheme to reduce numerical error in combustor performance evaluation codes are described. The combustor performance computer programs chosen were the two dimensional and three dimensional versions of Pratt & Whitney's TEACH code. The criteria used to select schemes required that the difference equations mirror the properties of the governing differential equation, be more accurate than the current hybrid difference scheme, be stable and economical, be compatible with TEACH codes, use only modest amounts of additional storage, and be relatively simple. The methods of assessment used in the selection process consisted of examination of the difference equation, evaluation of the properties of the coefficient matrix, Taylor series analysis, and performance on model problems. Five schemes from the literature and three schemes developed during the course of the study were evaluated. This effort resulted in the incorporation of a scheme in 3D-TEACH which is usuallly more accurate than the hybrid differencing method and never less accurate
Cross section of isolated prompt photons in hadron-hadron collisions
We consider the production of isolated prompt photons in hadronic collisions.
We present a general discussion in QCD perturbation theory of the isolation
criterion used by hadron collider experiments. The isolation criterion is
implemented in a computer programme of the Monte Carlo type, which evaluates
the production cross section at next-to-leading order accuracy in perturbative
QCD. The calculation includes both the direct and the fragmentation components
of the cross section, without any approximation of the dependence on the radius
R of the isolation cone. We examine the scale dependence of the isolated cross
section, the sensitivity of the cross section to the values of the isolation
parameters, and we provide a quantitative comparison between the full R
dependence and its small-R approximation.Comment: 29 pages, 1 figure, few comments slightly expanded, results
unchanged, misprints correcte
- …