746 research outputs found

    Clinical significance of epithelial-to-mesenchymal transition in laryngeal carcinoma: Its role in the different subsites

    Get PDF
    Background: During epithelial-to-mesenchymal transition, cancer cells lose adhesion capacity gaining migratory properties. The role of the process on prognosis has been evaluated in 50 cases of laryngeal carcinoma. Methods: E-cadherin, N-cadherin, β-catenin, α-catenin, γ-catenin, caveolin-1, and vimentin immunohistochemical expression were evaluated using a double score based on staining intensity and cellular localization. Results: Cytoplasmic E-cadherin and α/γ catenin staining were associated with a decrease in survival, cytoplasmic β-catenin was associated with advanced stage, and N-cadherin and vimentin expression were associated with poor differentiation and tumor relapse. On the basis of cancer cells, epithelial or mesenchymal morphological and immunophenotypic similarity we identified 4 main subgroups correlated with a transition to a more undifferentiated phenotype, which have a different pattern of relapse and survival. Conclusion: The negative prognostic role of epithelial-to-mesenchymal transition has been confirmed and a predictive role in glottic tumors has been suggested, leading us to propose epithelial-to-mesenchymal transition as an additional adverse feature in laryngeal carcinoma

    Detecting time-fragmented cache attacks against AES using Performance Monitoring Counters

    Get PDF
    Cache timing attacks use shared caches in multi-core processors as side channels to extract information from victim processes. These attacks are particularly dangerous in cloud infrastructures, in which the deployed countermeasures cause collateral effects in terms of performance loss and increase in energy consumption. We propose to monitor the victim process using an independent monitoring (detector) process, that continuously measures selected Performance Monitoring Counters (PMC) to detect the presence of an attack. Ad-hoc countermeasures can be applied only when such a risky situation arises. In our case, the victim process is the AES encryption algorithm and the attack is performed by means of random encryption requests. We demonstrate that PMCs are a feasible tool to detect the attack and that sampling PMCs at high frequencies is worse than sampling at lower frequencies in terms of detection capabilities, particularly when the attack is fragmented in time to try to be hidden from detection

    PerfWeb: How to Violate Web Privacy with Hardware Performance Events

    Full text link
    The browser history reveals highly sensitive information about users, such as financial status, health conditions, or political views. Private browsing modes and anonymity networks are consequently important tools to preserve the privacy not only of regular users but in particular of whistleblowers and dissidents. Yet, in this work we show how a malicious application can infer opened websites from Google Chrome in Incognito mode and from Tor Browser by exploiting hardware performance events (HPEs). In particular, we analyze the browsers' microarchitectural footprint with the help of advanced Machine Learning techniques: k-th Nearest Neighbors, Decision Trees, Support Vector Machines, and in contrast to previous literature also Convolutional Neural Networks. We profile 40 different websites, 30 of the top Alexa sites and 10 whistleblowing portals, on two machines featuring an Intel and an ARM processor. By monitoring retired instructions, cache accesses, and bus cycles for at most 5 seconds, we manage to classify the selected websites with a success rate of up to 86.3%. The results show that hardware performance events can clearly undermine the privacy of web users. We therefore propose mitigation strategies that impede our attacks and still allow legitimate use of HPEs

    Involvement of pro-inflammatory cytokines and growth factors in the pathogenesis of Dupuytren's contracture: a novel target for a possible future therapeutic strategy?

    Get PDF
    Dupuytren's contracture (DC) is a benign fibro-proliferative disease of the hand causing fibrotic nodules and fascial cords which determine debilitating contracture and deformities of fingers and hands. The present study was designed to characterize pro-inflammatory cytokines and growth factors involved in the pathogenesis, progression and recurrence of this disease, in order to find novel targets for alternative therapies and strategies in controlling DC. The expression of pro-inflammatory cytokines and of growth factors was detected by immunohistochemistry in fibrotic nodules and normal palmar fascia resected respectively from patients affected by DC and carpal tunnel syndrome (CTS; as negative controls). Reverse transcription (RT)-PCR analysis and immunofluorescence were performed to quantify the expression of transforming growth factor (TGF)-β1, interleukin (IL)-1β and vascular endothelial growth factor (VEGF) by primary cultures of myofibroblasts and fibroblasts isolated from Dupuytren's nodules. Histological analysis showed high cellularity and high proliferation rate in Dupuytren's tissue, together with the presence of myofibroblastic isotypes; immunohistochemical staining for macrophages was completely negative. In addition, a strong expression of TGF-β1, IL-1β and VEGF was evident in the extracellular matrix and in the cytoplasm of fibroblasts and myofibroblasts in Dupuytren's nodular tissues, as compared with control tissues. These results were confirmed by RT-PCR and by immunofluorescence in pathological and normal primary cell cultures. These preliminary observations suggest that TGF-β1, IL-1β and VEGF may be considered potential therapeutic targets in the treatment of Dupuytren's disease (DD)

    Z' Physics

    Get PDF
    The limits on extra neutral gauge bosons, which could be reached at LEP2, are reviewed. Exclusion and discovery limits are discussed for f\bar f and WW production.Comment: 20 pages Latex, 7 figures included by epsfig, Contribution to the Proceedings the workshop "Physics at LEP2", Geneva, 199

    Error Reduction Program

    Get PDF
    The details of a study to select, incorporate and evaluate the best available finite difference scheme to reduce numerical error in combustor performance evaluation codes are described. The combustor performance computer programs chosen were the two dimensional and three dimensional versions of Pratt & Whitney's TEACH code. The criteria used to select schemes required that the difference equations mirror the properties of the governing differential equation, be more accurate than the current hybrid difference scheme, be stable and economical, be compatible with TEACH codes, use only modest amounts of additional storage, and be relatively simple. The methods of assessment used in the selection process consisted of examination of the difference equation, evaluation of the properties of the coefficient matrix, Taylor series analysis, and performance on model problems. Five schemes from the literature and three schemes developed during the course of the study were evaluated. This effort resulted in the incorporation of a scheme in 3D-TEACH which is usuallly more accurate than the hybrid differencing method and never less accurate

    Cross section of isolated prompt photons in hadron-hadron collisions

    Get PDF
    We consider the production of isolated prompt photons in hadronic collisions. We present a general discussion in QCD perturbation theory of the isolation criterion used by hadron collider experiments. The isolation criterion is implemented in a computer programme of the Monte Carlo type, which evaluates the production cross section at next-to-leading order accuracy in perturbative QCD. The calculation includes both the direct and the fragmentation components of the cross section, without any approximation of the dependence on the radius R of the isolation cone. We examine the scale dependence of the isolated cross section, the sensitivity of the cross section to the values of the isolation parameters, and we provide a quantitative comparison between the full R dependence and its small-R approximation.Comment: 29 pages, 1 figure, few comments slightly expanded, results unchanged, misprints correcte
    corecore