3,116 research outputs found

    Forward-Secure Searchable Encryption on Labeled Bipartite Graphs

    Get PDF
    Forward privacy is a trending security notion of dynamic searchable symmetric encryption (DSSE). It guarantees the privacy of newly added data against the server who has knowledge of previous queries. The notion was very recently formalized by Bost (CCS \u2716) independently, yet the definition given is imprecise to capture how forward secure a scheme is. We further the study of forward privacy by proposing a generalized definition parametrized by a set of updates and restrictions on them. We then construct two forward private DSSE schemes over labeled bipartite graphs, as a generalization of those supporting keyword search over text files. The first is a generic construction from any DSSE, and the other is a concrete construction from scratch. For the latter, we designed a novel data structure called cascaded triangles, in which traversals can be performed in parallel while updates only affect the local regions around the updated nodes. Besides neighbor queries, our schemes support flexible edge additions and intelligent node deletions: The server can delete all edges connected to a given node, without having the client specify all the edges

    Characterization and immunomodulatory effects of canine adipose tissue- and bone marrow-derived mesenchymal stromal cells

    Get PDF
    Background Mesenchymal stromal cells (MSC) hold promise for both cell replacement and immune modulation strategies owing to their progenitor and non-progenitor functions, respectively. Characterization of MSC from different sources is an important and necessary step before clinical use of these cells is widely adopted. Little is known about the biology and function of canine MSC compared to their mouse or human counterparts. This knowledge-gap impedes development of canine evidence-based MSC technologies. Hypothesis and Objectives We hypothesized that canine adipose tissue (AT) and bone marrow (BM) MSC (derived from the same dogs) will have similar differentiation and immune modulatory profiles. Our objectives were to evaluate progenitor and non-progenitor functions as well as other characteristics of AT- and BM-MSC including 1) proliferation rate, 2) cell surface marker expression, 3) DNA methylation levels, 4) potential for trilineage differentiation towards osteogenic, adipogenic, and chondrogenic cell fates, and 5) immunomodulatory potency in vitro. Results 1) AT-MSC proliferated at more than double the rate of BM-MSC (population doubling times in days) for passage (P) 2, AT: 1.69, BM: 3.81; P3, AT: 1.80, BM: 4.06; P4, AT: 2.37, BM: 5.34; P5, AT: 3.20, BM: 7.21). 2) Canine MSC, regardless of source, strongly expressed cell surface markers MHC I, CD29, CD44, and CD90, and were negative for MHC II and CD45. They also showed moderate expression of CD8 and CD73 and mild expression of CD14. Minor differences were found in expression of CD4 and CD34. 3) Global DNA methylation levels were significantly lower in BM-MSC compared to AT-MSC. 4) Little difference was found between AT- and BM-MSC in their potential for adipogenesis and osteogenesis. Chondrogenesis was poor to absent for both sources in spite of adding varying levels of bone-morphogenic protein to our standard transforming growth factor (TGF-β3)-based induction medium. 5) Immunomodulatory capacity was equal regardless of cell source when tested in mitogen-stimulated lymphocyte reactions. Priming of MSC with pro-inflammatory factors interferon-gamma and/or tumour necrosis factor did not increase the lymphocyte suppressive properties of the MSC compared to untreated MSC. Conclusions/Significance No significant differences were found between AT- and BM-MSC with regard to their immunophenotype, progenitor, and non-progenitor functions. Both MSC populations showed strong adipogenic and osteogenic potential and poor chondrogenic potential. Both significantly suppressed stimulated peripheral blood mononuclear cells. The most significant differences found were the higher isolation success and proliferation rate of AT-MSC, which could be realized as notable benefits of their use over BM-MSC

    Improved HMM Models for High Performance Speech Recognition

    Get PDF
    In this paper we report on the various techniques that we tmplemented in order to improve the basic speech recognition performance of the BYBLOS system. Some ot these methods are new, while others are not. We present methods that improved pertbrmance as well as those that did not. The methods include Linear Discrirninan

    RNA-RNA Interactions Enable Specific Targeting of Noncoding RNAs to Nascent Pre-mRNAs and Chromatin Sites

    Get PDF
    Intermolecular RNA-RNA interactions are used by many noncoding RNAs (ncRNAs) to achieve their diverse functions. To identify these contacts, we developed a method based on RNA antisense purification to systematically map RNA-RNA interactions (RAP-RNA) and applied it to investigate two ncRNAs implicated in RNA processing: U1 small nuclear RNA, a component of the spliceosome, and Malat1, a large ncRNA that localizes to nuclear speckles. U1 and Malat1 interact with nascent transcripts through distinct targeting mechanisms. Using differential crosslinking, we confirmed that U1 directly hybridizes to 5′ splice sites and 5′ splice site motifs throughout introns and found that Malat1 interacts with pre-mRNAs indirectly through protein intermediates. Interactions with nascent pre-mRNAs cause U1 and Malat1 to localize proximally to chromatin at active genes, demonstrating that ncRNAs can use RNA-RNA interactions to target specific pre-mRNAs and genomic sites. RAP-RNA is sensitive to lower abundance RNAs as well, making it generally applicable for investigating ncRNAs

    The RIVUR Voiding Cystourethrogram Pilot Study: Experience with Radiologic Reading Concordance

    Get PDF
    Published cohorts of children with vesicoureteral reflux placed on antibiotic prophylaxis differ in baseline characteristics and methodology. These data have been combined in meta-analyses to derive treatment recommendations. We analyzed these cohorts in an attempt to understand the disparate outcomes reported

    On Sustainable Ring-based Anonymous Systems

    Get PDF
    Anonymous systems (e.g. anonymous cryptocurrencies and updatable anonymous credentials) often follow a construction template where an account can only perform a single anonymous action, which in turn potentially spawns new (and still single-use) accounts (e.g. UTXO with a balance to spend or session with a score to claim). Due to the anonymous nature of the action, no party can be sure which account has taken part in an action and, therefore, must maintain an ever-growing list of potentially unused accounts to ensure that the system keeps running correctly. Consequently, anonymous systems constructed based on this common template are seemingly not sustainable. In this work, we study the sustainability of ring-based anonymous systems, where a user performing an anonymous action is hidden within a set of decoy users, traditionally called a ``ring\u27\u27. On the positive side, we propose a general technique for ring-based anonymous systems to achieve sustainability. Along the way, we define a general model of decentralised anonymous systems (DAS) for arbitrary anonymous actions, and provide a generic construction which provably achieves sustainability. As a special case, we obtain the first construction of anonymous cryptocurrencies achieving sustainability without compromising availability. We also demonstrate the generality of our model by constructing sustainable decentralised anonymous social networks. On the negative side, we show empirically that Monero, one of the most popular anonymous cryptocurrencies, is unlikely to be sustainable without altering its current ring sampling strategy. The main subroutine is a sub-quadratic-time algorithm for detecting used accounts in a ring-based anonymous system
    • …
    corecore