23 research outputs found

    31st Annual Meeting and Associated Programs of the Society for Immunotherapy of Cancer (SITC 2016) : part two

    Get PDF
    Background The immunological escape of tumors represents one of the main ob- stacles to the treatment of malignancies. The blockade of PD-1 or CTLA-4 receptors represented a milestone in the history of immunotherapy. However, immune checkpoint inhibitors seem to be effective in specific cohorts of patients. It has been proposed that their efficacy relies on the presence of an immunological response. Thus, we hypothesized that disruption of the PD-L1/PD-1 axis would synergize with our oncolytic vaccine platform PeptiCRAd. Methods We used murine B16OVA in vivo tumor models and flow cytometry analysis to investigate the immunological background. Results First, we found that high-burden B16OVA tumors were refractory to combination immunotherapy. However, with a more aggressive schedule, tumors with a lower burden were more susceptible to the combination of PeptiCRAd and PD-L1 blockade. The therapy signifi- cantly increased the median survival of mice (Fig. 7). Interestingly, the reduced growth of contralaterally injected B16F10 cells sug- gested the presence of a long lasting immunological memory also against non-targeted antigens. Concerning the functional state of tumor infiltrating lymphocytes (TILs), we found that all the immune therapies would enhance the percentage of activated (PD-1pos TIM- 3neg) T lymphocytes and reduce the amount of exhausted (PD-1pos TIM-3pos) cells compared to placebo. As expected, we found that PeptiCRAd monotherapy could increase the number of antigen spe- cific CD8+ T cells compared to other treatments. However, only the combination with PD-L1 blockade could significantly increase the ra- tio between activated and exhausted pentamer positive cells (p= 0.0058), suggesting that by disrupting the PD-1/PD-L1 axis we could decrease the amount of dysfunctional antigen specific T cells. We ob- served that the anatomical location deeply influenced the state of CD4+ and CD8+ T lymphocytes. In fact, TIM-3 expression was in- creased by 2 fold on TILs compared to splenic and lymphoid T cells. In the CD8+ compartment, the expression of PD-1 on the surface seemed to be restricted to the tumor micro-environment, while CD4 + T cells had a high expression of PD-1 also in lymphoid organs. Interestingly, we found that the levels of PD-1 were significantly higher on CD8+ T cells than on CD4+ T cells into the tumor micro- environment (p < 0.0001). Conclusions In conclusion, we demonstrated that the efficacy of immune check- point inhibitors might be strongly enhanced by their combination with cancer vaccines. PeptiCRAd was able to increase the number of antigen-specific T cells and PD-L1 blockade prevented their exhaus- tion, resulting in long-lasting immunological memory and increased median survival

    The role of gender in the International Conference on Pervasive Computing and Communications

    No full text
    Abstract The International Conference on Pervasive Computing and Communications (IEEE PerCom) is a CORE 2021 A* conference (top 7% of ranked venues) that aims to present scientific advances in a broad spectrum of technologies and topics in ubiquitous/pervasive computing, including wireless networking, mobile and distributed computing, sensor systems, ambient intelligence, and smart devices. During the last couple of years, the PerCom organization committee has successfully included many prestigious female researchers to submit, participate, and organize the conference. However, there is still work to do and to help the progress, this article analyses the history of the conference from a gender perspective. This article goes through accepted articles of the last 20 years of the PerCom conferences, showing that even if the role of female authors, in general, has increased, more first and leading female researchers should still be welcomed in the community. Through this analysis, this article aims to highlight the role of gender in the conference program and seeks to find trends and possible improvements to achieve a broader gender balance in pervasive computing

    LinkEdge:open-sourced MLOps integration with IoT edge

    No full text
    Abstract MLOps, or Machine Learning Operations, play a significant role in streamlining production deployment, monitoring, and management of machine learning models. Integrating MLOps with edge devices poses unique challenges that require customised deployment strategies and efficient model optimisation techniques. This paper introduces LinkEdge, a set of tools that enable the integration of MLOps practices with edge devices. LinkEdge consists of two sets of tools: one for setting up infrastructure within edge devices to be able to receive, monitor, and run inference on ML models and another for MLOps pipelines to package models to be compatible with the inference and monitoring components of the respective edge devices. The LinkEdge platform is evaluated by obtaining a public dataset for predicting the breakdown of Air Pressure Systems in trucks. Additionally, the platform is compared against a commercial tool that serves similar purposes. The overall performance of LinkEdge matches that of already existing tools and services while allowing end users setting up Edge-MLOps infrastructure the complete freedom to set up their system without entirely relying on third-party licensed software

    Skadi:heterogeneous human-sensing system for automotive IoT

    No full text
    Abstract Over the past years, cars’ computing, sensing, and networking capabilities have rapidly increased, and the automotive development aims for autonomous driving. However, the driver is still the focal point for decision making. It has to be alert at all times to avoid traffic accidents due to human factors like tiredness, inattentiveness, and intoxication. Therefore, there is a need for a system that monitors the driver and intervenes before human failure can have a negative impact on traffic. A variety of commercially available wearable IoT devices, such as smartwatches, bracelets, and rings, are capable of monitoring human health conditions. However, those devices come with technological differences and manufacturer-specific implementations. This paper proposes a prototype for a human-sensing and health monitoring system based on wearable sensor devices. The aim is to find a solution that ignores the technological heterogeneity of IoT devices and generalises their implementation into the automotive system. Consequently, the data should be available to be analysed together with the data collected from the vehicular sensors. Our solution is compatible with open-source platforms Eclipse Hono and Kuksa

    Public and open Internet of Things for smart cities:the SME perspective

    No full text
    Abstract Internet of Things technologies and platforms can provide both novel applications and business strategies for the companies of different technological application areas. However, risks for intensive participation in utilizing novel and expensive technologies into their business and products, might be considered risky by small and medium-sized enterprises (SMEs). Thus, the role of the open source platforms and possibility to test them in the small-scale pilot studies, becomes crucial. In this work, we discuss four different SMEs participating in the open and research-driven IoT pilots in the context of the smart cities. We demonstrate the value of the open Internet of Things platforms can provide for small and medium-sized enterprises working in the area of smart cities, as well as challenges we met

    Challenges on collecting smartphone data in cold environments

    No full text
    Abstract Smartphones can be considered the cheapest and well-penetrated devices for collecting everyday human behaviour data. However, smartphones, as any battery-dependant electronic devices, face a number of problems when exposed to below-freezing conditions, from sudden crashes and decreased battery life to challenging usage experiences such as freezing fingers especially during prolonged periods of time. In this paper, we present the results of a user survey (N=130, 59% female) exploring smartphone usage in below-freezing temperatures, including the problems caused by cold conditions and prevention mechanisms users could be willing to take to protect their device and user experience during winter months

    Towards real-time learning for edge-cloud continuum with vehicular computing

    No full text
    Abstract Sensor-driven IoT systems are well-known for their capacity to accelerate massive amounts of data in a comparatively short period of time. To have any use, the information delivery and decision making based on the data require efficient learning models together with dynamically deployed computing and network resources. The current cloud and high-performance computing infrastructures, as well as modern edge computing systems especially in the 5G and beyond networks, can be addressed to resolve these challenges. However, there are several application areas especially in vehicular and urban computing, where just harnessing more computational power does not solve computational and real-time requirements of the modern sensing systems that operate in mobile and context-dependent environments. For now, the mathematical challenges of distributed computing and real-time learning algorithms have not been profoundly addressed in the context of the IoT and real-world sensing applications. Data-driven systems also require giving full attention to information delivery, data management, data cleaning, and sensor fusion technologies that need to be equally distributed and real-time competent as the learning algorithms themselves. New software-defined computing and networking approaches and architectures are required to orchestrate the numerous connected resources dynamically, controllably, and securely along with the evolving needs. The key challenge here is to uniform collaboration between different aspects of the system, from data processing and delivery to the algorithms and learning models, not forgetting the computational capacity and networking capabilities, all this in real-time with real-world applications

    Weathering the reallocation storm:large-scale analysis of edge server workload

    No full text
    Abstract Efficient service placement and workload allocation methods are necessary enablers for the actively studied topic of edge computing. In this paper, we show that under certain circumstances, the number of superfluous workload reallocations from one edge server to another may grow to a significant proportion of all user tasks — a phenomenon we present as a reallocation storm. We showcase this phenomenon on a city-scale edge server deployment by simulating the allocation of user task workloads in a number of scenarios capturing likely edge computing deployments and usage patterns. The simulations are based on a large real-world data set of city-wide Wi-Fi network connections in 2013—2014, with more than 47M connections over ca. 800 access points. We identify the conditions for avoiding the reallocation storm for three common edge-based reallocation strategies, and study the latency-workload trade-off related to each strategy. As a result, we find that the superfluous reallocations vanish when the edge server capacity is increased above a certain threshold, unique for each reallocation strategy, peaking at ca. 35% of top ES workload. Further, while a reallocation strategy aiming to minimize reallocation distance consistently resulted in the worst reallocation storms, the two other strategies, namely, a random reallocation strategy, and a bottom-up strategy which always chooses the edge server with the lowest workload as a reallocation target, behave nearly identically in terms of latency as well as the reallocation storm in dense edge deployments. Since the random strategy requires much less coordination, we recommend it over the bottom-up one in dense ES deployments

    DatEthics:ethical data-centric design of intelligent behaviour

    No full text
    Abstract The Internet of Things makes human activity data — what people do, how they move, how they socialise — an abundant resource. However, this rich and intimate perspective on people, which uniquely shape and characterise their behaviours, can have tremendous ethical implication if data is handled irresponsibly. Being personal, contextual and accessible, mobile devices are key facilitators of (ir)responsible collection and use of data. In this workshop, we will use the Future Workshop approach to develop a research agenda towards ethical data-centric design of intelligent behaviours. As part of this approach, we will (1) criticise the current mechanisms and infrastructure to frame ethical challenges, (2) fantasise on futures which support user and designer values, and (3) implement a research agenda for the MobileHCI community to emphasise the barriers to tackle. The outcomes of this workshop will foster ethical research and inspire the MobileHCI community

    A dark and stormy night:reallocation storms in edge computing

    No full text
    Abstract Efficient resource usage in edge computing requires clever allocation of the workload of application components. In this paper, we show that under certain circumstances, the number of superfluous workload reallocations from one edge server to another may grow to a significant proportion of all user tasks—a phenomenon we present as a reallocation storm. We showcase this phenomenon on a city-scale edge server deployment by simulating the allocation of user task workloads in a number of scenarios capturing likely edge computing deployments and usage patterns. The simulations are based on a large real-world data set of city-wide Wi-Fi network connections, with more than 47M connections over ca. 560 access points. We study the occurrence of reallocation storms in three common edge-based reallocation strategies and compare the latency–workload trade-offs related to each strategy. As a result, we find that the superfluous reallocations vanish when the edge server capacity is increased above a certain threshold, unique for each reallocation strategy, peaking at ca. 35% of the peak ES workload. Further, while a reallocation strategy aiming to minimize latency consistently resulted in the worst reallocation storms, the two other strategies, namely a random reallocation strategy and a bottom-up strategy which always chooses the edge server with the lowest workload as a reallocation target, behave nearly identically in terms of latency as well as the reallocation storm in dense edge deployments. Since the random strategy requires much less coordination, we recommend it over the bottom-up one in dense ES deployments. Moreover, we study the conditions associated with reallocation storms. We discover that edge servers with the very highest workloads are best associated with reallocation storms, with other servers around the few busy nodes thus mirroring their workload. Further, we identify circumstances associated with an elevated risk of reallocation storms, such as summertime (ca. 4 times the risk than on average) and on weekends (ca. 1.5 times the risk). Furthermore, mass events such as popular sports games incurred a high risk (nearly 10 times that of the average) of a reallocation storm in a MEC-based scenario
    corecore