Learn More
Microsatellite primers are often developed in one species and used to assess neutral variability in related species. Such analyses may be confounded by ascertainment bias (i.e. a decline in amplification success and allelic variability with increasing genetic distance from the source of the microsatellites). In addition, other factors, such as the size of(More)
We scoped, designed, produced, and evaluated the effectiveness of a recreational tabletop card game created to raise awareness of and alter perceptions regarding-computer security. We discuss our process, the challenges that arose, and the decisions we made to address those challenges. As of May 2013, we have shipped approximately 800 free copies to 150(More)
Histone deacetylase inhibitor romidepsin has demonstrated durable clinical responses and tolerability in patients with relapsed/refractory peripheral and cutaneous T-cell lymphoma (PTCL, CTCL). Selection of novel drug therapies for patients with relapsed/refractory aggressive lymphoma requires not only considerations regarding efficacy but also careful(More)
PURPOSE AND-34/BCAR3 (Breast Cancer Anti-Estrogen Resistance 3) associates with the focal adhesion adaptor protein, p130CAS/BCAR1. Expression of AND-34 regulates epithelial cell growth pattern, motility, and growth factor dependence. We sought to establish the effects of the loss of AND-34 expression in a mammalian organism. METHODS AND-34(-/-) mice were(More)
One- and two-dimensional barcodes, including Quick Response (QR) codes, have become a convenient way to communicate small amounts of information from physical objects to mobile devices. While there is much discussion, awareness, and proposed use of such barcodes, both in aca-demia and in industry, to our knowledge there has not been a systematic and(More)
In this paper, we present a novel interdomain network architecture that is based on the application of the principle of least privilege. By applying this design principle from the ground up, we can reduce the scope for a large range of misbehaviors (both unintentional and intentional), including configuration errors, DoS attacks, malicious behavior by ISPs,(More)
We study legal and policy issues surrounding crypto currencies , such as Bitcoin, and how those issues interact with technical design options. With an interdisciplinary team, we consider in depth a variety of issues surrounding law, policy, and crypto currencies — such as the physical location where a crypto currency's value exists for jurisdictional and(More)
  • Giulia Fanti, Adam Lerner, Yahel Ben-David, Barath Raghavan
  • 2015
Recent years have seen the rise of a new type of state-level adversary. Governments have shown themselves willing to both surveil their citizens using Internet infrastructure and impose blackouts to shut off that very infrastructure during times of civil strife. However , it is exactly during such strife that citizens need secure, reliable , and anonymous(More)
Though web tracking and its privacy implications have received much attention in recent years, that attention has come relatively recently in the history of the web and lacks full historical context. In this paper, we present longitudinal measurements of third-party web tracking behaviors from 1996 to present (2016). Our tool, TrackingExcavator, leverages a(More)
Stimulation of cAMP signaling induces apoptosis in glucocorticoid-sensitive and resistant CEM leukemic and MM.1 multiple myeloma cell lines, and this effect is enhanced by dexamethasone in both glucocorticoid-sensitive cell types and in glucocorticoid-resistant CEM cells. Expression of the mRNA for the glucocorticoid receptor alpha (GR) promoters 1A3, 1B(More)