Learn More
Inhibition of BCR-ABL by imatinib induces durable responses in many patients with chronic myeloid leukemia (CML), but resistance attributable to kinase domain mutations can lead to relapse and a switch to second-line therapy with nilotinib or dasatinib. Despite three approved therapeutic options, the cross-resistant BCR-ABL(T315I) mutation and compound(More)
This study was undertaken to evaluate the effect of simvastatin, a cholesterol-lowering agent, on the Akt-mediated signaling pathway and neurogenesis in the dentate gyrus (DG) of the hippocampus in rats after traumatic brain injury (TBI). Adult male Wistar rats were divided into three groups: (1) sham group (n = 8); (2) saline control group (n = 40); and(More)
Clustering analysis is a primary method for data mining. Density clustering has such advantages as: its clusters are easy to understand and it does not limit itself to shapes of clusters. But existing density-based algorithms have trouble in finding out all the meaningful clusters for datasets with varied densities. This paper introduces a new algorithm(More)
Avoiding kernel vulnerabilities is critical to achieving security of many systems, because the kernel is often part of the trusted computing base. This paper evaluates the current state-of-the-art with respect to kernel protection techniques, by presenting two case studies of Linux kernel vulnerabilities. First, this paper presents data on 141 Linux kernel(More)
The IEEE 802.11 standards support the peer-to-peer mode independent basic service set (IBSS), which is an ad hoc network with all its stations within each other's transmission range. In an IBSS, it is important that all stations are synchronized to a common clock. Synchronization is needed for frequency hopping and power saving. The synchronization(More)
The security of many applications relies on the kernel being secure, but history suggests that kernel vulnerabilities are routinely discovered and exploited. In particular, exploitable vulnerabilities in kernel modules are common. This paper proposes LXFI, a system which isolates kernel modules from the core kernel so that vulnerabilities in kernel modules(More)
Standard state-machine replication involves consensus on a sequence of totally ordered requests through, for example, the Paxos protocol. Such a sequential execution model is becoming outdated on prevalent multi-core servers. Highly concurrent executions on multi-core architectures introduce non-determinism related to thread scheduling and lock contentions,(More)
Aging is an independent risk factor for CKD, but the molecular mechanisms that link aging and CKD are not well understood. The antiaging protein Klotho may be an endogenous antagonist of Wnt/β-catenin signaling, which promotes fibrogenesis, suggesting that loss of Klotho may contribute to CKD through increased Wnt/β-catenin activity. Here, normal adult(More)
Examining the spontaneous activity to understand the neural mechanism of brain disorder is a focus in recent resting-state fMRI. In the current study, to investigate the alteration of brain functional connectivity in partial epilepsy in a systematical way, two levels of analyses (functional connectivity analysis within resting state networks (RSNs) and(More)
The sigma-2 receptor, whose gene remains to be cloned, has been validated as a biomarker for tumour cell proliferation. Here we report the use of a novel photoaffinity probe, WC-21, to identify the sigma-2 receptor-binding site. WC-21, a sigma-2 ligand containing both a photoactive azide moiety and a fluorescein isothiocyanate group, irreversibly labels(More)