Learn More
The bone marrow microenvironment may be permissive to the emergence and progression of acute myeloid leukemia (AML). Studying interactions between the microenvironment and leukemia cells should provide new insight for therapeutic advances. Mesenchymal stromal cells (MSCs) are central to the maintenance of the hematopoietic niche. Here we compared the(More)
SystemC is a system-level modeling language and simulation framework which facilitates design and verification of processor designs at different levels. Recently, SystemC is becoming a popular choice for designers of both System-On-Chip (SoC) and embedded processors, due to its adaptability at cycle as well as transaction levels, and ability to model(More)
The role of bone marrow-derived mesenchymal stem/stromal cells (MSCs) in creating a permissive microenvironment that supports the emergence and progression of acute myeloid leukemia (AML) is not well established. We investigated the extent to which adipogenic differentiation in normal MSCs alters hematopoietic supportive capacity and we undertook an(More)
Cloud computing has evolved as a popular computing environment. In data centric applications hosted on the cloud, data is accessed and updated in a purely distributed manner. The distributed data structures used for dynamic storage of the data for such applications require two fundamental qualities, authentication and persistence, which are not completely(More)
Erasure coded storage schemes offer a promising future for cloud storage. Highlights of erasure coded storage systems are that these offer the same level of fault tolerance as that of replication, at lower storage footprints. In the big data era, cloud storage systems based on data replication are of dubious usability due to 200% storage overhead in data(More)
Virtual machines (VM) are rapidly replacing physical machine infrastructures for their abilities to emulate hardware environments, share hardware resources, and utilize a variety of operating systems (OS). VMs provide a better security model than traditional machines by providing an additional layer of hardware abstraction and isolation, effective external(More)
Event reconstruction is the process that explains the 'how' and 'why' of an evidence in a digital investigation. Formalization of this process is essential because the evidence is of legal value which requires a logical reasoning. A finite state machine approach and formalization of the event reconstruction problem had been proposed by Gladyshev. The(More)
Virtualization is a vital part of computing today. Rollback is an important feature to be supported by virtualization. However, hackers leverage rollback and pose serious security threats to systems running in a virtualized environment. The aim of this paper is to identify such security threats and propose a comprehensive solution. In this paper, we propose(More)