990 resultados para Misbehaving nodes
Resumo:
The majority of HIV-infected individuals fail to produce protective antibodies and have diminished responses to new immunizations. We report here that even though there is an expansion of follicular helper T (TFH) cells in HIV-infected individuals, the cells are unable to provide adequate B cell help. We found a higher frequency of programmed cell death ligand 1 (PD-L1)(+) germinal center B cells from lymph nodes of HIV-infected individuals suggesting a potential role for PD-1-PD-L1 interaction in regulating TFH cell function. In fact, we show that engagement of PD-1 on TFH cells leads to a reduction in cell proliferation, activation, inducible T-cell co-stimulator (ICOS) expression and interleukin-21 (IL-21) cytokine secretion. Blocking PD-1 signaling enhances HIV-specific immunoglobulin production in vitro. We further show that at least part of this defect involves IL-21, as addition of this cytokine rescues antibody responses and plasma cell generation in vitro. Our results suggest that deregulation of TFH cell-mediated B cell help diminishes B cell responses during HIV infection and may be related to PD-1 triggering on TFH cells. These results demonstrate a role for TFH cell impairment in HIV pathogenesis and suggest that enhancing their function could have a major impact on the outcome and control of HIV infection, preventing future infections and improving immune responses to vaccinations.
Resumo:
Mice deficient in CCR7 signals show severe defects in lymphoid tissue architecture and immune response. These defects are due to impaired attraction of CCR7+ DC and CCR7+ T cells into the T zones of secondary lymphoid organs and altered DC maturation. It is currently unclear which CCR7 ligand mediates these processes in vivo as CCL19 and CCL21 show an overlapping expression pattern and blocking experiments have given contradictory results. In this study, we addressed this question using CCL19-deficient mice expressing various levels of CCL21. Complete deficiency of CCL19 and CCL21 but not CCL19 alone was found to be associated with abnormal frequencies and localization of DC in naïve LN. Similarly, CCL19 was not required for DC migration from the skin, full DC maturation and efficient T-cell priming. Our findings suggest that CCL21 is the critical CCR7 ligand regulating DC homeostasis and function in vivo with CCL19 being redundant for these processes.
Resumo:
Advancements in high-throughput technologies to measure increasingly complex biological phenomena at the genomic level are rapidly changing the face of biological research from the single-gene single-protein experimental approach to studying the behavior of a gene in the context of the entire genome (and proteome). This shift in research methodologies has resulted in a new field of network biology that deals with modeling cellular behavior in terms of network structures such as signaling pathways and gene regulatory networks. In these networks, different biological entities such as genes, proteins, and metabolites interact with each other, giving rise to a dynamical system. Even though there exists a mature field of dynamical systems theory to model such network structures, some technical challenges are unique to biology such as the inability to measure precise kinetic information on gene-gene or gene-protein interactions and the need to model increasingly large networks comprising thousands of nodes. These challenges have renewed interest in developing new computational techniques for modeling complex biological systems. This chapter presents a modeling framework based on Boolean algebra and finite-state machines that are reminiscent of the approach used for digital circuit synthesis and simulation in the field of very-large-scale integration (VLSI). The proposed formalism enables a common mathematical framework to develop computational techniques for modeling different aspects of the regulatory networks such as steady-state behavior, stochasticity, and gene perturbation experiments.
Resumo:
Mouse mammary tumor virus is known to infect newborn mice via mother's milk. A proposed key step for viral spread to the mammary gland is by the infection of lymphocytes. We show here that although in suckling mice retroviral proteins are found in all epithelial cells of the gut, viral DNA is exclusively detectable in the Peyer's patches. As early as 5 d after birth the infection leads to a superantigen response in the Peyer's patches but not in other lymphoid organs draining the intestine. Viral DNA can be detected before the superantigen response and becomes first evident in the Peyer's patches followed by mesenteric lymph nodes and finally all lymphoid organs.
Resumo:
A common operation in wireless ad hoc networks is the flooding of broadcast messages to establish network topologies and routing tables. The flooding of broadcast messages is, however, a resource consuming process. It might require the retransmission of messages by most network nodes. It is, therefore, very important to optimize this operation. In this paper, we first analyze the multipoint relaying (MPR) flooding mechanism used by the Optimized Link State Routing (OLSR) protocol to distribute topology control (TC) messages among all the system nodes. We then propose a new flooding method, based on the fusion of two key concepts: distance-enabled multipoint relaying and connected dominating set (CDS) flooding. We present experimental simulationsthat show that our approach improves the performance of previous existing proposals.
Resumo:
Telomerase is an RNA-dependent DNA polymerase that synthesizes telomeric DNA. Its activity is not detectable in most somatic cells but it is reactivated during tumorigenesis. In most cancers, the combination of hTERT hypermethylation and hypomethylation of a short promoter region is permissive for low-level hTERT transcription. Activated and malignant lymphocytes express high telomerase activity, through a mechanism that seems methylation-independent. The aim of this study was to determine which mechanism is involved in the enhanced expression of hTERT in lymphoid cells. Our data confirm that in B cells, some T cell lymphomas and non-neoplastic lymph nodes, the hTERT promoter is unmethylated. Binding sites for the B cell-specific transcription factor PAX5 were identified downstream of the ATG translational start site through EMSA and ChIP experiments. ChIP assays indicated that the transcriptional activation of hTERT by PAX5 does not involve repression of CTCF binding. In a B cell lymphoma cell line, siRNA-induced knockdown of PAX5 expression repressed hTERT transcription. Moreover, ectopic expression of PAX5 in a telomerase-negative normal fibroblast cell line was found to be sufficient to activate hTERT expression. These data show that activation of hTERT in telomerase-positive B cells is due to a methylation-independent mechanism in which PAX5 plays an important role.
Resumo:
Multihop ad-hoc networks have a dynamic topology. Retrieving a route towards a remote peer requires the execution of a recipient lookup, which can publicly reveal sensitive information about him. Within this context, we propose an efficient, practical and scalable solution to guaranteethe anonymity of recipients' nodes in ad-hoc networks.
Resumo:
Cognitive radio networks (CRN) sense spectrum occupancy and manage themselves to operate in unused bands without disturbing licensed users. The detection capability of a radio system can be enhanced if the sensing process is performed jointly by a group of nodes so that the effects of wireless fading and shadowing can be minimized. However, taking a collaborative approach poses new security threats to the system as nodes can report false sensing data to force a wrong decision. Providing security to the sensing process is also complex, as it usually involves introducing limitations to the CRN applications. The most common limitation is the need for a static trusted node that is able to authenticate and merge the reports of all CRN nodes. This paper overcomes this limitation by presenting a protocol that is suitable for fully distributed scenarios, where there is no static trusted node.
Resumo:
Cognitive radio networks sense spectrum occupancyand manage themselves to operate in unused bands without disturbing licensed users. Spectrum sensing is more accurate if jointly performed by several reliable nodes. Even though cooperative sensing is an active area of research, the secureauthentication of local sensing reports remains unsolved, thus empowering false results. This paper presents a distributed protocol based on digital signatures and hash functions, and ananalysis of its security features. The system allows determining a final sensing decision from multiple sources in a quick and secure way.
Resumo:
El despliegue de un esquema de confianza es fundamental para poder desarrollar servicios de seguridad que permitan administrar y operar una red. Sin embargo, las soluciones empleadas en las redes tradicionales no se adaptan a un entorno ad hoc debido a la naturaleza dinámica y sin infraestructura de estas redes. En el presente trabajo se propone un esquema de confianza práctico y eficiente basado en una infraestructura de clave pública distribuida, umbral y jerárquica, que no requiere sincronización temporal entre todos los nodos de la red. La autorización de usuarios en el sistema se hace a través de certificados de corta duración que eliminan la necesidad de mantener la publicación y diseminación de unas listas de revocación. Por otro lado, una entidad externa de confianza permite alargar la reputación de un usuario de la red más allá de la existencia de la propia red.
Resumo:
Mice with homologous disruption of the gene coding for the ligand-binding chain of the interferon (IFN) gamma receptor and derived from a strain genetically resistant to infection with Leishmania major have been used to study further the role of this cytokine in the differentiation of functional CD4+ T cell subsets in vivo and resistance to infection. Wild-type 129/Sv/Ev mice are resistant to infection with this parasite, developing only small lesions, which resolve spontaneously within 6 wk. In contrast, mice lacking the IFN-gamma receptor develop large, progressing lesions. After infection, lymph nodes (LN) and spleens from both wild-type and knockout mice showed an expansion of CD4+ cells producing IFN-gamma as revealed by measuring IFN-gamma in supernatants of specifically stimulated CD4+ T cells, by enumerating IFN-gamma-producing T cells, and by Northern blot analysis of IFN-gamma transcripts. No biologically active interleukin (IL) 4 was detected in supernatants of in vitro-stimulated LN or spleen cells from infected wild-type or deficient mice. Reverse transcription polymerase chain reaction analysis with primers specific for IL-4 showed similar IL-4 message levels in LN from both types of mice. The IL-4 message levels observed were comparable to those found in similarly infected C57BL/6 mice and significantly lower than the levels found in BALB/c mice. Anti-IFN-gamma treatment of both types of mice failed to alter the pattern of cytokines produced after infection. These data show that even in the absence of IFN-gamma receptors, T helper cell (Th) 1-type responses still develop in genetically resistant mice with no evidence for the expansion of Th2 cells.
Resumo:
Expression of tissue-specific homing molecules directs antigen-experienced T cells to particular peripheral tissues. In studies using soluble antigens that focused on skin and gut, antigen-presenting cells (APCs) within regional lymphoid tissues were proposed to be responsible for imprinting homing phenotypes. Whether this occurs in other sites and after physiologic antigen processing and presentation is unknown. We define in vivo imprinting of distinct homing phenotypes on monospecific T cells responding to antigens expressed by tumors in intracerebral, subcutaneous, and intraperitoneal sites with efficient brain-tropism of CD8 T cells crossprimed in the cervical lymph nodes (LNs). Multiple imprinting programs could occur simultaneously in the same LN when tumors were present in more than one site. Thus, the identity of the LN is not paramount in determining the homing phenotype; this critical functional parameter is dictated upstream at the site of antigen capture by crosspresenting APCs.
Resumo:
Voltage fluctuations caused by parasitic impedances in the power supply rails of modern ICs are a major concern in nowadays ICs. The voltage fluctuations are spread out to the diverse nodes of the internal sections causing two effects: a degradation of performances mainly impacting gate delays anda noisy contamination of the quiescent levels of the logic that drives the node. Both effects are presented together, in thispaper, showing than both are a cause of errors in modern and future digital circuits. The paper groups both error mechanismsand shows how the global error rate is related with the voltage deviation and the period of the clock of the digital system.
Resumo:
In this paper we study the reconstruction of a network topology from the values of its betweenness centrality, a measure of the influence of each of its nodes in the dissemination of information over the network. We consider a simple metaheuristic, simulated annealing, as the combinatorial optimization method to generate the network from the values of the betweenness centrality. We compare the performance of this technique when reconstructing different categories of networks –random, regular, small-world, scale-free and clustered–. We show that the method allows an exact reconstruction of small networks and leads to good topological approximations in the case of networks with larger orders. The method can be used to generate a quasi-optimal topology fora communication network from a list with the values of the maximum allowable traffic for each node.
Resumo:
Broadcast transmission mode in ad hoc networks is critical to manage multihop routing or providing medium accesscontrol (MAC)-layer fairness. In this paper, it is shown that ahigher capacity to exchange information among neighbors may beobtained through a physical-MAC cross-layer design of the broadcastprotocol exploiting signal separation principles. Coherentdetection and separation of contending nodes is possible throughtraining sequences which are selected at random from a reducedset. Guidelines for the design of this set are derived for a lowimpact on the network performance and the receiver complexity.