63 results on '"Radu Dobrin"'
Search Results
2. HUBLINKED: A Curriculum Mapping Framework for Industry
- Author
-
Paul Doyle, Cathy Ennis, Anna Becevel, Stephane Maag, Radu Dobrin, Mojca Ciglarič, Yunja Choi, and Alan Fahey
- Subjects
graduate skills ,employability ,design (programmes ,curriculum ,organisation) ,Theory and practice of education ,LB5-3640 - Abstract
SMEs and Enterprise companies are looking for workplace-ready graduates that have already gained a relevant range of skills and knowledge as part of their studies. These include having specific proficiencies as well as a broad understanding of industry, including transferable skills such as self-awareness, critical thinking, teamwork, listening, time management, and leadership [1]. This demand entails a reciprocal relationship between industry and academia, which is one of many aspects that drives the need for solid collaborations between the two sectors [2]. When facing the recruitment process, however, SMEs and Enterprise companies often struggle to match their requirements to the learning outcomes of new graduates applying for positions. Companies are faced with an overwhelming array of degree programmes to engage with, most of which consist of multiple modules and options. Even within the same institute and school, students graduate with the same qualification, but have gone through vastly different pathways and gained a varied experience based on the optional modules they may have taken. Without enough academic knowledge and familiarity and no means to distinguish between these courses and the graduates, the recruitment process for companies must rely heavily on lengthy interview procedures to search for the right graduate with the right experience and transversal skills, a process that can be resource intensive in terms of time and financial cost. Given that learning trajectories across programmes and curricula are often not visible from an employer perspective some form of mapping of academic curriculum to industry graduate requirements would seem an essential step to help relieve employers, at least partially, from burdensome recruitment procedure [3]. The broad goal of the HubLinked Knowledge Alliance is to strengthen Europe’s software innovation capacity by learning from regions of proven Information Computing Technology (ICT) strength in Europe and Asia and sharing that knowledge with all regions. A key goal of the Alliance was to conduct research on the effectiveness of University-Industry (U-I) collaborations between Computer Science faculties and Companies (including non-ICT companies) as U-I collaborations are understood as a core driver of innovation capacity. In recognising that SMEs and Enterprise companies often struggle to match their graduate requirements to the learning outcomes of new graduates, two key challenges (presented here as fundamental questions) emerged: How can SME requirements for graduate recruitment be captured in a way that facilitates matching their requirements to academic programmes? How do you match university programmes from different institution to the industry requirement? In this paper we present a Curriculum Mapping Framework (CMF) and a Curriculum Mapping Tool (CMT) to address these issues. The CMF encodes the companies graduate attributes into a virtual curriculum after which the CMT maps the virtual curriculum onto specific educational pathway within an academic programme to determine the level of match between the two. The CMF and the CMT were both designed within the HubLinked Knowledge Alliance [4], a partnership of seven large industry-focused Computer Science Faculties and four Industry partners representing large multinationals, SMEs and start-up companies. Section two will explore the context that led to the development of the CMF and the CMT. In order to map learning outcomes across different programmes and courses, across different academic award levels and across different institutions, it is necessary to understand the general structure of a programme and how curricula are constructed. Our approach has been strongly inspired by the reports of the Association for Computing Machinery (ACM) [1] and Bloom’s Taxonomy [5] and by the assumption that multiple pathways are possible within each academic programme, meaning individuals undertaking the same programme gain varied skills depending on the optional modules for which they have opted. Section three describes in the development of the CMF which provides a mechanism for encoding industry requirements into a curriculum. Qualitative data was collected over a three-year period in the form of interviews with 40 Industry professionals and through organised focus groups with academic partners and stakeholders. Data collection was a central theme at each of the quarterly meetings hosted by each of the project partners who also facilitated the contribution of additional academic staff from outside of the project. Section four presents the CMT and demonstrates how the mapping process between ICT programmes and the Hublinked curriculum is achieved. The CMT is available on the HubLinked website for download[2]. Observations on the CMF and the CMT including recommendations on its future use are presented in the last sections of this paper.
- Published
- 2022
- Full Text
- View/download PDF
3. Integrating personalized gene expression profiles into predictive disease-associated gene pools
- Author
-
Jörg Menche, Emre Guney, Amitabh Sharma, Patrick J. Branigan, Matthew J. Loza, Frédéric Baribaud, Radu Dobrin, and Albert-László Barabási
- Subjects
Biology (General) ,QH301-705.5 - Abstract
Molecular Medicine: Personalized expression profiles elucidate disease heterogeneity A comparison of gene expression profiles of different patients with the same disease reveals a combinatorial model for disease heterogeneity. A framework is developed to generalize group-wise differential expression profiles to personalized perturbation profiles (PEEPs) for individual subjects. It is shown that similarities among patients with the same disease cannot be attributed to a few widely shared genes, but arise from more complex patterns of pairwise overlaps that often correspond to perturbations within the same biological pathway. This points to the existence of a disease module, i.e. a broader group of functionally related genes whose perturbations are associated with the specific disease. The overlap of an individual’s PEEP with the disease module accurately predicts disease status, suggesting their potential for developing combinatorial biomarker signatures or identifying most widely effective drug targets.
- Published
- 2017
- Full Text
- View/download PDF
4. High-Throughput Characterization of Blood Serum Proteomics of IBD Patients with Respect to Aging and Genetic Factors.
- Author
-
Antonio F Di Narzo, Shannon E Telesco, Carrie Brodmerkel, Carmen Argmann, Lauren A Peters, Katherine Li, Brian Kidd, Joel Dudley, Judy Cho, Eric E Schadt, Andrew Kasarskis, Radu Dobrin, and Ke Hao
- Subjects
Genetics ,QH426-470 - Abstract
To date, no large scale, systematic description of the blood serum proteome has been performed in inflammatory bowel disease (IBD) patients. By using microarray technology, a more complete description of the blood proteome of IBD patients is feasible. It may help to achieve a better understanding of the disease. We analyzed blood serum profiles of 1128 proteins in IBD patients of European descent (84 Crohn's Disease (CD) subjects and 88 Ulcerative Colitis (UC) subjects) as well as 15 healthy control subjects, and linked protein variability to patient age (all cohorts) and genetic components (genotype data generated from CD patients). We discovered new, previously unreported aging-associated proteomic traits (such as serum Albumin level), confirmed previously reported results from different tissues (i.e., upregulation of APOE with aging), and found loss of regulation of MMP7 in CD patients. In carrying out a genome wide genotype-protein association study (proteomic Quantitative Trait Loci, pQTL) within the CD patients, we identified 41 distinct proteomic traits influenced by cis pQTLs (underlying SNPs are referred to as pSNPs). Significant overlaps between pQTLs and cis eQTLs corresponding to the same gene were observed and in some cases the QTL were related to inflammatory disease susceptibility. Importantly, we discovered that serum protein levels of MST1 (Macrophage Stimulating 1) were regulated by SNP rs3197999 (p = 5.96E-10, FDR
- Published
- 2017
- Full Text
- View/download PDF
5. Protecting Clock Synchronization: Adversary Detection through Network Monitoring
- Author
-
Elena Lisova, Marina Gutiérrez, Wilfried Steiner, Elisabeth Uhlemann, Johan Åkerberg, Radu Dobrin, and Mats Björkman
- Subjects
Computer engineering. Computer hardware ,TK7885-7895 - Abstract
Nowadays, industrial networks are often used for safety-critical applications with real-time requirements. Such applications usually have a time-triggered nature with message scheduling as a core property. Scheduling requires nodes to share the same notion of time, that is, to be synchronized. Therefore, clock synchronization is a fundamental asset in real-time networks. However, since typical standards for clock synchronization, for example, IEEE 1588, do not provide the required level of security, it raises the question of clock synchronization protection. In this paper, we identify a way to break synchronization based on the IEEE 1588 standard, by conducting a man-in-the-middle (MIM) attack followed by a delay attack. A MIM attack can be accomplished through, for example, Address Resolution Protocol (ARP) poisoning. Using the AVISPA tool, we evaluate the potential to perform a delay attack using ARP poisoning and analyze its consequences showing both that the attack can, indeed, break clock synchronization and that some design choices, such as a relaxed synchronization condition mode, delay bounding, and using knowledge of environmental conditions, can make the network more robust/resilient against these kinds of attacks. Lastly, a Configuration Agent is proposed to monitor and detect anomalies introduced by an adversary performing attacks targeting clock synchronization.
- Published
- 2016
- Full Text
- View/download PDF
6. A Topology-specific Tight Worst-case Analysis of Strict Priority Traffic in Real-time Systems.
- Author
-
Nitin Desai, Radu Dobrin, and Sasikumar Punnekkat
- Published
- 2023
- Full Text
- View/download PDF
7. MALOC: Building an adaptive scheduling and routing framework for rate-constrained TSN traffic.
- Author
-
Nitin Desai, Radu Dobrin, and Sasikumar Punnekkat
- Published
- 2022
- Full Text
- View/download PDF
8. Cache-aware response time analysis for real-time tasks with fixed preemption points.
- Author
-
Filip Markovic, Jan Carlson, and Radu Dobrin
- Published
- 2020
- Full Text
- View/download PDF
9. Improving the Accuracy of Cache-Aware Response Time Analysis Using Preemption Partitioning.
- Author
-
Filip Markovic, Jan Carlson, Sebastian Altmeyer, and Radu Dobrin
- Published
- 2020
- Full Text
- View/download PDF
10. On Fault-Tolerant Scheduling of Time Sensitive Networks.
- Author
-
Radu Dobrin, Nitin Desai, and Sasikumar Punnekkat
- Published
- 2019
- Full Text
- View/download PDF
11. Improved Cache-Related Preemption Delay Estimation for Fixed Preemption Point Scheduling.
- Author
-
Filip Markovic, Jan Carlson, and Radu Dobrin
- Published
- 2018
- Full Text
- View/download PDF
12. Probabilistic Response Time Analysis for Fixed Preemption Point Selection.
- Author
-
Filip Markovic, Jan Carlson, Radu Dobrin, Björn Lisper, and Abhilash Thekkilakattil
- Published
- 2018
- Full Text
- View/download PDF
13. A Comparison of Partitioning Strategies for Fixed Points Based Limited Preemptive Scheduling.
- Author
-
Filip Markovic, Jan Carlson, and Radu Dobrin
- Published
- 2019
- Full Text
- View/download PDF
14. Self-configuration of IEEE 802.1 TSN networks.
- Author
-
Marina Gutiérrez, Astrit Ademaj, Wilfried Steiner, Radu Dobrin, and Sasikumar Punnekkat
- Published
- 2017
- Full Text
- View/download PDF
15. An Event-Based Messaging Architecture for Vehicular Internet of Things (IoT) Platforms.
- Author
-
Meera Aravind, Gustav Wiklander, Jakob Palmheden, and Radu Dobrin
- Published
- 2017
- Full Text
- View/download PDF
16. Synchronization Quality of IEEE 802.1AS in Large-Scale Industrial Automation Networks.
- Author
-
Marina Gutiérrez, Wilfried Steiner, Radu Dobrin, and Sasikumar Punnekkat
- Published
- 2017
- Full Text
- View/download PDF
17. Tightening the Bounds on Cache-Related Preemption Delay in Fixed Preemption Point Scheduling.
- Author
-
Filip Markovic, Jan Carlson, and Radu Dobrin
- Published
- 2017
- Full Text
- View/download PDF
18. Exact speedup factors and sub-optimality for non-preemptive scheduling.
- Author
-
Robert I. Davis 0001, Abhilash Thekkilakattil, Oliver Gettings, Radu Dobrin, Sasikumar Punnekkat, and Jian-Jia Chen
- Published
- 2018
- Full Text
- View/download PDF
19. An Empirical Investigation of Eager and Lazy Preemption Approaches in Global Limited Preemptive Scheduling.
- Author
-
Abhilash Thekkilakattil, Kaiqian Zhu, Yonggao Nie, Radu Dobrin, and Sasikumar Punnekkat
- Published
- 2016
- Full Text
- View/download PDF
20. A configuration agent based on the time-triggered paradigm for real-time networks.
- Author
-
Marina Gutiérrez, Wilfried Steiner, Radu Dobrin, and Sasikumar Punnekkat
- Published
- 2015
- Full Text
- View/download PDF
21. Quantifying the Exact Sub-optimality of Non-preemptive Scheduling.
- Author
-
Robert I. Davis 0001, Abhilash Thekkilakattil, Oliver Gettings, Radu Dobrin, and Sasikumar Punnekkat
- Published
- 2015
- Full Text
- View/download PDF
22. Multiprocessor fixed priority scheduling with limited preemptions.
- Author
-
Abhilash Thekkilakattil, Robert I. Davis 0001, Radu Dobrin, Sasikumar Punnekkat, and Marko Bertogna
- Published
- 2015
- Full Text
- View/download PDF
23. Learning the parameters of periodic traffic based on network measurements.
- Author
-
Marina Gutiérrez, Wilfried Steiner, Radu Dobrin, and Sasikumar Punnekkat
- Published
- 2015
- Full Text
- View/download PDF
24. Error Handling Algorithm and Probabilistic Analysis Under Fault for CAN-Based Steer-by-Wire System.
- Author
-
Mohd Badril Nor Shah, Abdul Rashid Husain, Hüseyin Aysan, Sasikumar Punnekkat, Radu Dobrin, and Fernando Augusto Bender
- Published
- 2016
- Full Text
- View/download PDF
25. The teaching of computer ethics on computer science and related degree programmes. a European survey
- Author
-
Andrea Curley, Gordana Dodig-Crnkovic, Brendan Tierney, Stephane Maag, Anna Becevel, Svetlana Tikhonenko, Damian Gordon, Francesco Agresta, J.Paul Gibson, Michael Collins, Ioannis Stavrakakis, Dympna O'Sullivan, Emma Murphy, Cristina Pereira, Viola Schiaffonati, Radu Dobrin, Technological University [Dublin] (TU), Chalmers University of Technology [Gothenburg, Sweden], Mälardalen University (MDH), Department of Electronics, Information, and Bioengineering [Milano] (DEIB), Politecnico di Milano [Milan] (POLIMI), Informatics Europe, Méthodes et modèles pour les réseaux (METHODES-SAMOVAR), Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)-Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Département Informatique (INF), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Institut Polytechnique de Paris (IP Paris), Département Réseaux et Services Multimédia Mobiles (RS2M), and European Digital Learning Network (DLEARN )
- Subjects
Computer ethics ,media_common.quotation_subject ,Computer Science Education ,02 engineering and technology ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,Teaching Computer Ethics ,[INFO.INFO-CY]Computer Science [cs]/Computers and Society [cs.CY] ,[INFO.INFO-FL]Computer Science [cs]/Formal Languages and Automata Theory [cs.FL] ,020204 information systems ,Agency (sociology) ,0202 electrical engineering, electronic engineering, information engineering ,Institution ,ComputingMilieux_COMPUTERSANDEDUCATION ,[INFO]Computer Science [cs] ,Curriculum ,Pace ,media_common ,Ethics ,ComputingMilieux_THECOMPUTINGPROFESSION ,business.industry ,4. Education ,05 social sciences ,050301 education ,Information technology ,Computer Ethics ,Engineering ethics ,[INFO.EIAH]Computer Science [cs]/Technology for Human Learning ,business ,0503 education ,Personally identifiable information ,Range (computer programming) - Abstract
Within the Computer Science community, many ethical issues have emerged as significant and critical concerns. Computer ethics is an academic field in its own right and there are unique ethical issues associated with information technology. It encompasses a range of issues and concerns including privacy and agency around personal information, Artificial Intelligence and pervasive technology, the Internet of Things and surveillance applications. As computing technology impacts society at an ever growing pace, there are growing calls for more computer ethics content to be included in Computer Science curricula. In this paper we present the results of a survey that polled faculty from Computer Science and related disciplines about teaching practices for computer ethics at their institutions. The survey was completed by respondents from 61 universities across 23 European countries. Participants were surveyed on whether or not computer ethics is taught to Computer Science students at each institution, the reasons why computer ethics is or is not taught, how computer ethics is taught, the background of staff who teach computer ethics and the scope of computer ethics curricula. This paper presents and discusses the results of the survey.
- Published
- 2022
- Full Text
- View/download PDF
26. The limited-preemptive feasibility of real-time tasks on uniprocessors.
- Author
-
Abhilash Thekkilakattil, Radu Dobrin, and Sasikumar Punnekkat
- Published
- 2015
- Full Text
- View/download PDF
27. Mobile Application as a Learning Tool
- Author
-
Afshin Ameri, Philip Lindstedt, and Radu Dobrin
- Published
- 2022
- Full Text
- View/download PDF
28. A Comparison of Partitioning Strategies for Fixed Points Based Limited Preemptive Scheduling
- Author
-
Jan Carlson, Filip Markovic, and Radu Dobrin
- Subjects
Multi-core processor ,Job shop scheduling ,Computer science ,Distributed computing ,020208 electrical & electronic engineering ,Preemption ,Processor scheduling ,02 engineering and technology ,Fixed point ,Computer Science Applications ,Scheduling (computing) ,Control and Systems Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Task analysis ,Resource management ,Cache ,Electrical and Electronic Engineering ,Heuristics ,Information Systems - Abstract
The increasing industrial demand for handling complex functionalities has influenced the design of hardware architectures for time critical embedded systems, during the past decade. Multicore systems facilitate the inclusion of many complex functionalities, while, at the same time, inducing cache related overheads, as well as adding partitioning complexity to the overall system schedulability. One of the efficient paradigms for controlling and reducing the cache related costs in real-time systems is limited preemptive scheduling (LPS), with its particular instance fixed preemption points scheduling (LP-FPPS), which has been shown to outperform other alternatives as well as has been supported by and investigated in the automotive domain. With respect to the partitioning constraints, partitioned scheduling has been widely used to preruntime allocate tasks to specific cores, resulting in predictable cache-related preemption delays estimations. In this paper, we propose to integrate the LP-FPPS and partitioned scheduling on fixed-priority multicore real-time systems in order to increase the overall system schedulability. We define a new joint approach for task partitioning and preemption point selection, which is based on the computation of the maximum blocking tolerance upon each allocation, thus being able to quantify the schedulability of the taskset on each processor. Furthermore, we investigate the partitioning strategies based on different heuristics, i.e., first fit decreasing and worst fit decreasing, and priority and density taskset orderings. The evaluation performed on randomly generated tasksets shows that in the general case, no single partitioning strategy fully dominates the others. However, the evaluation results reveal that the certain partitioning strategies perform significantly better with respect to the overall schedulability for specific taskset characteristics. The results also reveal that the proposed partitioning strategies outperform fully preemptive and nonpreemptive partitioned scheduling in terms of successful partitioning.
- Published
- 2019
- Full Text
- View/download PDF
29. Evolving use of real-world evidence in the regulatory process: a focus on immuno-oncology treatment and outcomes
- Author
-
Arvin Yang, T Kim Le, Radu Dobrin, Mathias Hukkelhoven, John C O'Donnell, Ashley Pereira, Samuel Wagner, and Mitch Higashi
- Subjects
0301 basic medicine ,Cancer Research ,Clinical Trials as Topic ,Evidence-Based Medicine ,business.industry ,Process (engineering) ,Context (language use) ,General Medicine ,Real world evidence ,03 medical and health sciences ,030104 developmental biology ,0302 clinical medicine ,Treatment Outcome ,Oncology ,Drug development ,Risk analysis (engineering) ,Drug Development ,030220 oncology & carcinogenesis ,Neoplasms ,Product Surveillance, Postmarketing ,Medicine ,Humans ,Immunotherapy ,business ,Real world data - Abstract
In recent years, regulatory bodies have increasingly recognized the utility of real-world evidence (RWE) for supplementing and supporting clinical trial data in new drug applications. Nevertheless, the integration of RWE into established regulatory processes is complex and the generation of ‘regulatory-grade’ real-world data faces operational, methodological, data-related and policy-related challenges. In parallel with this evolving role for RWE, immuno-oncology therapies have emerged as leading cancer treatments and are expected to continue to play a central role in the future. In this article, we review the current literature on the use of RWE for regulatory submissions, with a focus on novel anticancer immunotherapies, and discuss the utility and current limitations of RWE in the context of drug development and regulatory approvals.
- Published
- 2020
30. STK11 and KEAP1 Mutations as Prognostic Biomarkers in an Observational Real-World Lung Adenocarcinoma Cohort
- Author
-
Simon Papillon-Cavanagh, Radu Dobrin, Joseph D. Szustakowski, Parul Doshi, and Alice M. Walsh
- Subjects
Oncology ,Cancer Research ,medicine.medical_specialty ,medicine.medical_treatment ,STK11 ,immune checkpoint inhibitor ,Internal medicine ,medicine ,Original Research ,Genetic testing ,Chemotherapy ,Lung ,medicine.diagnostic_test ,business.industry ,non-squamous non-small cell lung cancer ,medicine.disease ,Immune checkpoint ,Blockade ,KEAP1 ,medicine.anatomical_structure ,Cohort ,Adenocarcinoma ,Observational study ,business ,prognostic - Abstract
ImportanceUnderstanding the mechanisms of primary resistance to immune checkpoint blockade therapy is of paramount importance for treatment selection. Somatic mutations in STK11 and KEAP1, frequently co-mutated in nonsquamous non–small cell lung cancer, have been associated with poor response to immune checkpoint blockade. However, previous reports lack non–immune checkpoint blockade controls needed to properly ascertain the predictive nature of those biomarkers.ObjectiveTo evaluate the predictive vs prognostic effect of STK11 or KEAP1 mutations across different treatment classes in nonsquamous non–small cell lung cancer.DesignA retrospective, real-world data cohort from the Flatiron Health network linked with genetic testing from Foundation Medicine, from January 1, 2011, through December 31, 2018.SettingMulticenter, including academic and community practices.ParticipantsPatients diagnosed with stage IIIB, IIIC, IVA, or IVB nonsquamous non–small cell lung cancer who initiated first-line treatment within 90 days after diagnosis.Main Outcomes and MeasuresReal-world, progression-free survival and overall survival calculated from time of initiation of first-line treatment.ResultsWe analyzed clinical and mutational data for 2276 patients with advanced, nonsquamous non–small cell lung cancer (mean age at advanced diagnosis, 66.3 years [SD 10.3], 54.4% female, 80.1% with a history of smoking), including patients treated with anti–programmed death-1/anti–programmed death ligand 1 inhibitors at first line (n = 574). Mutations in STK11 or KEAP1 were associated with poor outcomes across multiple therapeutic classes and were not specifically associated with poor outcomes in immune checkpoint blockade cohorts. There was no observable interaction between STK11 mutations and anti–programmed death-1/anti–programmed death ligand 1 treatment on real-world, progression-free survival (HR, 1.05; 95% CI, 0.76-1.44; P = .785) or overall survival (HR, 1.13; 95% CI, 0.76-1.67; P = .540). Similarly, there was no observable interaction between KEAP1 on real-world, progression-free survival (HR, 0.93; 95% CI, 0.67-1.28; P = .653) or overall survival (HR, 0.98; 95% CI, 0.66-1.45; P = .913). Results were consistent in KRAS-mutated patients.Conclusion and RelevanceOur results show that STK11-KEAP1 mutations are prognostic, not predictive, biomarkers for anti–programmed death-1/anti–programmed death ligand 1 therapy.Key PointsQuestionAre loss-of-function somatic mutations in STK11 and KEAP1 predictive of response to immune checkpoint blockade or simply prognostic?FindingsIn this observational real-world cohort totaling 2276 patients, including 574 treated with immune checkpoint blockade, we find that mutations in STK11 and KEAP1 are associated with poor prognosis across multiple first-line treatment classes.MeaningMutations in STK11 and KEAP1 are prognostic biomarkers of poor response to both immune checkpoint blockade and chemotherapy.
- Published
- 2020
- Full Text
- View/download PDF
31. Improving the Accuracy of Cache-Aware Response Time Analysis Using Preemption Partitioning
- Author
-
Filip Marković and Jan Carlson and Sebastian Altmeyer and Radu Dobrin, Marković, Filip, Carlson, Jan, Altmeyer, Sebastian, Dobrin, Radu, Filip Marković and Jan Carlson and Sebastian Altmeyer and Radu Dobrin, Marković, Filip, Carlson, Jan, Altmeyer, Sebastian, and Dobrin, Radu
- Abstract
Schedulability analyses for preemptive real-time systems need to take into account cache-related preemption delays (CRPD) caused by preemptions between the tasks. The estimation of the CRPD values must be sound, i.e. it must not be lower than the worst-case CRPD that may occur at runtime, but also should minimise the pessimism of estimation. The existing methods over-approximate the computed CRPD upper bounds by accounting for multiple preemption combinations which cannot occur simultaneously during runtime. This over-approximation may further lead to the over-approximation of the worst-case response times of the tasks, and therefore a false-negative estimation of the system’s schedulability. In this paper, we propose a more precise cache-aware response time analysis for sporadic real-time systems under fully-preemptive fixed priority scheduling. The evaluation shows a significant improvement over the existing state of the art approaches.
- Published
- 2020
- Full Text
- View/download PDF
32. A functional genomics predictive network model identifies regulators of inflammatory bowel disease
- Author
-
Yongzhong Zhao, Mark E. Curran, Hardik Shah, Mary Beth Humphrey, Jeremiah J. Faith, Eunjee Lee, Arthur Mortha, Lauren A. Peters, Bojan Losic, Anuk Das, Brian A. Kidd, Eric M. Neiman, Sean R. Llewellyn, Radu Dobrin, Panos Roussos, Riccardo Miotto, Teresa K. Tarrant, Joshua R. Friedman, Antonio Fabio Di Narzo, Khader Shameer, Won-Min Song, Jun Zhu, Bin Zhang, Carmen Argmann, Eric E. Schadt, Alina Iuga, Carrie Brodmerkel, Jacqueline Perrigoue, Lloyd Mayer, Andrew Kasarskis, Yoshinori Fukui, Aleksandar Stojmirović, Jocelyn Sendecki, Brian M. Iritani, Shannon Telesco, Minghui Wang, Nicholas E.S. Sibinga, and Ke Hao
- Subjects
0301 basic medicine ,Male ,Gene regulatory network ,Datasets as Topic ,Genome-wide association study ,Disease ,Computational biology ,Biology ,Inflammatory bowel disease ,digestive system ,Article ,03 medical and health sciences ,Mice ,0302 clinical medicine ,T-Lymphocyte Subsets ,Genes, Regulator ,Genetics ,medicine ,Animals ,Humans ,Gene Regulatory Networks ,Genetic Predisposition to Disease ,Intestinal Mucosa ,RNA, Small Interfering ,Cells, Cultured ,Genetic association ,Mice, Knockout ,Genome ,Models, Genetic ,Macrophages ,Genomics ,medicine.disease ,Colitis ,Inflammatory Bowel Diseases ,Adoptive Transfer ,digestive system diseases ,3. Good health ,Causality ,Mice, Inbred C57BL ,Disease Models, Animal ,030104 developmental biology ,030220 oncology & carcinogenesis ,Gene Knockdown Techniques ,Female ,Transcriptome ,Functional genomics ,Genome-Wide Association Study - Abstract
A major challenge in inflammatory bowel disease (IBD) is the integration of diverse IBD data sets to construct predictive models of IBD. We present a predictive model of the immune component of IBD that informs causal relationships among loci previously linked to IBD through genome-wide association studies (GWAS) using functional and regulatory annotations that relate to the cells, tissues, and pathophysiology of IBD. Our model consists of individual networks constructed using molecular data generated from intestinal samples isolated from three populations of patients with IBD at different stages of disease. We performed key driver analysis to identify genes predicted to modulate network regulatory states associated with IBD, prioritizing and prospectively validating 12 of the top key drivers experimentally. This validated key driver set not only introduces new regulators of processes central to IBD but also provides the integrated circuits of genetic, molecular, and clinical traits that can be directly queried to interrogate and refine the regulatory framework defining IBD.
- Published
- 2017
33. Integrating personalized gene expression profiles into predictive disease-associated gene pools
- Author
-
Emre Guney, Amitabh Sharma, Patrick Branigan, Albert-László Barabási, Radu Dobrin, Matthew J. Loza, Frédéric Baribaud, and Jörg Menche
- Subjects
0301 basic medicine ,Genetics ,Biomarker identification ,QH301-705.5 ,Applied Mathematics ,Disease ,Biology ,Precision medicine ,Phenotype ,General Biochemistry, Genetics and Molecular Biology ,Article ,3. Good health ,Computer Science Applications ,03 medical and health sciences ,030104 developmental biology ,0302 clinical medicine ,Drug development ,Modeling and Simulation ,Drug Discovery ,Gene expression ,Gene pool ,Biology (General) ,Gene ,030217 neurology & neurosurgery - Abstract
Gene expression data are routinely used to identify genes that on average exhibit different expression levels between a case and a control group. Yet, very few of such differentially expressed genes are detectably perturbed in individual patients. Here, we develop a framework to construct personalized perturbation profiles for individual subjects, identifying the set of genes that are significantly perturbed in each individual. This allows us to characterize the heterogeneity of the molecular manifestations of complex diseases by quantifying the expression-level similarities and differences among patients with the same phenotype. We show that despite the high heterogeneity of the individual perturbation profiles, patients with asthma, Parkinson and Huntington’s disease share a broadpool of sporadically disease-associated genes, and that individuals with statistically significant overlap with this pool have a 80–100% chance of being diagnosed with the disease. The developed framework opens up the possibility to apply gene expression data in the context of precision medicine, with important implications for biomarker identification, drug development, diagnosis and treatment., Molecular Medicine: Personalized expression profiles elucidate disease heterogeneity A comparison of gene expression profiles of different patients with the same disease reveals a combinatorial model for disease heterogeneity. A framework is developed to generalize group-wise differential expression profiles to personalized perturbation profiles (PEEPs) for individual subjects. It is shown that similarities among patients with the same disease cannot be attributed to a few widely shared genes, but arise from more complex patterns of pairwise overlaps that often correspond to perturbations within the same biological pathway. This points to the existence of a disease module, i.e. a broader group of functionally related genes whose perturbations are associated with the specific disease. The overlap of an individual’s PEEP with the disease module accurately predicts disease status, suggesting their potential for developing combinatorial biomarker signatures or identifying most widely effective drug targets.
- Published
- 2017
34. On Fault-Tolerant Scheduling of Time Sensitive Networks
- Author
-
Radu Dobrin and Nitin Desai and Sasikumar Punnekkat, Dobrin, Radu, Desai, Nitin, Punnekkat, Sasikumar, Radu Dobrin and Nitin Desai and Sasikumar Punnekkat, Dobrin, Radu, Desai, Nitin, and Punnekkat, Sasikumar
- Abstract
Time sensitive networking (TSN) is gaining attention in industrial automation networks since it brings essential real-time capabilities at the data link layer. Though it can provide deterministic latency under error free conditions, TSN still largely depends on space redundancy for improved reliability. In many scenarios, time redundancy could be an adequate as well as cost efficient alternative. Time redundancy in turn will have implications due to the need for over-provisions needed for timeliness guarantees. In this paper, we discuss how to embed fault-tolerance capability into TSN schedules and describe our approach using a simple example.
- Published
- 2019
- Full Text
- View/download PDF
35. Error Handling Algorithm and Probabilistic Analysis Under Fault for CAN-Based Steer-by-Wire System
- Author
-
Fernando Augusto Bender, Sasikumar Punnekkat, Radu Dobrin, Abdul Rashid Husain, Mohd Badril Nor Shah, and Huseyin Aysan
- Subjects
0209 industrial biotechnology ,Engineering ,business.industry ,020208 electrical & electronic engineering ,Real-time computing ,02 engineering and technology ,Networked control system ,Fault (power engineering) ,Computer Science Applications ,CAN bus ,Fault indicator ,Stuck-at fault ,020901 industrial engineering & automation ,Control and Systems Engineering ,Control theory ,Fault coverage ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Fault model ,business ,Algorithm ,Segmentation fault ,Information Systems - Abstract
This paper proposes an efficient way to handle fault in controller area network (CAN)-based networked control system (NCS). A fault in a bus line of CAN will induce a data error which will result in data dropout or time delay, and subsequently may lead to performance degradation or system instability. A strategy to handle fault occurrence in CAN bus is proposed to properly analyze the effect of the fault to CAN-based NCS performance. The fault occurrences are modeled based on fault interarrival time, fault bursts’ duration, and Poisson law. Using fault and messages’ attributes, response time analysis (RTA) is performed and the probability of control message missing its deadline is calculated. Utilizing the new error handling algorithm to replace the native error handling of CAN, the probability of a control message missing its deadline can be translated into the probability of data dropout for control message. This methodology is evaluated using steer-by-wire system of vehicle to analyze the effect of fault occurrences in CAN. It is found that the proposed error handling mechanism has resulted in better NCS performance and the range of data dropout probability for control message also could be obtained, which serves as crucial input for NCS controller design.
- Published
- 2016
- Full Text
- View/download PDF
36. Protecting Clock Synchronization: Adversary Detection through Network Monitoring
- Author
-
Elisabeth Uhlemann, Johan Akerberg, Wilfried Steiner, Radu Dobrin, Mats Björkman, Elena Lisova, and Marina Gutierrez
- Subjects
Computer engineering. Computer hardware ,Engineering ,Article Subject ,General Computer Science ,business.industry ,Distributed computing ,02 engineering and technology ,Digital clock manager ,Adversary ,Clock synchronization ,020202 computer hardware & architecture ,Scheduling (computing) ,TK7885-7895 ,Bounding overwatch ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,ARP spoofing ,020201 artificial intelligence & image processing ,Address Resolution Protocol ,Data synchronization ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
Nowadays, industrial networks are often used for safety-critical applications with real-time requirements. Such applications usually have a time-triggered nature with message scheduling as a core property. Scheduling requires nodes to share the same notion of time, that is, to be synchronized. Therefore, clock synchronization is a fundamental asset in real-time networks. However, since typical standards for clock synchronization, for example, IEEE 1588, do not provide the required level of security, it raises the question of clock synchronization protection. In this paper, we identify a way to break synchronization based on the IEEE 1588 standard, by conducting a man-in-the-middle (MIM) attack followed by a delay attack. A MIM attack can be accomplished through, for example, Address Resolution Protocol (ARP) poisoning. Using the AVISPA tool, we evaluate the potential to perform a delay attack using ARP poisoning and analyze its consequences showing both that the attack can, indeed, break clock synchronization and that some design choices, such as a relaxed synchronization condition mode, delay bounding, and using knowledge of environmental conditions, can make the network more robust/resilient against these kinds of attacks. Lastly, a Configuration Agent is proposed to monitor and detect anomalies introduced by an adversary performing attacks targeting clock synchronization.
- Published
- 2016
- Full Text
- View/download PDF
37. High-Throughput Identification of the Plasma Proteomic Signature of Inflammatory Bowel Disease
- Author
-
Carrie Brodmerkel, Carmen Argmann, Antonio Fabio Di Narzo, Katherine Li, Radu Dobrin, Judy H. Cho, Lauren A. Peters, Brian A. Kidd, Joel T. Dudley, Eric E. Schadt, Shannon Telesco, Andrew Kasarskis, and Ke Hao
- Subjects
0301 basic medicine ,Proteomics ,Proteome ,Inflammatory bowel disease ,Severity of Illness Index ,Transcriptome ,03 medical and health sciences ,0302 clinical medicine ,Crohn Disease ,inflammatory bowel disease ,Databases, Genetic ,medicine ,Humans ,RNA, Messenger ,Biomarker discovery ,Intestinal Mucosa ,business.industry ,Gastroenterology ,General Medicine ,Original Articles ,medicine.disease ,Ulcerative colitis ,Blood proteins ,digestive system diseases ,Fold change ,3. Good health ,030104 developmental biology ,C-Reactive Protein ,differential expression analysis ,Case-Control Studies ,Immunology ,030211 gastroenterology & hepatology ,Colitis, Ulcerative ,business ,proteomic quantitative trait loci - Abstract
Background The molecular aetiology of inflammatory bowel disease [IBD] and its two subtypes, ulcerative colitis [UC] and Crohn’s disease [CD], have been carefully investigated at genome and transcriptome levels. Recent advances in high-throughput proteome quantification has enabled comprehensive large-scale plasma proteomics studies of IBD. Methods The study used two cohorts: [1] The CERTIFI-cohort: 42 samples from the CERTIFI trial of anti-TNFα–refractory CD patients; [2] the PROgECT-UNITI-HCs cohort: 46 UC samples of the PROgECT study, 84 CD samples of the UNITI I and UNITI II studies, and 72 healthy controls recruited in Mount Sinai Hospital, New York, USA. The plasma proteome for these two cohorts was quantified using high-throughput platforms. Results For the PROgECT-UNITI-HCs cohort, we measured a total of 1310 proteins. Of these, 493 proteins showed different plasma levels in IBD patients to the plasma levels in controls at 10% false discovery rate [FDR], among which 11 proteins had a fold change greater than 2. The proteins upregulated in IBD were associated with immunity functionality, whereas the proteins downregulated in IBD were associated with nutrition and metabolism. The proteomic profiles were very similar between UC and CD. In the CERTIFI cohort, 1014 proteins were measured, and it was found that the plasma protein level had little correlation with the blood or intestine transcriptomes. Conclusions We report the largest proteomics study to date on IBD and controls. A large proportion of plasma proteins are altered in IBD, which provides insights into the disease aetiology and indicates a potential for biomarker discovery.
- Published
- 2018
38. The limited-preemptive feasibility of real-time tasks on uniprocessors
- Author
-
Radu Dobrin, Sasikumar Punnekkat, and Abhilash Thekkilakattil
- Subjects
Rate-monotonic scheduling ,Hardware_MEMORYSTRUCTURES ,Software_OPERATINGSYSTEMS ,Control and Optimization ,Computer Networks and Communications ,Computer science ,Distributed computing ,Preemption ,Dynamic priority scheduling ,Parallel computing ,Fair-share scheduling ,Computer Science Applications ,Scheduling (computing) ,Fixed-priority pre-emptive scheduling ,Control and Systems Engineering ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,Modeling and Simulation ,Two-level scheduling ,Uniprocessor system ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Electrical and Electronic Engineering - Abstract
The preemptive scheduling paradigm is known to strictly dominate the non-preemptive scheduling paradigm with respect to feasibility. On the other hand, preemptively scheduling real-time tasks on uniprocessors, unlike non-preemptive scheduling, may lead to unschedulability due to, e.g., preemption related overheads. The limited-preemptive scheduling paradigm, which is a generalization of preemptive and non-preemptive paradigms, has, however, the potential to reduce the preemption related overheads while enabling high processor utilization. In this paper, we focus on the characterization of the effects of increasing the computational resources on the limited-preemptive feasibility of real-time tasks in order to quantify the sub-optimality of limited-preemptive scheduling. Specifically, we first derive the required processor speed-up bound that guarantees limited-preemptive feasibility of any uniprocessor feasible taskset. Secondly, we demonstrate the applicability of the results in the context of controlling preemption related overheads while minimizing the required processor speed-up. In particular, we identify the preemptive behavior that minimizes preemption-related overheads, as well as derive the optimal processor speed associated with it. Finally, we examine the consequences of having more processors on limited-preemptive feasibility and derive the bound on the number of processors that guarantees a specified limited-preemptive behavior for any uniprocessor feasible real-time taskset. This paper essentially bridges the preemptive and non-preemptive real-time scheduling paradigms by providing significant theoretical results building on the limited-preemptive scheduling paradigm, as well as provides analytical inputs to developers in order to perform various trade-offs, e.g., code refactoring, to control the preemptive behavior of real-time tasks.
- Published
- 2015
- Full Text
- View/download PDF
39. Exact Speedup Factors and Sub-Optimality for Non-Preemptive Scheduling
- Author
-
Radu Dobrin, Abhilash Thekkilakattil, Sasikumar Punnekkat, Oliver Gettings, Jian-Jia Chen, and Robert I. Davis
- Subjects
Earliest deadline first scheduling ,Rate-monotonic scheduling ,Mathematical optimization ,Control and Optimization ,Speedup ,Computer Networks and Communications ,Computer science ,0102 computer and information sciences ,02 engineering and technology ,Dynamic priority scheduling ,Parallel computing ,01 natural sciences ,Deadline-monotonic scheduling ,020202 computer hardware & architecture ,Computer Science Applications ,Scheduling (computing) ,Fixed-priority pre-emptive scheduling ,010201 computation theory & mathematics ,Control and Systems Engineering ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Uniprocessor system ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Electrical and Electronic Engineering - Abstract
Fixed priority scheduling is used in many real-time systems; however, both preemptive and non-preemptive variants (FP-P and FP-NP) are known to be sub-optimal when compared to an optimal uniprocessor scheduling algorithm such as preemptive earliest deadline first (EDF-P). In this paper, we investigate the sub-optimality of fixed priority non-preemptive scheduling. Specifically, we derive the exact processor speed-up factor required to guarantee the feasibility under FP-NP (i.e. schedulability assuming an optimal priority assignment) of any task set that is feasible under EDF-P. As a consequence of this work, we also derive a lower bound on the sub-optimality of non-preemptive EDF (EDF-NP). As this lower bound matches a recently published upper bound for the same quantity, it closes the exact sub-optimality for EDF-NP. It is known that neither preemptive, nor non-preemptive fixed priority scheduling dominates the other, in other words, there are task sets that are feasible on a processor of unit speed under FP-P that are not feasible under FP-NP and vice-versa. Hence comparing these two algorithms, there are non-trivial speedup factors in both directions. We derive the exact speed-up factor required to guarantee the FP-NP feasibility of any FP-P feasible task set. Further, we derive the exact speed-up factor required to guarantee FP-P feasibility of any constrained-deadline FP-NP feasible task set.
- Published
- 2017
40. Abstract 3221: T-cell receptor sequencing for pharmacodynamic and response biomarkers of checkpoint blockade
- Author
-
Simon Papillon-Cavanagh, Alice M. Walsh, Zhenhao Qi, Megan Wind-Rotolo, Abdel Saci, Parul Doshi, Radu Dobrin, and Joseph Szustakowski
- Subjects
Cancer Research ,Oncology - Abstract
Background: Immunomodulatory cancer drugs such as anti-programmed death 1 (PD-1) and anti-cytotoxic T-lymphocyte antigen 4 (CTLA4) antibodies have shown significant clinical benefits across multiple indications. However, not all patients benefit from checkpoint blockade (CB) treatment strategies, highlighting the need for predictive biomarkers of response. Features of the T-cell receptor (TCR) repertoire have been reported to correlate with CB treatment and response (1). Here, we performed a comprehensive, retrospective analysis of TCR repertoires from different tissues (blood and tumor) at different time points (baseline and on treatment). To the best of our knowledge, our study, comprising a total of 558 samples across 3 tumor types (non-small cell lung cancer [NSCLC], renal cell carcinoma [RCC], and melanoma), is the largest analysis of TCR-sequencing data in CB clinical trials to date. Methods: We performed TCR sequencing on formalin-fixed paraffin-embedded tissue samples or peripheral blood samples using immunoSEQ Assays (Adaptive Biotechnologies Corp.) to profile the immune repertoire of patients from 3 clinical trials of nivolumab (anti-PD-1) or nivolumab + ipilimumab (anti-CTLA4) (NCT02041533, NCT01358721, NCT01621490). Repertoire clonality and clonal expansion statistics were computed, compared, and tested for their association with clinical activity. Results: We characterized the TCR repertoire from peripheral blood at baseline for 263 patients (209 NSCLC, 54 RCC) with matched on-treatment profiles for 49 patients (49 RCC). In addition, we profiled tumor TCR repertoires at baseline and on treatment for 127 patients (54 RCC, 73 melanoma) at time points predefined in each study’s protocol. Our analyses show that clonal expansion was accompanied by a comparable contraction of other clones and thus was not directionally enriched upon CB treatment. Moreover, comparison of baseline and on-treatment repertoire clonality did not reveal a significant shift following CB treatment. Results were consistent in blood and tumor tissue and across response groups. Baseline peripheral blood TCR clonality was not associated with best overall response or progression-free survival. Conclusions: Our results highlight that TCR repertoires are highly dynamic and that the currently established metrics are difficult to interpret or implement clinically as pharmacodynamic or response biomarkers. The variability in TCR clonality modulation upon CB treatment underscores the challenge of selecting the adequate on-treatment time point. Thus, our comprehensive analysis highlights the need for a better understanding of the TCR repertoire dynamics and development of methods to identify and functionally annotate tumor-specific TCRs. Reference: 1. Riaz N et al. Cell 2017;171:934-49 Citation Format: Simon Papillon-Cavanagh, Alice M. Walsh, Zhenhao Qi, Megan Wind-Rotolo, Abdel Saci, Parul Doshi, Radu Dobrin, Joseph Szustakowski. T-cell receptor sequencing for pharmacodynamic and response biomarkers of checkpoint blockade [abstract]. In: Proceedings of the American Association for Cancer Research Annual Meeting 2019; 2019 Mar 29-Apr 3; Atlanta, GA. Philadelphia (PA): AACR; Cancer Res 2019;79(13 Suppl):Abstract nr 3221.
- Published
- 2019
- Full Text
- View/download PDF
41. Tightening the Bounds on Cache-Related Preemption Delay in Fixed Preemption Point Scheduling
- Author
-
Filip Markovic and Jan Carlson and Radu Dobrin, Markovic, Filip, Carlson, Jan, Dobrin, Radu, Filip Markovic and Jan Carlson and Radu Dobrin, Markovic, Filip, Carlson, Jan, and Dobrin, Radu
- Abstract
Limited Preemptive Fixed Preemption Point scheduling (LP-FPP) has the ability to decrease and control the preemption-related overheads in the real-time task systems, compared to other limited or fully preemptive scheduling approaches. However, existing methods for computing the preemption overheads in LP-FPP systems rely on over-approximation of the evicting cache blocks (ECB) calculations, potentially leading to pessimistic schedulability analysis. In this paper, we propose a novel method for preemption cost calculation that exploits the benefits of the LP-FPP task model both at the scheduling and cache analysis level. The method identifies certain infeasible preemption combinations, based on analysis on the scheduling level, and combines it with cache analysis information into a constraint problem from which less pessimistic upper bounds on cache-related preemption delays (CRPD) can be derived. The evaluation results indicate that our proposed method has the potential to significantly reduce the upper bound on CRPD, by up to 50% in our experiments, compared to the existing over-approximating calculations of the eviction scenarios.
- Published
- 2017
- Full Text
- View/download PDF
42. Variants in TRIM22 that affect NOD2 signaling are associated with very early onset inflammatory bowel disease
- Author
-
Carrie Brodmerkel, Dror S. Shouval, Cheng Hiang Lee, Brian A. Kidd, Yongzhong Zhao, Mark Curran, Ke Hao, Ernest Cutz, Anne M. Griffiths, Holm H. Uhlig, Brigitte Snanter-Nanan, Qi Li, Colette Deslandres, Daniel Kotlarz, Scott B. Snapper, Antonio Di’Narzo, Radu Dobrin, Ziad Al Adham, Tobias Schwerd, Cornelia Thoeni, Elie Haddad, Mingjing Hu, Abdul Elkadri, Melanie Wong, Lucas A. Mastropaolo, Chaim M. Roifman, Aleixo M. Muise, Kevin J. Gaskin, Lauren A. Peters, John H. Brumell, Gabriel E. Hoffman, Christoph Klein, Ryan Murchie, Bin Zhang, Ralph Nanan, Eric E. Schadt, Thomas D. Walters, Conghui Guo, Jun Zhu, and Françoise Le Deist
- Subjects
0301 basic medicine ,Nod2 Signaling Adaptor Protein ,Genome-wide association study ,Disease ,Bioinformatics ,Severity of Illness Index ,Inflammatory bowel disease ,Tripartite Motif Proteins ,Consanguinity ,Crohn Disease ,Germany ,NOD2 ,Databases, Genetic ,Exome ,Gene Regulatory Networks ,Protein Interaction Maps ,NF-kB ,Age of Onset ,Cells, Cultured ,Exome sequencing ,Ontario ,Homozygote ,Gastroenterology ,Pedigree ,3. Good health ,Phenotype ,England ,Female ,Signal Transduction ,Biology ,Transfection ,Article ,Minor Histocompatibility Antigens ,03 medical and health sciences ,medicine ,Humans ,Genetic Predisposition to Disease ,VEOIBD ,Genetic Association Studies ,Hepatology ,Gene Expression Profiling ,Australia ,Infant, Newborn ,Computational Biology ,Genetic Variation ,Antiviral and Antibacterial Networks ,medicine.disease ,digestive system diseases ,Repressor Proteins ,030104 developmental biology ,Immunology ,Calprotectin ,Age of onset - Abstract
Background & Aims Severe forms of inflammatory bowel disease (IBD) that develop in very young children can be caused by variants in a single gene. We performed whole-exome sequence (WES) analysis to identify genetic factors that might cause granulomatous colitis and severe perianal disease, with recurrent bacterial and viral infections, in an infant of consanguineous parents. Methods We performed targeted WES analysis of DNA collected from the patient and her parents. We validated our findings by a similar analysis of DNA from 150 patients with very-early-onset IBD not associated with known genetic factors analyzed in Toronto, Oxford, and Munich. We compared gene expression signatures in inflamed vs noninflamed intestinal and rectal tissues collected from patients with treatment-resistant Crohn's disease who participated in a trial of ustekinumab. We performed functional studies of identified variants in primary cells from patients and cell culture. Results We identified a homozygous variant in the tripartite motif containing 22 gene (TRIM22) of the patient, as well as in 2 patients with a disease similar phenotype. Functional studies showed that the variant disrupted the ability of TRIM22 to regulate nucleotide binding oligomerization domain containing 2 (NOD2)−dependent activation of interferon-beta signaling and nuclear factor−κB. Computational studies demonstrated a correlation between the TRIM22−NOD2 network and signaling pathways and genetic factors associated very early onset and adult-onset IBD. TRIM22 is also associated with antiviral and mycobacterial effectors and markers of inflammation, such as fecal calprotectin, C-reactive protein, and Crohn's disease activity index scores. Conclusions In WES and targeted exome sequence analyses of an infant with severe IBD characterized by granulomatous colitis and severe perianal disease, we identified a homozygous variant of TRIM22 that affects the ability of its product to regulate NOD2. Combined computational and functional studies showed that the TRIM22-NOD2 network regulates antiviral and antibacterial signaling pathways that contribute to inflammation. Further study of this network could lead to new disease markers and therapeutic targets for patients with very early and adult-onset IBD.
- Published
- 2016
43. Integrative genomic deconvolution of rheumatoid arthritis GWAS loci into gene and cell type associations
- Author
-
Yauheniya Cherkas, John W. Whitaker, Alice M. Walsh, Conway C. Huang, S. Lamberth, Carrie Brodmerkel, Radu Dobrin, and Mark Curran
- Subjects
Adult ,Male ,Epigenomics ,0301 basic medicine ,Linkage disequilibrium ,Adolescent ,Quantitative Trait Loci ,Genome-wide association study ,Quantitative trait locus ,Biology ,Epigenesis, Genetic ,Arthritis, Rheumatoid ,03 medical and health sciences ,0302 clinical medicine ,Humans ,Lymphocytes ,Genome-wide association studies (GWAS) ,Rheumatoid arthritis ,Expression quantitative trait loci (eQTLs) ,Aged ,Genetic association ,Aged, 80 and over ,030203 arthritis & rheumatology ,Genetics ,Genome, Human ,Research ,Receptors, IgG ,Epigenome ,Middle Aged ,Human genetics ,030104 developmental biology ,Case-Control Studies ,Expression quantitative trait loci ,Female ,Genome-Wide Association Study - Abstract
Background Although genome-wide association studies (GWAS) have identified over 100 genetic loci associated with rheumatoid arthritis (RA), our ability to translate these results into disease understanding and novel therapeutics is limited. Most RA GWAS loci reside outside of protein-coding regions and likely affect distal transcriptional enhancers. Furthermore, GWAS do not identify the cell types where the associated causal gene functions. Thus, mapping the transcriptional regulatory roles of GWAS hits and the relevant cell types will lead to better understanding of RA pathogenesis. Results We combine the whole-genome sequences and blood transcription profiles of 377 RA patients and identify over 6000 unique genes with expression quantitative trait loci (eQTLs). We demonstrate the quality of the identified eQTLs through comparison to non-RA individuals. We integrate the eQTLs with immune cell epigenome maps, RA GWAS risk loci, and adjustment for linkage disequilibrium to propose target genes of immune cell enhancers that overlap RA risk loci. We examine 20 immune cell epigenomes and perform a focused analysis on primary monocytes, B cells, and T cells. Conclusions We highlight cell-specific gene associations with relevance to RA pathogenesis including the identification of FCGR2B in B cells as possessing both intragenic and enhancer regulatory GWAS hits. We show that our RA patient cohort derived eQTL network is more informative for studying RA than that from a healthy cohort. While not experimentally validated here, the reported eQTLs and cell type-specific RA risk associations can prioritize future experiments with the goal of elucidating the regulatory mechanisms behind genetic risk associations. Electronic supplementary material The online version of this article (doi:10.1186/s13059-016-0948-6) contains supplementary material, which is available to authorized users.
- Published
- 2016
- Full Text
- View/download PDF
44. An Empirical Investigation of Eager and Lazy Preemption Approaches in Global Limited Preemptive Scheduling
- Author
-
Kaiqian Zhu, Radu Dobrin, Yonggao Nie, Abhilash Thekkilakattil, and Sasikumar Punnekkat
- Subjects
Rate-monotonic scheduling ,Earliest deadline first scheduling ,Software_OPERATINGSYSTEMS ,Computer science ,Distributed computing ,Priority scheduling ,020208 electrical & electronic engineering ,Preemption ,Multiprocessing ,02 engineering and technology ,Lower priority ,020202 computer hardware & architecture ,Scheduling (computing) ,Fixed-priority pre-emptive scheduling ,0202 electrical engineering, electronic engineering, information engineering ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS - Abstract
Global limited preemptive real-time scheduling in multiprocessor systems using Fixed Preemption Points FPP brings in an additional challenge with respect to the choice of the task to be preempted in order to maximize schedulability. Two principal choices with respect to the preemption approach exist 1 the scheduler waits for the lowest priority job to become preemptible, 2 the scheduler preempts the first job, among the lower priority ones, that becomes preemptible. We refer to the former as the Lazy Preemption Approach LPA and the latter as the Eager Preemption Approach EPA. Each of these choice has a different effect on the actual number of preemptions in the schedule, that in turn determine the runtime overheads. In this paper, we perform an empirical comparison of the run-time preemptive behavior of Global Preemptive Scheduling and Global Limited Preemptive Scheduling with EPA and LPA, under both Earliest Deadline First EDF and Fixed Priority Scheduling FPS paradigms. Our experiments reveal interesting observations some of which are counter-intuitive. We then analyse the counter-intuitive observations and identify the associated reasons. The observations presented facilitate the choice of appropriate strategies when using limited preemptive schedulers on multiprocessor systems.
- Published
- 2016
- Full Text
- View/download PDF
45. Tu1802 - Disease Demarcation in Ulcerative Colitis is Associated with Different Patterns of Gene Expression
- Author
-
Aritz Irizar, Wenhui Wang, Lauren A. Peters, Won-Min Song, Jean-Frederic Colombel, Marla Dubinsky, Carrie Brodmerkel, Carmen Argmann, Ryan C. Ungaro, Jun Zhu, Ashish Atreja, Scott E. Plevy, Eric E. Schadt, Mark E. Curran, Milind Mahajan, Mayte Suárez-Fariñas, Roman Kosoy, Jason Rogers, Radu Dobrin, Bojan Losic, Anabella Castillo, Bruce E. Sands, Jacqueline Perrigoue, Joshua R. Friedman, Gabrielle Wei, Ke Hao, Aleksandar Stojmirović, Andrew Kasarskis, Amanda Hurley, Antonio Fabio Di Narzo, Ruiqi Huang, and Bin Zhang
- Subjects
Hepatology ,business.industry ,Gene expression ,Immunology ,Gastroenterology ,medicine ,Disease ,medicine.disease ,business ,Ulcerative colitis - Published
- 2018
- Full Text
- View/download PDF
46. DOP012 Disease demarcation in ulcerative colitis is associated with different patterns of gene expression
- Author
-
Mayte Suárez-Fariñas, A Di Narzo, Radu Dobrin, Ashish Atreja, Marla Dubinsky, J.-F. Colombel, Aleksandar Stojmirović, Mark Curran, Anabella Castillo, Wenhui Wang, R Huang, Ryan C. Ungaro, Bin Zhang, Eric E. Schadt, Gabrielle Wei, Amanda Hurley, Roman Kosoy, Lauren A. Peters, Ke Hao, Carmen Argmann, Won-Min Song, Bruce E. Sands, Jacqueline Perrigoue, Jun Zhu, Bojan Losic, Andrew Kasarskis, Milind Mahajan, Jason Rogers, A Irizar, Carrie Brodmerkel, Joshua R. Friedman, and S Plevy
- Subjects
Pancolitis ,biology ,business.industry ,Gastroenterology ,General Medicine ,Disease ,medicine.disease ,Ulcerative colitis ,Interleukin 22 ,Gene expression ,Immunology ,biology.protein ,medicine ,Colitis ,medicine.symptom ,Interleukin 6 ,business ,Gene - Published
- 2018
- Full Text
- View/download PDF
47. Quantifying the Exact Sub-optimality of Non-preemptive Scheduling
- Author
-
Radu Dobrin, Robert I. Davis, Oliver Gettings, Abhilash Thekkilakattil, Sasikumar Punnekkat, Models and methods of analysis and optimization for systems with real-time and embedding constraints (AOSTE), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Inria Paris-Rocquencourt, Institut National de Recherche en Informatique et en Automatique (Inria)-COMmunications, Réseaux, systèmes Embarqués et Distribués (Laboratoire I3S - COMRED), Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), Université Nice Sophia Antipolis (... - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (... - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA), University of York [York, UK], Mälardalen Research and Technology Centre (MRTC), Mälardalen University (MDH), Université Nice Sophia Antipolis (1965 - 2019) (UNS), and COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (1965 - 2019) (UNS)
- Subjects
Rate-monotonic scheduling ,Earliest deadline first scheduling ,Mathematical optimization ,Fixed-priority pre-emptive scheduling ,Computer science ,Uniprocessor system ,[INFO.INFO-ES]Computer Science [cs]/Embedded Systems ,Dynamic priority scheduling ,Parallel computing ,Upper and lower bounds ,Deadline-monotonic scheduling ,Scheduling (computing) - Abstract
International audience; Fixed priority scheduling is used in many real-time systems; however, both preemptive and non-preemptive variants (FP-P and FP-NP) are known to be sub-optimal when compared to an optimal uniprocessor scheduling algorithm such as preemptive Earliest Deadline First (EDF-P). In this paper, we investigate the sub-optimality of fixed priority non-preemptive scheduling. Specifically, we derive the exact processor speed-up factor required to guarantee the feasibility under FP-NP (i.e. schedulablability assuming an optimal priority assignment) of any task set that is feasible under EDF-P. As a consequence of this work, we also derive a lower bound on the sub-optimality of non-preemptive EDF (EDF-NP), which since it matches a recently published upper bound gives the exact sub-optimality for EDF-NP. It is known that neither preemptive, nor non-preemptive fixed priority scheduling dominates the other, i.e., there are task sets that are feasible on a processor of unit speed under FP-P that are not feasible under FP-NP and vice-versa. Hence comparing these two algorithms, there are non-trivial speedup factors in both directions. We derive the exact speed-up factor required to guarantee the FP-NP feasibility of any FP-P feasible task set. Further, we derive upper and lower bounds on the speed-up factor required to guarantee FP-P feasibility of any FP-NP feasible task set. Empirical evidence suggests that the lower bound may be tight, and hence equate to the exact speed-up factor in this case.
- Published
- 2015
- Full Text
- View/download PDF
48. Multiprocessor fixed priority scheduling with limited preemptions
- Author
-
Marko Bertogna, Robert I. Davis, Sasikumar Punnekkat, Radu Dobrin, and Abhilash Thekkilakattil
- Subjects
Earliest deadline first scheduling ,Rate-monotonic scheduling ,Priority inversion ,Priority inheritance ,Computer science ,Distributed computing ,Preemption ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Human-Computer Interaction ,Computer Networks and Communications ,1707 ,Software ,Dynamic priority scheduling ,Parallel computing ,Priority ceiling protocol ,Deadline-monotonic scheduling - Abstract
Challenges associated with allowing preemptions and migrations are compounded in multicore systems, particularly under global scheduling policies, because of the potentially high overheads. For example, multiple levels of cache greatly increase preemption and migration related overheads as well as the difficulty involved in accurately accounting for them, leading to substantially inflated worst-case execution times (WCETs). Preemption and migration related overheads can be significantly reduced, both in number and in size, by using fixed preemption points in the tasks' code; thus dividing each task into a series of non-preemptive regions (NPRs). This leads to an additional consideration in the scheduling policy. When a high priority task is released and all of the processors are executing non-preemptive regions of lower priority tasks, then there is a choice to be made in terms of how to manage the next preemption. With an eager approach the first lower priority task to reach a preemption point is preempted even if it is not the lowest priority running task. Alternatively, with a lazy approach, preemption is delayed until the lowest priority currently running task reaches its next preemption point.In this paper, we show that under global fixed priority scheduling with eager preemptions each task suffers from at most a single priority inversion each time it resumes execution. Building on this observation, we derive a new response time based schedulability test for tasks with fixed preemption points. Experimental evaluations show that global fixed priority scheduling with eager preemptions is significantly more effective than with lazy preemption using link based scheduling in terms of task set schedulability.
- Published
- 2015
- Full Text
- View/download PDF
49. NDEx, the Network Data Exchange
- Author
-
Carol Miello, Michael Braxenthaler, Keiichiro Ono, Trey Ideker, Ricardo Rivas, Aleksandar Stojmirović, Radu Dobrin, Rudolf T. Pillich, Lyndon Hicks, Jan Kuentzer, Jing Chen, David Welker, Dexter Pratt, Barry Demchak, Vladimir Rynkov, and Sándor Szalma
- Subjects
Histology ,Computer science ,business.industry ,Interface (computing) ,Big data ,Network data ,Cell Biology ,Storage model ,Article ,Pathology and Forensic Medicine ,Scientific discourse ,World Wide Web ,Public access ,Upload ,business ,Communication channel - Abstract
SummaryNetworks are a powerful and flexible methodology for expressing biological knowledge for computation and communication. Network-encoded information can include systematic screens for molecular interactions, biological relationships curated from literature, and outputs from analyses of Big Data. NDEx, the Network Data Exchange (www.ndexbio.org), is an online commons where scientists can upload, share, and publicly distribute networks. Networks in NDEx receive globally unique accession IDs and can be stored for private use, shared in pre-publication collaboration, or released for public access. Standard and novel data formats are accommodated in a flexible storage model. Organizations can use NDEx as a distribution channel for networks they generate or curate. Developers of bioinformatic applications can store and query NDEx networks via a common programmatic interface. NDEx helps expand the role of networks in scientific discourse and facilitates the integration of networks as data in publications. It is a step toward an ecosystem in which networks bearing data, hypotheses, and findings flow easily between scientists.
- Published
- 2015
50. Su1858 Integrative Networks Identify Novel Regulators of Susceptibility and Pathogenesis of Inflammatory Bowel Disease
- Author
-
Fumiyuki Fukui, Brian A. Kidd, Antonio Fabio Di Narzo, Won-Min Song, Alina Iuga, Panos Roussos, Eric M. Neiman, Bojan Losic, Anuk Das, Teresa K. Tarrant, Joel T. Dudley, Radu Dobrin, Jun Zhu, Jeremiah J. Faith, Sean R. Llewellyn, Eric E. Schadt, Carmen Argmann, Bin Zhang, Ariella Cohain, Riccardo Miotto, Yongzhong Zhao, Khader Shameer, Hardik Shah, Arthur Mortha, Lauren A. Peters, Mark E. Curran, Lloyd Mayer, Jacqueline Perrigoue, Andrew Kasarskis, Nicholas E.S. Sibinga, Miriam Merad, Aleksandar Stojmirović, Brian M. Iritani, Ke Hao, and Joshua R. Friedman
- Subjects
Pathogenesis ,Hepatology ,business.industry ,Immunology ,Gastroenterology ,medicine ,medicine.disease ,business ,Inflammatory bowel disease - Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.