oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Search Results: 1 - 10 of 57 matches for " Barni "
All listed articles are free for downloading (OA Articles)
Page 1 /57
Display every page Item
Aspetti medico-legali
M. Barni
Aestimum , 1981,
Abstract:
Saluto
M. Barni
Aestimum , 1980,
Abstract:
Das Wortspiel in Manfred Peter Heins Gedichten
Sigita Barni?kien?
Literatura , 2007,
Abstract:
Oral vinorelbine: its role in advanced breast cancer pre-treated with anthracycline and taxane chemotherapies
Fausto Petrelli,Sandro Barni
Oncology Reviews , 2011, DOI: 10.4081/49
Abstract: Metastatic breast cancer (BC) remains an incurable disease and clinical benefit and prolongation of time to progression are the main end-points in advanced setting. A safe and feasible schedule of administration is the principal option in pre-treated and symptomatic patients, as in the elderly too. Oral vinorelbine represents a good choice for its toxicity profile and activity in anthracycline and taxane-pre-treated BC patients. A 20–30% response rate (RR) can be obtained when used as single agent. In phase II trials, involving fit patients, and when oral vinorelbine is used in combination with other agents (e.g., capecitabine) a RR of 50-60% has been observed. In HER2-positive BC a combination of oral vinorelbine and trastuzumab has a dramatic activity in first-line therapy and is a reasonable choice in trastuzumab pre-treated patients. In conclusion, oral vinorelbine represents a pivotal choice in advanced and pre-treated BC both as single agent and in combination with others.
Design and Analysis of the First BOWS Contest
Piva A,Barni M
EURASIP Journal on Information Security , 2007,
Abstract: The break our watermarking system (BOWS) contest was launched in the framework of the activities carried out by the European Network of Excellence for Cryptology ECRYPT. The aim of the contest was to investigate how and when an image watermarking system can be broken while preserving the highest possible quality of the content, in the case the watermarking system is subject to a massive worldwide attack. The great number of participants and the echo that the contest has had in the watermarking community contributed to make BOWS a great success. From a scientific point of view, many insights into the problems attackers have to face with when operating in a practical scenario have been obtained, confirming the threat posed by the sensitivity attack, which turned out to be the most successful attack. At the same time, several interesting modifications of such an attack have been proposed to make it work in a real scenario under limited communication and time resources. This paper describes how the contest has been designed and analyzes the general progress of the attacks during the contest.
Design and Analysis of the First BOWS Contest
A. Piva,M. Barni
EURASIP Journal on Information Security , 2007, DOI: 10.1155/2007/98684
Abstract: The break our watermarking system (BOWS) contest was launched in the framework of the activities carried out by the European Network of Excellence for Cryptology ECRYPT. The aim of the contest was to investigate how and when an image watermarking system can be broken while preserving the highest possible quality of the content, in the case the watermarking system is subject to a massive worldwide attack. The great number of participants and the echo that the contest has had in the watermarking community contributed to make BOWS a great success. From a scientific point of view, many insights into the problems attackers have to face with when operating in a practical scenario have been obtained, confirming the threat posed by the sensitivity attack, which turned out to be the most successful attack. At the same time, several interesting modifications of such an attack have been proposed to make it work in a real scenario under limited communication and time resources. This paper describes how the contest has been designed and analyzes the general progress of the attacks during the contest.
Binary Hypothesis Testing Game with Training Data
Mauro Barni,Benedetta Tondi
Computer Science , 2013,
Abstract: We introduce a game-theoretic framework to study the hypothesis testing problem, in the presence of an adversary aiming at preventing a correct decision. Specifically, the paper considers a scenario in which an analyst has to decide whether a test sequence has been drawn according to a probability mass function (pmf) P_X or not. In turn, the goal of the adversary is to take a sequence generated according to a different pmf and modify it in such a way to induce a decision error. P_X is known only through one or more training sequences. We derive the asymptotic equilibrium of the game under the assumption that the analyst relies only on first order statistics of the test sequence, and compute the asymptotic payoff of the game when the length of the test sequence tends to infinity. We introduce the concept of indistinguishability region, as the set of pmf's that can not be distinguished reliably from P_X in the presence of attacks. Two different scenarios are considered: in the first one the analyst and the adversary share the same training sequence, in the second scenario, they rely on independent sequences. The obtained results are compared to a version of the game in which the pmf P_X is perfectly known to the analyst and the adversary.
Source Distinguishability under Distortion-Limited Attack: an Optimal Transport Perspective
Mauro Barni,Benedetta Tondi
Computer Science , 2014,
Abstract: We analyze the distinguishability of two sources in a Neyman-Pearson set-up when an attacker is allowed to modify the output of one of the two sources subject to a distortion constraint. By casting the problem in a game-theoretic framework and by exploiting the parallelism between the attacker's goal and Optimal Transport Theory, we introduce the concept of Security Margin defined as the maximum average per-sample distortion introduced by the attacker for which the two sources can be distinguished ensuring arbitrarily small, yet positive, error exponents for type I and type II error probabilities. Several versions of the problem are considered according to the available knowledge about the sources and the type of distance used to define the distortion constraint. We compute the security margin for some classes of sources and derive a general upper bound assuming that the distortion is measured in terms of the mean square error between the original and the attacked sequence.
Changes on lysosomal compartment during PMA-induced differentiation of THP-1 monocytic cells: Influence of type I and type IV collagens  [PDF]
Alessandra Spano, Sergio Barni, Vittorio Bertone, Luigi Sciola
Advances in Bioscience and Biotechnology (ABB) , 2013, DOI: 10.4236/abb.2013.48A3002
Abstract:

In this work, the influence of different substrate adhesion during phorbol-12-myristate-13-acetate (PMA)-induced differentiation of THP-1 monocytic cell line was studied. In particular, by morphocytochemical and cytometric approaches, the influence of type I and type IV collagens in an experimental model representative of three phases (initial, intermediate and terminal) of monocyte-macrophage transition was analyzed. The cells in these three phases of differentiation were obtained by using 6, 30 e 60 nM PMA. In this experimental model, referring to adhesion to glass as control, by using the azo-dye coupling method, we have considered the analysis of Acid Phosphatase (AcP) activity as a marker of differentiated status expression, in relation to the acquisition of macrophagic phenotype. Endosomal/lysosomal system was further characterized by taking into account the uptake of fluorescent probe LysoTracker Red. Fluorochromization in the various experimental conditions was analyzed morphologically (fluorescence microscopy) and quantitatively (static cytometry). Data related to lysosome compartment were integrated, from a cytokinetic point of view, by flow cytometry measurements of DNA/protein content. Our results have indicated that type I and type IV collagens were able to influence, with respect to glass adhesion, various differentiation phases. Type I collagen showed the higher effects in the condition of high differentiation (60 nM PMA), causing an increase in AcP activity and lysosomal system. Type IV collagen, besides determining effects on lysosomal compartment of intermediate and terminally differentiated cells, influenced mainly proliferative activity of cells with initial differentiation level (6 nM PMA).

Meloeiro em estufa: duas hastes é o melhor sistema de condu??o
Barni, Valmor;Barni, Nídio Antonio;Silveira, José Ricardo Pfeifer;
Ciência Rural , 2003, DOI: 10.1590/S0103-84782003000600007
Abstract: this trial was done with the main objetive of evaluating the productive behavior of four treatments termed systems of conduction for the melon crops cultivated inside polyethylene greenhouse. the four systems of conduction or treatments had the following composition: system 1, one stem with ramification without pruning; 2, one stem without ramifications with pruning; 3, two stems with pruning and 4, four stems with pruning. results showed the conduction system 3 as the best for melon crop, followed by treatments 1 and 2. the highest melon productivity per square meter 9.4kg was given by the treatment 3. the adoption of the pruning technique improved median weight of the melon fruit. treatment 4, reduced the number of fruits per plant and the medium size of the fruits. also, the negative effect of the treatments 3 and 4 regard to delay in fruit mature and harvest were observed.
Page 1 /57
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.