Introduction: The expression of PD-L1 as a predictive marker of response to treatment of non-small cell lung cancer (NSCLC) allows the identification of patients most likely to benefit from treatment with inhibitors of immune checkpoints. The main objective of this study was to determine the PD-L1 positivity/negativity rates of biopsies diagnosed with NSCLC during the year 2017 and 2018 at CHUPorto and compare ...
Introduction: Immune checkpoint inhibitors (IC) are a new therapeutic option for non-small cell lung cancer. A higher neutrophil/lymphocyte ratio has been associated with worse outcomes in patients treated with immune checkpoint inhibitors, lung cancer included. Aim: Study the relation between value of neutrophil/lymphocyte ratio at day one (D1) and day 30 (D30) of treatment, and overall survival (OS) and progr...
Introduction Low-grade chondrosarcomas (LG-CS), including atypical cartilaginous tumors (ACT), are locally aggressive lesions. The focus of the discussion sits on the differential diagnosis between benign lesions or aggressive cartilaginous tumors and on their treatment: intralesional curettage or wide resection. This study presents the results obtained in the surgical treatment of 21 cases of LG-CS. Methods Th...
The capability to anticipate a contact with another device can contribute to improve the performance and user satisfaction of mobile social network applications and of any other relying on some form of data harvesting or hoarding. This paper presents a 9 year data set of wireless access logs produced by more than 70000 devices and 40000 users. Research on the recurring contact patterns observed between groups o...
The availability of cheap wireless sensors boosted the emergence of unstructured networks using wireless technologies with decentralised administration. However, a simple task such as learning the temperature needs a discovery service to find a thermometer among all the sensors. In general, resource discovery relies on flooding mechanisms that waste energy and compromises system availability. Energy efficient s...
The capability to anticipate a contact with another device can greatly improve the performance and user satisfaction not only of mobile social network applications but of any other relying on some form of data harvesting or hoarding. One of the most promising approaches for contact prediction is to extrapolate from past experiences. This paper investigates the recurring contact patterns observed between groups ...
The emergence of smartphones with Wireless LAN (WiFi) network interfaces brought new challenges to application developers. The expected increase of users connectivity will impact their expectations for example on the performance of background applications. Unfortunately, the number and breadth of the studies on the new patterns of user mobility and connectivity that result from the emergence of smartphones is s...
Searching for resources over unstructured networks is usually supported by broadcast communication primitives. Ideally, the broadcast process should be cancelled as soon as possible after a successful discovery, to avoid ooding the entire network. However, cancelling an ongoing broadcast is challenging and may increase the number of exchanged messages. In this paper, we compare the cancellation mechanisms used ...
Broadcast is a communication primitive building block widely used in mobile ad-hoc networks (MANETs) for the exchange of control packets and resource location for upper level services such as routing and management protocols. Flooding is the most simple broadcast algorithm, but it wastes a lot of energy and bandwidth, as flooding leads to many redundant radio transmissions. An optimization to flooding is to con...
Unstructured peer-to-peer networks have a low maintenance cost, high resilience and tolerance to the continuous arrival and departure of nodes. In these networks search is usually performed by flooding, which is highly inefficient. To improve scalability, unstructured overlays evolved to a two-tiered architecture where regular nodes rely on superpeers to locate resources. While this approach takes advantage of ...