Neurothekeoma and Plexiform Fibrohistiocytic Tumor
ABSTRACT Neurothekeoma (NTK) and plexiform fibrohistiocytic tumor (PFHT) are dermal neoplasms that share many clinical and histologic features and whose histogenesis is equally disputed. We analyzed the morphologic and immunohistochemical features of 43 NTK and 18 PFHT to evaluate a possible relationship between these tumors. On the basis of the amount of myxoid stroma, we divided NTK into myxoid neurothekeoma (MyNTK) (8 cases), mixed neurothekeoma (MiNTK) (15 cases), and cellular neurothekeoma (CNTK) (20 cases). MyNTK and MiNTK were well circumscribed lesions composed of spindle cells. CNTK had an infiltrative quality and consisted of predominantly epithelioid cells, with over 50% of the cases containing multinucleated giant cells. PFHT were predominantly composed of epithelioid cells in 11 cases, spindle cells in 1, and an even admixture of spindle and epithelioid cells in 6 cases. Their morphologic features (particularly those of the more epithelioid examples) were superimposable to those of CNTK. Immunohistochemically, there was positivity for S100 protein in 8 of 8 MyNTK, 4 of 15 MiNTK, 1 of 19 CNTK, and 0 of 18 PFHT. There was positivity for CD68 in 0 of 8 MyNTK, 6 of 15 MiNTK, 9 of 17 CNTK, and 6 of 11 PFHT. These results suggest the existence of a continuum between MyNTK and MiNTK. Furthermore, the marked morphologic and phenotypic similarities between CNTK and PFHT suggest a common histogenesis for these 2 tumors, different from that of MyNTK and MiNTK.
Conference Paper: The value evolution graph and its use in memory reference analysis[Show abstract] [Hide abstract]
ABSTRACT: We introduce a framework for the analysis of memory reference sets addressed by induction variables without closed forms. This framework relies on a new data structure, the value evolution graph (VEG), which models the global flow of values taken by induction variable with and without closed forms. We describe the application of our framework to array data-flow analysis, privatization, and dependence analysis. This results in the automatic parallelization of loops that contain arrays addressed by induction variables without closed forms. We implemented this framework in the Polaris research compiler. We present experimental results on a set of codes from the PERFECT, SPEC, and NCSA benchmark suites.Parallel Architecture and Compilation Techniques, 2004. PACT 2004. Proceedings. 13th International Conference on; 01/2004
Conference Paper: Fault tolerant analysis of secure multicast models[Show abstract] [Hide abstract]
ABSTRACT: Recently, fault tolerant secure multicast services have received much attention among researchers. The fundamental challenge revolves around developing a self-stabilized, fault tolerant secure multicast model. In this paper, the fault tolerant nature of different secure multicast models are evaluated and analyzed. Also the recently proposed LeaSel model [R. E. Blessing and V. R. Uthariaraj, Dec 2002] is implemented, experimentally tested and analyzed to determine its fault tolerance behavior. The results show that for different numbers of members in the group, the LeaSel model exhibits self-stabilization property and proves to be absolutely fault tolerant.Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint Conference of the Fourth International Conference on; 01/2004
- Ground Penetrating Radar, 2004. GPR 2004. Proceedings of the Tenth International Conference on; 02/2004