• Title/Summary/Keyword: Memory inflation

Search Result 3, Processing Time 0.019 seconds

Cytomegalovirus Infection and Memory T Cell Inflation

  • Kim, Jihye;Kim, A-Reum;Shin, Eui-Cheol
    • IMMUNE NETWORK
    • /
    • v.15 no.4
    • /
    • pp.186-190
    • /
    • 2015
  • Cytomegalovirus (CMV) infection in healthy individuals is usually asymptomatic and results in latent infection. CMV reactivation occasionally occurs in healthy individuals according to their immune status over time. T cell responses to CMV are restricted to a limited number of immunodominant epitopes, as compared to responses to other chronic or persistent viruses. This response results in progressive, prolonged expansion of CMV-specific $CD8^+$ T cells, termed 'memory inflation'. The expanded CMV-specific $CD8^+$ T cell population is extraordinarily large and is more prominent in the elderly. CMV-specific $CD8^+$ T cells possess rather similar phenotypic and functional features to those of replicative senescent T cells. In this review, we discuss the general features of CMV-specific inflationary memory T cells and the factors involved in memory inflation.

Minimizing Security Hole and Improving Performance in Stateful Inspection for TCP Connections (TCP연결의 스테이트풀 인스펙션에 있어서의 보안 약점 최소화 및 성능 향상 방법)

  • Kim, Hyo-Gon;Kang, In-Hye
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.443-451
    • /
    • 2005
  • Stateful inspection devices must maintain flow information. These devices create the flow information also for network attack packets, and it can fatally inflate the dynamic memory allocation on stateful inspection devices under network attacks. The memory inflation leads to memory overflow and subsequent performance degradation. In this paper, we present a guideline to set the flow entry timeout for a stateful inspection device to remove harmful embryonic entries created by network attacks. Considering Transmission Control Protocol (TCP) if utilized by most of these attacks as well as legitimate traffic, we propose a parsimonious memory management guideline based on the design of the TCP and the analysis of real-life Internet traces. In particular, we demonstrate that for all practical purposes one should not reserve memory for an embryonic TCP connection with more than (R+T) seconds of inactivity where R=0, 3, 9 and $1\leqq{T}\leqq{2}$ depending on the load level.

Preserving Our Digital Heritage: A UNESCO Perspective (디지털 유산의 보존: UNESCO의 관점에서)

  • Abid, Abdelaziz
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.5 no.2
    • /
    • pp.183-193
    • /
    • 2005
  • A large part of the vast amounts of information produced in the world is born digital, and comes in a wide variety of formats: text, database, audio, film, image. During the meeting of the Organization's Executive Board in May 2001, Member States agreed on the need for rapid action to safeguard digital heritage. The interest of UNESCO in this situation comes as no surprise. UNESCO exists in part to encourage and enable the preservation and enjoyment of the cultural, scientific and information heritage of the world's peoples. The growth of digital heritage and its vulnerability could hardly go unnoticed. Our societies have witnessed the end of the paradigm of the written archive, a paradigm that had developed over hundreds of years. Throughout the twentieth century new media have wisely and modestly joined this prestigious tradition. This paradigm has already been transformed, and the devices in place are unable to deal with the brutal advance of information technologies, and the quantitative inflation which they cause. This goes beyond those institutions specializing in the management of memory: a whole new regime of information will have to be constructed, and quickly, completely transforming old memory and archiving systems. If this shift does not take place, our societies will suffer irremediable damage in their collective social memory.