2013
DOI: 10.1038/leu.2013.211
|View full text |Cite
|
Sign up to set email alerts
|

PAX5 overexpression is not enough to reestablish the mature B-cell phenotype in classical Hodgkin lymphoma

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
21
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(22 citation statements)
references
References 14 publications
1
21
0
Order By: Relevance
“…This notion is further supported by recent data showing that introduction of PAX5 into Hodgkin lymphoma cells is unable to reestablish a mature B-cell expression signature (51).…”
Section: Discussionsupporting
confidence: 73%
“…This notion is further supported by recent data showing that introduction of PAX5 into Hodgkin lymphoma cells is unable to reestablish a mature B-cell expression signature (51).…”
Section: Discussionsupporting
confidence: 73%
“…Second, PAX5, a transcription factor critical for B-cell commitment, is often moderately expressed in HRS cells irrespective of their lost B-cell phenotype 31 but virtually undetectable in cHL cell lines KM-H2 and L428 (supplemental Figure 3A). To rule out that subcritical PAX5 expression may hinder reconstitution of CD19 promoter activity, we infected L428 cells prior to the pharmacological screening with a mifepristone-inducible construct encoding PAX5 24 (supplemental Figure 3B). …”
Section: Resultsmentioning
confidence: 99%
“…23,24 Plasmids encoding B-cell-specific promoter sequences and a geneticin (G418) resistance gene were generous gifts from C. Tonnelle (EmMar-CD19-pTRIP) and M. Sigvardsson (pGL3-mb-1 [CD79a] and pGL3-B29 [CD79b]). [25][26][27] The EmMar-CD19 fragment was further subcloned into the luciferase-encoding pGL3 reporter vector system as well.…”
Section: Plasmid Constructionmentioning
confidence: 99%
“…The most related previous works on secure kNN queries are [8,14,15,28,31,34,36,37]. Wong et al [34] proposed a new encryption scheme called asymmetric scalar-product-preserving encryption In their work, data and query are encrypted using slightly different encryption schemes before being outsourced to the cloud server and all the clients know the private key.…”
Section: Secure Knn Queriesmentioning
confidence: 99%
“…Instead of asking the cloud server to retrieve the exact kNN result, their method retrieves a relevant encrypted partition E(R) for E(Q) such that R is guaranteed to contain the kNN of Yi et al [37] propose solutions for secure kNN queries based on oblivious transfer paradigm. Qi et al [31] proposed efficient protocols with linear computation and communication complexity for secure kNN queries, when the data is distributed between two parties who want to cooperatively compute the answers without revealing to each other their private data. Qi et al [31] proposed efficient protocols with linear computation and communication complexity for secure kNN queries, when the data is distributed between two parties who want to cooperatively compute the answers without revealing to each other their private data.…”
Section: Secure Knn Queriesmentioning
confidence: 99%