Open Access. Powered by Scholars. Published by Universities.®

Cancer Biology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Cancer Biology

Genomic Predictors Of Drug Response To The Alpha-Specific Phosphoinositol 3-Kinase (Pi3ka-Alpha) Inhibitor Byl719 In Head And Neck Cancers, Giananthony T. Rizzo Jul 2014

Genomic Predictors Of Drug Response To The Alpha-Specific Phosphoinositol 3-Kinase (Pi3ka-Alpha) Inhibitor Byl719 In Head And Neck Cancers, Giananthony T. Rizzo

Electronic Thesis and Dissertation Repository

PIK3CA is the only frequently mutated, druggable oncogene in head and neck squamous cell cancer (HNSCC), with PIK3CA point mutations and gene amplification rates of 17.5% and 40% respectively, with higher rates in HPV-positive disease. The objective of this research was to determine the effects of BYL719, an α-specific PI3K inhibitor in HNSCC cell lines.

All cell lines with PIK3CA hotspot point mutations or gene amplifications will be sensitive to BYL719.

Twenty-eight HNSCC cell lines were subjected to increasing concentrations of BYL719 and cell viability was measured over time. Cell lines were screened for activating PIK3CA hotspot mutations and ...


Metastatic Disease: Interactions Between Tumor Cells And Host Environment During Cancer Cell Spread, Jennifer M. Maclean Jul 2011

Metastatic Disease: Interactions Between Tumor Cells And Host Environment During Cancer Cell Spread, Jennifer M. Maclean

Electronic Thesis and Dissertation Repository

Tumor and metastasis formation are not cell autonomous phenomena, but rather an evolution of disease within and responding to the host environment. Metastatic spread from a primary tumor occurs as a result of a complex interplay between tumor cells and the host, wherein tumor cells must escape the primary tumor, enter the host vasculature, travel to and arrest in a distant tissue and survive and grow in that new organ. It is known that cells that progress through these stages must both escape and exploit host systems, yet the mechanisms used are not fully understood. Therefore, the goal of this ...