3,342 research outputs found

    ENHANCING CLOUD SYSTEM RUNTIME TO ADDRESS COMPLEX FAILURES

    Get PDF
    As the reliance on cloud systems intensifies in our progressively digital world, understanding and reinforcing their reliability becomes more crucial than ever. Despite impressive advancements in augmenting the resilience of cloud systems, the growing incidence of complex failures now poses a substantial challenge to the availability of these systems. With cloud systems continuing to scale and increase in complexity, failures not only become more elusive to detect but can also lead to more catastrophic consequences. Such failures question the foundational premises of conventional fault-tolerance designs, necessitating the creation of novel system designs to counteract them. This dissertation aims to enhance distributed systems’ capabilities to detect, localize, and react to complex failures at runtime. To this end, this dissertation makes contributions to address three emerging categories of failures in cloud systems. The first part delves into the investigation of partial failures, introducing OmegaGen, a tool adept at generating tailored checkers for detecting and localizing such failures. The second part grapples with silent semantic failures prevalent in cloud systems, showcasing our study findings, and introducing Oathkeeper, a tool that leverages past failures to infer rules and expose these silent issues. The third part explores solutions to slow failures via RESIN, a framework specifically designed to detect, diagnose, and mitigate memory leaks in cloud-scale infrastructures, developed in collaboration with Microsoft Azure. The dissertation concludes by offering insights into future directions for the construction of reliable cloud systems

    Planetary Hinterlands:Extraction, Abandonment and Care

    Get PDF
    This open access book considers the concept of the hinterland as a crucial tool for understanding the global and planetary present as a time defined by the lasting legacies of colonialism, increasing labor precarity under late capitalist regimes, and looming climate disasters. Traditionally seen to serve a (colonial) port or market town, the hinterland here becomes a lens to attend to the times and spaces shaped and experienced across the received categories of the urban, rural, wilderness or nature. In straddling these categories, the concept of the hinterland foregrounds the human and more-than-human lively processes and forms of care that go on even in sites defined by capitalist extraction and political abandonment. Bringing together scholars from the humanities and social sciences, the book rethinks hinterland materialities, affectivities, and ecologies across places and cultural imaginations, Global North and South, urban and rural, and land and water

    Protecting Privacy in Indian Schools: Regulating AI-based Technologies' Design, Development and Deployment

    Get PDF
    Education is one of the priority areas for the Indian government, where Artificial Intelligence (AI) technologies are touted to bring digital transformation. Several Indian states have also started deploying facial recognition-enabled CCTV cameras, emotion recognition technologies, fingerprint scanners, and Radio frequency identification tags in their schools to provide personalised recommendations, ensure student security, and predict the drop-out rate of students but also provide 360-degree information of a student. Further, Integrating Aadhaar (digital identity card that works on biometric data) across AI technologies and learning and management systems (LMS) renders schools a ‘panopticon’. Certain technologies or systems like Aadhaar, CCTV cameras, GPS Systems, RFID tags, and learning management systems are used primarily for continuous data collection, storage, and retention purposes. Though they cannot be termed AI technologies per se, they are fundamental for designing and developing AI systems like facial, fingerprint, and emotion recognition technologies. The large amount of student data collected speedily through the former technologies is used to create an algorithm for the latter-stated AI systems. Once algorithms are processed using machine learning (ML) techniques, they learn correlations between multiple datasets predicting each student’s identity, decisions, grades, learning growth, tendency to drop out, and other behavioural characteristics. Such autonomous and repetitive collection, processing, storage, and retention of student data without effective data protection legislation endangers student privacy. The algorithmic predictions by AI technologies are an avatar of the data fed into the system. An AI technology is as good as the person collecting the data, processing it for a relevant and valuable output, and regularly evaluating the inputs going inside an AI model. An AI model can produce inaccurate predictions if the person overlooks any relevant data. However, the state, school administrations and parents’ belief in AI technologies as a panacea to student security and educational development overlooks the context in which ‘data practices’ are conducted. A right to privacy in an AI age is inextricably connected to data practices where data gets ‘cooked’. Thus, data protection legislation operating without understanding and regulating such data practices will remain ineffective in safeguarding privacy. The thesis undergoes interdisciplinary research that enables a better understanding of the interplay of data practices of AI technologies with social practices of an Indian school, which the present Indian data protection legislation overlooks, endangering students’ privacy from designing and developing to deploying stages of an AI model. The thesis recommends the Indian legislature frame better legislation equipped for the AI/ML age and the Indian judiciary on evaluating the legality and reasonability of designing, developing, and deploying such technologies in schools

    LIPIcs, Volume 251, ITCS 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 251, ITCS 2023, Complete Volum

    Investigation of the metabolism of rare nucleotides in plants

    Get PDF
    Nucleotides are metabolites involved in primary metabolism, and specialized metabolism and have a regulatory role in various biochemical reactions in all forms of life. While in other organisms, the nucleotide metabolome was characterized extensively, comparatively little is known about the cellular concentrations of nucleotides in plants. The aim of this dissertation was to investigate the nucleotide metabolome and enzymes influencing the composition and quantities of nucleotides in plants. For this purpose, a method for the analysis of nucleotides and nucleosides in plants and algae was developed (Chapter 2.1), which comprises efficient quenching of enzymatic activity, liquid-liquid extraction and solid phase extraction employing a weak-anionexchange resin. This method allowed the analysis of the nucleotide metabolome of plants in great depth including the quantification of low abundant deoxyribonucleotides and deoxyribonucleosides. The details of the method were summarized in an article, serving as a laboratory protocol (Chapter 2.2). Furthermore, we contributed a review article (Chapter 2.3) that summarizes the literature about nucleotide analysis and recent technological advances with a focus on plants and factors influencing and hindering the analysis of nucleotides in plants, i.e., a complex metabolic matrix, highly stable phosphatases and physicochemical properties of nucleotides. To analyze the sub-cellular concentrations of metabolites, a protocol for the rapid isolation of highly pure mitochondria utilizing affinity chromatography was developed (Chapter 2.4). The method for the purification of nucleotides furthermore contributed to the comprehensive analysis of the nucleotide metabolome in germinating seeds and in establishing seedlings of A. thaliana, with a focus on genes involved in the synthesis of thymidilates (Chapter 2.5) and the characterization of a novel enzyme of purine nucleotide degradation, the XANTHOSINE MONOPHOSPHATE PHOSPHATASE (Chapter 2.6). Protein homology analysis comparing A. thaliana, S. cerevisiae, and H. sapiens led to the identification and characterization of an enzyme involved in the metabolite damage repair system of plants, the INOSINE TRIPHOSPHATE PYROPHOSPHATASE (Chapter 2.7). It was shown that this enzyme dephosphorylates deaminated purine nucleotide triphosphates and thus prevents their incorporation into nucleic acids. Lossof-function mutants senesce early and have a constitutively increased content of salicylic acid. Also, the source of deaminated purine nucleotides in plants was investigated and it was shown that abiotic factors contribute to nucleotide damage.Nukleotide sind Metaboliten, die am Primärstoffwechsel und an spezialisierten Stoffwechselvorgängen beteiligt sind und eine regulierende Rolle bei verschiedenen biochemischen Reaktionen in allen Lebensformen spielen. Während bei anderen Organismen das Nukleotidmetabolom umfassend charakterisiert wurde, ist in Pflanzen vergleichsweise wenig über die zellulären Konzentrationen von Nukleotiden bekannt. Ziel dieser Dissertation war es, das Nukleotidmetabolom und die Enzyme zu untersuchen, die die Zusammensetzung und Menge der Nukleotide in Pflanzen beeinflussen. Zu diesem Zweck wurde eine Methode zur Analyse von Nukleotiden und Nukleosiden in Pflanzen und Algen entwickelt (Kapitel 2.1), die ein effizientes Stoppen enzymatischer Aktivität, eine Flüssig-Flüssig-Extraktion und eine Festphasenextraktion unter Verwendung eines schwachen Ionenaustauschers umfasst. Mit dieser Methode konnte das Nukleotidmetabolom von Pflanzen eingehend analysiert werden, einschließlich der Quantifizierung von Desoxyribonukleotiden und Desoxyribonukleosiden mit geringer Abundanz. Die Einzelheiten der Methode wurden in einem Artikel zusammengefasst, der als Laborprotokoll dient (Kapitel 2.2). Darüber hinaus wurde ein Übersichtsartikel (Kapitel 2.3) verfasst, der die Literatur über die Analyse von Nukleotiden und die jüngsten technologischen Fortschritte zusammenfasst. Der Schwerpunkt lag hierbei auf Pflanzen und Faktoren, die die Analyse von Nukleotiden in Pflanzen beeinflussen oder behindern, d. h. eine komplexe Matrix, hochstabile Phosphatasen und physikalisch-chemische Eigenschaften von Nukleotiden. Um die subzellulären Konzentrationen von Metaboliten zu analysieren, wurde ein Protokoll für die schnelle Isolierung hochreiner Mitochondrien unter Verwendung einer Affinitätschromatographie entwickelt (Kapitel 2.4). Die Methode zur Analyse von Nukleotiden trug außerdem zu einer umfassenden Analyse des Nukleotidmetaboloms in keimenden Samen und in sich etablierenden Keimlingen von A. thaliana bei, wobei der Schwerpunkt auf Genen lag, die an der Synthese von Thymidilaten beteiligt sind (Kapitel 2.5), sowie zu der Charakterisierung eines neuen Enzyms des Purinnukleotidabbaus, der XANTHOSINE MONOPHOSPHATE PHOSPHATASE (Kapitel 2.6). Eine Proteinhomologieanalyse, die A. thaliana, S. cerevisiae und H. sapiens miteinander verglich führte zur Identifizierung und Charakterisierung eines Enzyms, das an der Reparatur von geschädigten Metaboliten in Pflanzen beteiligt ist, der INOSINE TRIPHOSPHATE PYROPHOSPHATASE (Kapitel 2.7). Es konnte gezeigt werden, dass dieses Enzym desaminierte Purinnukleotidtriphosphate dephosphoryliert und so deren Einbau in Nukleinsäuren verhindert. Funktionsverlustmutanten altern früh und weisen einen konstitutiv erhöhten Gehalt an Salicylsäure auf. Außerdem wurde die Quelle der desaminierten Purinnukleotide in Pflanzen untersucht, und es wurde gezeigt, dass abiotische Faktoren zur Nukleotidschädigung beitragen

    Effects of municipal smoke-free ordinances on secondhand smoke exposure in the Republic of Korea

    Get PDF
    ObjectiveTo reduce premature deaths due to secondhand smoke (SHS) exposure among non-smokers, the Republic of Korea (ROK) adopted changes to the National Health Promotion Act, which allowed local governments to enact municipal ordinances to strengthen their authority to designate smoke-free areas and levy penalty fines. In this study, we examined national trends in SHS exposure after the introduction of these municipal ordinances at the city level in 2010.MethodsWe used interrupted time series analysis to assess whether the trends of SHS exposure in the workplace and at home, and the primary cigarette smoking rate changed following the policy adjustment in the national legislation in ROK. Population-standardized data for selected variables were retrieved from a nationally representative survey dataset and used to study the policy action’s effectiveness.ResultsFollowing the change in the legislation, SHS exposure in the workplace reversed course from an increasing (18% per year) trend prior to the introduction of these smoke-free ordinances to a decreasing (−10% per year) trend after adoption and enforcement of these laws (β2 = 0.18, p-value = 0.07; β3 = −0.10, p-value = 0.02). SHS exposure at home (β2 = 0.10, p-value = 0.09; β3 = −0.03, p-value = 0.14) and the primary cigarette smoking rate (β2 = 0.03, p-value = 0.10; β3 = 0.008, p-value = 0.15) showed no significant changes in the sampled period. Although analyses stratified by sex showed that the allowance of municipal ordinances resulted in reduced SHS exposure in the workplace for both males and females, they did not affect the primary cigarette smoking rate as much, especially among females.ConclusionStrengthening the role of local governments by giving them the authority to enact and enforce penalties on SHS exposure violation helped ROK to reduce SHS exposure in the workplace. However, smoking behaviors and related activities seemed to shift to less restrictive areas such as on the streets and in apartment hallways, negating some of the effects due to these ordinances. Future studies should investigate how smoke-free policies beyond public places can further reduce the SHS exposure in ROK

    What's in Lisbon? Art Museums, Art Dealers, and Refugees in Portugal between 1933 and 1945

    Get PDF
    This thesis focuses on the transactions of works of art that took place in Portugal during the period of the Third Reich (1933-1945), the institutions and individuals involved in these transactions, and the works of art that were the object of those transactions. Drawing on American, Austrian, British, Dutch, French, German, Portuguese, and Swiss primary sources, the thesis sets out to determine the extent of the influence of the refugee flux into the country and of the international circulation of Nazi-looted art on the Portuguese art market. It does so by identifying and studying the actions of specific groups identified as having the higher chances of benefiting from these circumstances: importers and exporters of non-contemporary works of art; national art museums in Lisbon and Porto, cities with international communications and transport networks, which hosted the highest number of refugees; public museums in seaside and spa resorts, where thousands of refugees resided during the war years; and the foreign art dealers who opened businesses in Lisbon. Conceptually, it begins with a large universe of analysis, narrowing its scope as the chapters progress, culminating in the study of the actions of one single figure, and clarifying the provenance of one single painting, in a case study that brings together various areas of research examined previously. While findings confirm the supposition that the Portuguese State and public institutions did not knowingly engage in the acquisition of Nazi-looted art during this period, they reveal that some of their acquisitions require further provenance research, and that the actions of specific individuals in bringing works of art into the country demand further scrutiny

    Towards A Practical High-Assurance Systems Programming Language

    Full text link
    Writing correct and performant low-level systems code is a notoriously demanding job, even for experienced developers. To make the matter worse, formally reasoning about their correctness properties introduces yet another level of complexity to the task. It requires considerable expertise in both systems programming and formal verification. The development can be extremely costly due to the sheer complexity of the systems and the nuances in them, if not assisted with appropriate tools that provide abstraction and automation. Cogent is designed to alleviate the burden on developers when writing and verifying systems code. It is a high-level functional language with a certifying compiler, which automatically proves the correctness of the compiled code and also provides a purely functional abstraction of the low-level program to the developer. Equational reasoning techniques can then be used to prove functional correctness properties of the program on top of this abstract semantics, which is notably less laborious than directly verifying the C code. To make Cogent a more approachable and effective tool for developing real-world systems, we further strengthen the framework by extending the core language and its ecosystem. Specifically, we enrich the language to allow users to control the memory representation of algebraic data types, while retaining the automatic proof with a data layout refinement calculus. We repurpose existing tools in a novel way and develop an intuitive foreign function interface, which provides users a seamless experience when using Cogent in conjunction with native C. We augment the Cogent ecosystem with a property-based testing framework, which helps developers better understand the impact formal verification has on their programs and enables a progressive approach to producing high-assurance systems. Finally we explore refinement type systems, which we plan to incorporate into Cogent for more expressiveness and better integration of systems programmers with the verification process

    Assembling Single RbCs Molecules with Optical Tweezers

    Get PDF
    Optical tweezer arrays are useful tools for manipulating single atoms and molecules. An exciting avenue for research with optical tweezers is using the interactions between polar molecules for quantum computation or quantum simulation. Molecules can be assembled in an optical tweezer array starting from pairs of atoms. The atoms must be initialised in the relative motional ground state of a common trap. This work outlines the design of a Raman sideband cooling protocol which is implemented to prepare an 87-Rubidium atom in the motional ground state of an 817 nm tweezer, and a 133-Caesium atom in the motional ground state of a 938 nm tweezer. The protocol circumvents strong heating and dephasing associated with the trap by operating at lower trap depths and cooling from outside the Lamb-Dicke regime. By analysing several sources of heating, we design and implement a merging sequence that transfers the Rb atom and the Cs atom to a common trap with minimal motional excitation. Subsequently, we perform a detailed characterisation of AC Stark shifts caused by the tweezer light, and identify several situations in which the confinement of the atom pair influences their interactions. Then, we demonstrate the preparation of a molecular bound state after an adiabatic ramp across a magnetic Feshbach resonance. Measurements of molecular loss rates provide evidence that the atoms are in fact associated during the merging sequence, before the magnetic field ramp. By preparing a weakly-bound molecule in an optical tweezer, we carry out important steps towards assembling an array of ultracold RbCs molecules in their rovibrational ground states

    Estudio de rutas de vacunación en modelo murino para el uso profiláctico o terapéutico de vacunas atenuadas de tuberculosis

    Get PDF
    La tuberculosis es una de las enfermedades infecciosas que produce mayor mortalidad en el mundo. El agente causante es Mycobacterium tuberculosis que convive estrechamente con el hombre desde sus inicios como Homo sapiens. De momento, la única vacuna disponible es BCG (derivada de Mycobacterium bovis) pero esta no es efectiva contra la tuberculosis pulmonar en adultos, que es además la forma responsable de la transmisión de la enfermedad. Actualmente muchos equipos de investigación están trabajando en el desarrollo de nuevas vacunas y tratamientos eficaces, siendo MTBVAC la única vacuna candidata basada en la atenuación del agente patógeno causante de la tuberculosis humana. La eficacia de esta vacuna está siendo actualmente estudiada en ensayos clínicos en Fase III de eficacia. Previo a la fase clínica todos los estudios conllevan una fase de estudios preclínicos in vitro y después en animales de experimentación. El modelo murino es el modelo de elección en animales de experimentación, principalmente por su facilidad de manejo, economía de estabulado y disponibilidad de reactivos específicos de ratón para estudios inmunológicos. En esta tesis relacionamos distintos modelos de experimentación en ratones para lo cual hemos seleccionado 4 estudios de investigación basados en las vacunas vivas atenuadas MTBVAC y BCG. <br /
    • …
    corecore