13,647 research outputs found
Recommended from our members
Overstepping Digital Boundaries: An Exploration of Ownership in 3-D Virtual Worlds
Ownership in virtual worlds is somewhat of an enigma. (If it is not clear that you exist, how can you have property? If it is not clear that things exist how can you own them?) Still, the interconnectedness between real and virtual worlds creates real legal and ethical quandaries about virtual ownership, similar to the issues that have been addressed regarding intellectual property in the real world. While the relationship between virtual world activities and real-world laws has yet to be clearly defined, we identify three categories of intellectual property violations that can take place in virtual worlds : in-world cloning, between-world cloning and trademark violations. In an attempt to discover the extent to which these occur, this paper represents an indepth exploration of the apparent prevalence of intellectual property violation in Second Life
Object Cloning for Ownership Systems
Modern object-oriented programming languages frequently need the ability to clone, duplicate, and copy objects. The usual approaches taken by languages are rudimentary, primarily because these approaches operate with little understanding of the object being cloned. Deep cloning naively copies every object that has a reachable reference path from the object being cloned, even if the objects being copied have no innate relationship with that object. For more sophisticated cloning operations, languages usually only provide the capacity for programmers to define their own cloning operations for specific objects, and with no help from the type system.
Sheep cloning is an automated operation that clones objects by leveraging information about those objects’ structures, which the programmer imparts into their programs with ownership types. Ownership types are a language mechanism that defines an owner for every object in the program. Ownership types create a hierarchical structure for the heap.
In this thesis, we construct an extensible formal model for an object-oriented language with ownership types (Core), and use it to explore different formalisms of sheep cloning. We formalise three distinct operational semantics of sheep cloning, and for each approach we include proofs or proof outlines where appropriate, and provide a comparative analysis of each model’s benefits. Our main contribution is the descripSC formal model of sheep cloning and its proof of type soundness.
The second contribution of this thesis is the formalism of Mojo-jojo, a multiple ownership system that includes existential quantification over types and context parameters, along with a constraint system for context parameters. We prove type soundness for Mojo-jojo. Multiple ownership is a mechanism which allows objects to have more than one owner. Context parameters in Mojo-jojo can use binary operators such as: intersection, union, and disjointness
Efficient and Low-Cost RFID Authentication Schemes
Security in passive resource-constrained Radio Frequency Identification
(RFID) tags is of much interest nowadays. Resistance against illegal tracking,
cloning, timing, and replay attacks are necessary for a secure RFID
authentication scheme. Reader authentication is also necessary to thwart any
illegal attempt to read the tags. With an objective to design a secure and
low-cost RFID authentication protocol, Gene Tsudik proposed a timestamp-based
protocol using symmetric keys, named YA-TRAP*. Although YA-TRAP* achieves its
target security properties, it is susceptible to timing attacks, where the
timestamp to be sent by the reader to the tag can be freely selected by an
adversary. Moreover, in YA-TRAP*, reader authentication is not provided, and a
tag can become inoperative after exceeding its pre-stored threshold timestamp
value. In this paper, we propose two mutual RFID authentication protocols that
aim to improve YA-TRAP* by preventing timing attack, and by providing reader
authentication. Also, a tag is allowed to refresh its pre-stored threshold
value in our protocols, so that it does not become inoperative after exceeding
the threshold. Our protocols also achieve other security properties like
forward security, resistance against cloning, replay, and tracking attacks.
Moreover, the computation and communication costs are kept as low as possible
for the tags. It is important to keep the communication cost as low as possible
when many tags are authenticated in batch-mode. By introducing aggregate
function for the reader-to-server communication, the communication cost is
reduced. We also discuss different possible applications of our protocols. Our
protocols thus capture more security properties and more efficiency than
YA-TRAP*. Finally, we show that our protocols can be implemented using the
current standard low-cost RFID infrastructures.Comment: 21 pages, Journal of Wireless Mobile Networks, Ubiquitous Computing,
and Dependable Applications (JoWUA), Vol 2, No 3, pp. 4-25, 201
Human Gene Patents and the Question of Liberal Morality
Since the establishment of the Human Genome Project and the identification of genes in human DNA that play a role in human diseases and disorders, a long, moral and political, battle has began over the extension of IPRs to information contained in human genetic material. According to the Nuffield Council on Bioethics, over the past 20 years, large numbers of human genes have been the subject of thousands of patent applications. This paper examines whether human gene patents can be justified in terms of liberal theories of morality such as natural law, personality development, just reward and social utility. It is argued that human gene patents are in conflict with fundamental principles of liberal morality and justice because they result in “genetic information feudalism”
Bioethics, Complementarity, and Corporate Criminal Liability
This article provides a brief introduction to some contemporary challenges found in the intersection of bioethics and international criminal law involving genetic privacy, organ trafficking, genetic engineering, and cloning. These challenges push us to re-evaluate the question of whether the international criminal law should hold corporations criminally liable. I argue that a minimalist and Strawsonian conception of corporate responsibility could be useful for deterring the wrongs outlined in first few sections and in answering compelling objections to corporate criminal liability
Cloning and expression of pullulanase gene from locally isolated bacillus SP
Bacterial pullulanase represents one of th e starch-degrading enzymes that are widely used in the starch processing indu stry along with amylases. Amylases hydrolyze a -(1,4 )-glycosidic linkage in starch to produce a mixture of glucose , maltooligo sacchari de and limited a-dextrin. All the remaining a -(1,6)-glycosid ic branches in the products are hydrolyzed by p ullulanase. This is an advantage t o improve glucose production by coupling pullulanase and amylase in the p rocess. As such, many pullulana e enzyme has been isolated and one has been showing optimum pH of 10-10.5 which is suitable for use in dishwasher detergent additive in removal of star ch stain. We have recently iso lated a few bacterias that have shown potentially pullulanase producers by the holo-zone in pullulan-plate assay. One of them, we named Bacillus –1 sho ws a bigger holo-zone among others, Bacillus- 1 is highly active in pH more than 7. The enzyme also shows a mo derate activity to wards starch that may be indicates be side hydrolyzes a -(1,6)-glycosidic linkage in starch, it also hydrolyzes a -(1,4)- glycosidi c simi lar to a -amylase. Unfortunately the enzyme from wild-type bacteria is in lower yield an d in this studies, we intend to clone and sequence the pullulanase gene and also expressed the gene in a high expression system to be able to produce in a high yield before characterizing expressed protein
Defining a New Ethical Standard for Human in Vitro Embryos in the Context of Stem Cell Research
This iBrief discusses some of the social, ethical and legal considerations surrounding the use of unimplanted, in vitro embryos in stem cell research. It proposes that a new ethical standard be elucidated for these embryos. The iBrief gives an overview of two proposals for such a standard at opposite ends of the spectrum: treating the in vitro embryo as a legal person versus treating it as mere property. It argues against both approaches. The former can have undesirable social implications including undue interference with female reproductive autonomy, while the latter would objectify potential human life and reproductive potential. The iBrief proposes an intermediate approach that treats the embryo as a special entity. It warns against a model whereby the respect accorded to embryos is made dependent on the attainment of various qualitative or developmental criteria. The complexities surrounding human life, it argues, are too uncertain. What is certain is the embryo\u27s unique potential for human life, at any developmental stage. This, the iBrief proposes, should be the sole criterion for an embryo\u27s special status, a status that should be confined within constitutional limits
Aspect-Controlled Neural Argument Generation
We rely on arguments in our daily lives to deliver our opinions and base them
on evidence, making them more convincing in turn. However, finding and
formulating arguments can be challenging. In this work, we train a language
model for argument generation that can be controlled on a fine-grained level to
generate sentence-level arguments for a given topic, stance, and aspect. We
define argument aspect detection as a necessary method to allow this
fine-granular control and crowdsource a dataset with 5,032 arguments annotated
with aspects. Our evaluation shows that our generation model is able to
generate high-quality, aspect-specific arguments. Moreover, these arguments can
be used to improve the performance of stance detection models via data
augmentation and to generate counter-arguments. We publish all datasets and
code to fine-tune the language model
- …