13,647 research outputs found

    Object Cloning for Ownership Systems

    No full text
    Modern object-oriented programming languages frequently need the ability to clone, duplicate, and copy objects. The usual approaches taken by languages are rudimentary, primarily because these approaches operate with little understanding of the object being cloned. Deep cloning naively copies every object that has a reachable reference path from the object being cloned, even if the objects being copied have no innate relationship with that object. For more sophisticated cloning operations, languages usually only provide the capacity for programmers to define their own cloning operations for specific objects, and with no help from the type system. Sheep cloning is an automated operation that clones objects by leveraging information about those objects’ structures, which the programmer imparts into their programs with ownership types. Ownership types are a language mechanism that defines an owner for every object in the program. Ownership types create a hierarchical structure for the heap. In this thesis, we construct an extensible formal model for an object-oriented language with ownership types (Core), and use it to explore different formalisms of sheep cloning. We formalise three distinct operational semantics of sheep cloning, and for each approach we include proofs or proof outlines where appropriate, and provide a comparative analysis of each model’s benefits. Our main contribution is the descripSC formal model of sheep cloning and its proof of type soundness. The second contribution of this thesis is the formalism of Mojo-jojo, a multiple ownership system that includes existential quantification over types and context parameters, along with a constraint system for context parameters. We prove type soundness for Mojo-jojo. Multiple ownership is a mechanism which allows objects to have more than one owner. Context parameters in Mojo-jojo can use binary operators such as: intersection, union, and disjointness

    Cloning Humans: Dangerous, Unjustifiable, and GenuinelyImmoral

    Get PDF

    Efficient and Low-Cost RFID Authentication Schemes

    Get PDF
    Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much interest nowadays. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme. Reader authentication is also necessary to thwart any illegal attempt to read the tags. With an objective to design a secure and low-cost RFID authentication protocol, Gene Tsudik proposed a timestamp-based protocol using symmetric keys, named YA-TRAP*. Although YA-TRAP* achieves its target security properties, it is susceptible to timing attacks, where the timestamp to be sent by the reader to the tag can be freely selected by an adversary. Moreover, in YA-TRAP*, reader authentication is not provided, and a tag can become inoperative after exceeding its pre-stored threshold timestamp value. In this paper, we propose two mutual RFID authentication protocols that aim to improve YA-TRAP* by preventing timing attack, and by providing reader authentication. Also, a tag is allowed to refresh its pre-stored threshold value in our protocols, so that it does not become inoperative after exceeding the threshold. Our protocols also achieve other security properties like forward security, resistance against cloning, replay, and tracking attacks. Moreover, the computation and communication costs are kept as low as possible for the tags. It is important to keep the communication cost as low as possible when many tags are authenticated in batch-mode. By introducing aggregate function for the reader-to-server communication, the communication cost is reduced. We also discuss different possible applications of our protocols. Our protocols thus capture more security properties and more efficiency than YA-TRAP*. Finally, we show that our protocols can be implemented using the current standard low-cost RFID infrastructures.Comment: 21 pages, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol 2, No 3, pp. 4-25, 201

    Human Gene Patents and the Question of Liberal Morality

    Get PDF
    Since the establishment of the Human Genome Project and the identification of genes in human DNA that play a role in human diseases and disorders, a long, moral and political, battle has began over the extension of IPRs to information contained in human genetic material. According to the Nuffield Council on Bioethics, over the past 20 years, large numbers of human genes have been the subject of thousands of patent applications. This paper examines whether human gene patents can be justified in terms of liberal theories of morality such as natural law, personality development, just reward and social utility. It is argued that human gene patents are in conflict with fundamental principles of liberal morality and justice because they result in “genetic information feudalism”

    Bioethics, Complementarity, and Corporate Criminal Liability

    Get PDF
    This article provides a brief introduction to some contemporary challenges found in the intersection of bioethics and international criminal law involving genetic privacy, organ trafficking, genetic engineering, and cloning. These challenges push us to re-evaluate the question of whether the international criminal law should hold corporations criminally liable. I argue that a minimalist and Strawsonian conception of corporate responsibility could be useful for deterring the wrongs outlined in first few sections and in answering compelling objections to corporate criminal liability

    Cloning and expression of pullulanase gene from locally isolated bacillus SP

    Get PDF
    Bacterial pullulanase represents one of th e starch-degrading enzymes that are widely used in the starch processing indu stry along with amylases. Amylases hydrolyze a -(1,4 )-glycosidic linkage in starch to produce a mixture of glucose , maltooligo sacchari de and limited a-dextrin. All the remaining a -(1,6)-glycosid ic branches in the products are hydrolyzed by p ullulanase. This is an advantage t o improve glucose production by coupling pullulanase and amylase in the p rocess. As such, many pullulana e enzyme has been isolated and one has been showing optimum pH of 10-10.5 which is suitable for use in dishwasher detergent additive in removal of star ch stain. We have recently iso lated a few bacterias that have shown potentially pullulanase producers by the holo-zone in pullulan-plate assay. One of them, we named Bacillus –1 sho ws a bigger holo-zone among others, Bacillus- 1 is highly active in pH more than 7. The enzyme also shows a mo derate activity to wards starch that may be indicates be side hydrolyzes a -(1,6)-glycosidic linkage in starch, it also hydrolyzes a -(1,4)- glycosidi c simi lar to a -amylase. Unfortunately the enzyme from wild-type bacteria is in lower yield an d in this studies, we intend to clone and sequence the pullulanase gene and also expressed the gene in a high expression system to be able to produce in a high yield before characterizing expressed protein

    Defining a New Ethical Standard for Human in Vitro Embryos in the Context of Stem Cell Research

    Get PDF
    This iBrief discusses some of the social, ethical and legal considerations surrounding the use of unimplanted, in vitro embryos in stem cell research. It proposes that a new ethical standard be elucidated for these embryos. The iBrief gives an overview of two proposals for such a standard at opposite ends of the spectrum: treating the in vitro embryo as a legal person versus treating it as mere property. It argues against both approaches. The former can have undesirable social implications including undue interference with female reproductive autonomy, while the latter would objectify potential human life and reproductive potential. The iBrief proposes an intermediate approach that treats the embryo as a special entity. It warns against a model whereby the respect accorded to embryos is made dependent on the attainment of various qualitative or developmental criteria. The complexities surrounding human life, it argues, are too uncertain. What is certain is the embryo\u27s unique potential for human life, at any developmental stage. This, the iBrief proposes, should be the sole criterion for an embryo\u27s special status, a status that should be confined within constitutional limits

    Aspect-Controlled Neural Argument Generation

    Full text link
    We rely on arguments in our daily lives to deliver our opinions and base them on evidence, making them more convincing in turn. However, finding and formulating arguments can be challenging. In this work, we train a language model for argument generation that can be controlled on a fine-grained level to generate sentence-level arguments for a given topic, stance, and aspect. We define argument aspect detection as a necessary method to allow this fine-granular control and crowdsource a dataset with 5,032 arguments annotated with aspects. Our evaluation shows that our generation model is able to generate high-quality, aspect-specific arguments. Moreover, these arguments can be used to improve the performance of stance detection models via data augmentation and to generate counter-arguments. We publish all datasets and code to fine-tune the language model

    Stem Cells and the Culture Wars

    Get PDF
    corecore