36,147 research outputs found
Quiescence: a mechanism for escaping the effects of drug on cell populations
We point out that a simple and generic strategy to lower the risk for
extinction consists in the developing a dormant stage in which the organism is
unable to multiply but may die. The dormant organism is protected against the
poisonous environment. The result is to increase the survival probability of
the entire population by introducing a type of zero reproductive fitness. This
is possible, because the reservoir of dormant individuals act as a buffer that
can cushion fatal fluctuations in the number of births and deaths which without
the dormant population would have driven the entire population to extinction.Comment: 18 pages and 9 figure
Quarantine region scheme to mitigate spam attacks in wireless sensor networks
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with a cost of cryptographic operations to be performed over all messages. QRS is designed to reduce this cost by applying authentication only whenever and wherever necessary. In QRS, the nodes that detect a nearby spam attack assume themselves to be in a quarantine region. This detection is performed by intermittent authentication checks. Once quarantined, a node continuously applies authentication measures until the spam attack ceases. In the QRS scheme, there is a tradeoff between the resilience against spam attacks and the number of authentications. Our experiments show that, in the worst-case scenario that we considered, a not quarantined node catches 80 percent of the spam messages by authenticating only 50 percent of all messages that it processe
Chip and Skim: cloning EMV cards with the pre-play attack
EMV, also known as "Chip and PIN", is the leading system for card payments
worldwide. It is used throughout Europe and much of Asia, and is starting to be
introduced in North America too. Payment cards contain a chip so they can
execute an authentication protocol. This protocol requires point-of-sale (POS)
terminals or ATMs to generate a nonce, called the unpredictable number, for
each transaction to ensure it is fresh. We have discovered that some EMV
implementers have merely used counters, timestamps or home-grown algorithms to
supply this number. This exposes them to a "pre-play" attack which is
indistinguishable from card cloning from the standpoint of the logs available
to the card-issuing bank, and can be carried out even if it is impossible to
clone a card physically (in the sense of extracting the key material and
loading it into another card). Card cloning is the very type of fraud that EMV
was supposed to prevent. We describe how we detected the vulnerability, a
survey methodology we developed to chart the scope of the weakness, evidence
from ATM and terminal experiments in the field, and our implementation of
proof-of-concept attacks. We found flaws in widely-used ATMs from the largest
manufacturers. We can now explain at least some of the increasing number of
frauds in which victims are refused refunds by banks which claim that EMV cards
cannot be cloned and that a customer involved in a dispute must therefore be
mistaken or complicit. Pre-play attacks may also be carried out by malware in
an ATM or POS terminal, or by a man-in-the-middle between the terminal and the
acquirer. We explore the design and implementation mistakes that enabled the
flaw to evade detection until now: shortcomings of the EMV specification, of
the EMV kernel certification process, of implementation testing, formal
analysis, or monitoring customer complaints. Finally we discuss
countermeasures
Quantifying metastatic inefficiency:rare genotypes versus rare dynamics
abstract: We introduce and solve a ‘null model’ of stochastic metastatic colonization. The model is described by a single parameter θ: the ratio of the rate of cell division to the rate of cell death for a disseminated tumour cell in a given secondary tissue environment. We are primarily interested in the case in which colonizing cells are poorly adapted for proliferation in the local tissue environment, so that cell death is more likely than cell division, i.e. θ 1), i.e. the statistics show a duality mapping (1 − θ) → (θ − 1). We conclude our analysis with a study of heterogeneity in the fitness of colonising cells, and describe a phase diagram delineating parameter regions in which metastatic colonization is dominated either by low or high fitness cells, showing that both are plausible given our current knowledge of physiological conditions in human cancer
Surveys of facilities for the potential effects from the fallout of airborne graphite fibers
The impact of the entry of graphite fibers into workplaces in the United States is discussed. Areas where an electrical failure could cause major problems include process and production systems, hospitals, and police/fire emergency communication systems
Facing up to Facebook: politicians, publics and the social media(ted) turn in New Zealand
Social media have an increasingly important place in the lives of citizens, and their potential to expand the reach of communication messages beyond individual networks is attractive to those looking to maximise message efficiency. The influence of Facebook in Obama’s 2008 campaign success galvanised many politicians into taking it seriously as a campaign tool. Our study explored the Facebook wall posts (1148 in total) of New Zealand Members of Parliament (MPs) leading up to the 2011 general election to determine posting behaviours and differences. Among other things, we found that women posted more frequently than men and that Labour MPs posted more than their National counterparts. Additionally, most politicians do not invite dialogue with readers of their posts, rarely get involved in comment threads and mostly take a monologic approach, using Facebook as a way of broadcasting information rather than as a medium enabling two-way flow. In other words, same old, same old
Racial Harassment, Ethnic Concentration and Economic Conditions
We analyze the association between concentration of minorities and local economic conditions on the one side, and racial harassment and hostile majority attitudes on the other. We distinguish the formation of hostile attitudes and the realization of acts of racially motivated violence as distinct processes and find strong evidence for this. We develop a framework that subsumes and structures many existing theories on attitude formation and acts of harassment. Our measures of harassment include both direct reports and precautionary behaviour. Our data sources are the fourth National Survey of Ethnic Minorities for the UK and the 1981 and 1991 UK Census.Attitudes, Economics of Minorities
Collab-SAR:A Collaborative Avalanche Search-and-Rescue Missions Exploiting Hostile Alpine Networks
Every year, Alpine experiences a considerable number of avalanches causing danger to visitor and saviors, where most of the existing techniques to mitigate the number of fatalities in such hostile environments are based on a non-collaborative approach and is time- and effort-inefficient. A recently completed European project on Smart collaboration between Humans and ground-aErial Robots for imProving rescuing activities in Alpine environments (SHERPA) has proposed a novel collaborative approach to improve the rescuing activities. To be an integral part of the SHERPA framework, this paper considers deployment of an air-ground collaborative wireless network (AGCWN) to support search and rescue (SAR) missions in hostile alpine environments. We propose a network infrastructure for such challenging environments by considering the available network components, hostility of the environments, scenarios, and requirements. The proposed infrastructure also considers two degrees of quality of service, in terms of high throughput and long coverage range, to enable timely delivery of videos and images of the long patrolled area, which is the key in any searching and rescuing mission. We also incorporate a probabilistic search technique, which is suitable for collaborative search assuming AGCWN infrastructure for sharing information. The effectiveness of the proposed infrastructure and collaborative search technique, referred to as Collab-SAR, is demonstrated via a series of computer simulations. The results confirm the effectiveness of the proposal
- …