44,068 research outputs found
Ensuring sample quality for biomarker discovery studies - Use of ict tools to trace biosample life-cycle
The growing demand of personalized medicine marked the transition from an empirical medicine to a molecular one, aimed at predicting safer and more effective medical treatment for every patient, while minimizing adverse effects. This passage has emphasized the importance of biomarker discovery studies, and has led sample availability to assume a crucial role in biomedical research. Accordingly, a great interest in Biological Bank science has grown concomitantly. In biobanks, biological material and its accompanying data are collected, handled and stored in accordance with standard operating procedures (SOPs) and existing legislation. Sample quality is ensured by adherence to SOPs and sample whole life-cycle can be recorded by innovative tracking systems employing information technology (IT) tools for monitoring storage conditions and characterization of vast amount of data. All the above will ensure proper sample exchangeability among research facilities and will represent the starting point of all future personalized medicine-based clinical trials
Identifying Native Applications with High Assurance
The work described in this paper investigates the problem
of identifying and deterring stealthy malicious processes on
a host. We point out the lack of strong application iden-
tication in main stream operating systems. We solve the
application identication problem by proposing a novel iden-
tication model in which user-level applications are required
to present identication proofs at run time to be authenti-
cated by the kernel using an embedded secret key. The se-
cret key of an application is registered with a trusted kernel
using a key registrar and is used to uniquely authenticate
and authorize the application. We present a protocol for
secure authentication of applications. Additionally, we de-
velop a system call monitoring architecture that uses our
model to verify the identity of applications when making
critical system calls. Our system call monitoring can be
integrated with existing policy specication frameworks to
enforce application-level access rights. We implement and
evaluate a prototype of our monitoring architecture in Linux
as device drivers with nearly no modication of the ker-
nel. The results from our extensive performance evaluation
shows that our prototype incurs low overhead, indicating the
feasibility of our model
Traceability -- A Literature Review
In light of recent food safety crises and international trade concerns associated with food or animal associated diseases, traceability has once again become important in the minds of public policymakers, business decision makers, consumers and special interest groups. This study reviews studies on traceability, government regulation and consumer behaviour, provide case studies of current traceability systems and a rough breakdown of various costs and benefits of traceability. This report aims to identify gaps that may currently exist in the literature on traceability in the domestic beef supply chain, as well as provide possible directions for future research into said issue. Three main conclusions can be drawn from this study. First, there is a lack of a common definition of traceability. Hence identifying similarities and differences across studies becomes difficult if not impossible. To this end, this study adopts CFIA’s definition of traceability. This definition has been adopted by numerous other agencies including the EU’s official definition of traceability however it may or may not be acceptable from the perspective of major Canadian beef and cattle trade partners. Second, the studies reviewed in this report address one or more of five key objectives; the impact of changing consumer behaviour on market participants, suppliers incentive to adopt or participate in traceability, impact of regulatory changes, supplier response to crisis and technical description of traceability systems. Drawing from the insights from the consumer studies, it seems as if consumers do not value traceability per se, traceability is a means for consumers to receive validation of another production or process attribute that they are interested in. Moreover, supply chain improvement, food safety control and accessing foreign market segments are strong incentives for primary producers and processors to participate in programs with traceability features. However the objectives addressed by the studies reviewed in this paper are not necessarily the objectives that are of most immediate relevance to decision makers about appropriate traceability standards to recommend, require, subsidize etc. In many cases the research objectives of previous work have been extremely narrow creating a body of literature that is incomplete in certain key areas. Third, case studies of existing traceability systems in Australia, the UK, Scotland, Brazil and Uruguay indicate that the pattern of development varies widely across sectors and regions. In summary, a traceability system by itself cannot provide value-added for all participants in the industry; it is merely a protocol for documenting and sharing information. Value is added to participants in the marketing chain through traceability in the form of reduced transactions costs in the case of a food safety incident and through the ability to shift liability. To ensure consumer benefit and have premiums returned to primary producers the type of information that consumers value is an important issue for future research. A successful program that peaks consumer interest and can enhance their eating experience can generate economic benefits to all sectors in the beef industry. International market access will increasingly require traceability in the marketing system in order to satisfy trade restrictions in the case of animal diseases and country of origin labelling, to name only a few examples. Designing appropriate traceability protocols industry wide is therefore becoming very important.traceability, institutions, Canada, consumer behaviour, producer behaviour, supply chain, Agricultural and Food Policy, Consumer/Household Economics, Food Consumption/Nutrition/Food Safety, Health Economics and Policy, International Relations/Trade, Livestock Production/Industries, Marketing, Production Economics, D020, D100, D200, Q100,
Achieving the Holevo bound via a bisection decoding protocol
We present a new decoding protocol to realize transmission of classical
information through a quantum channel at asymptotically maximum capacity,
achieving the Holevo bound and thus the optimal communication rate. At variance
with previous proposals, our scheme recovers the message bit by bit, making use
of a series "yes-no" measurements, organized in bisection fashion, thus
determining which codeword was sent in log(N) steps, N being the number of
codewords.Comment: Updated version: added statement of the main theorem; 35 pages and 2
figure
IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications
Android apps cooperate through message passing via intents. However, when
apps do not have identical sets of privileges inter-app communication (IAC) can
accidentally or maliciously be misused, e.g., to leak sensitive information
contrary to users expectations. Recent research considered static program
analysis to detect dangerous data leaks due to inter-component communication
(ICC) or IAC, but suffers from shortcomings with respect to precision,
soundness, and scalability. To solve these issues we propose a novel approach
for static ICC/IAC analysis. We perform a fixed-point iteration of ICC/IAC
summary information to precisely resolve intent communication with more than
two apps involved. We integrate these results with information flows generated
by a baseline (i.e. not considering intents) information flow analysis, and
resolve if sensitive data is flowing (transitively) through components/apps in
order to be ultimately leaked. Our main contribution is the first fully
automatic sound and precise ICC/IAC information flow analysis that is scalable
for realistic apps due to modularity, avoiding combinatorial explosion: Our
approach determines communicating apps using short summaries rather than
inlining intent calls, which often requires simultaneously analyzing all tuples
of apps. We evaluated our tool IIFA in terms of scalability, precision, and
recall. Using benchmarks we establish that precision and recall of our
algorithm are considerably better than prominent state-of-the-art analyses for
IAC. But foremost, applied to the 90 most popular applications from the Google
Playstore, IIFA demonstrated its scalability to a large corpus of real-world
apps. IIFA reports 62 problematic ICC-/IAC-related information flows via two or
more apps/components
Software Engineers' Information Seeking Behavior in Change Impact Analysis - An Interview Study
Software engineers working in large projects must navigate complex
information landscapes. Change Impact Analysis (CIA) is a task that relies on
engineers' successful information seeking in databases storing, e.g., source
code, requirements, design descriptions, and test case specifications. Several
previous approaches to support information seeking are task-specific, thus
understanding engineers' seeking behavior in specific tasks is fundamental. We
present an industrial case study on how engineers seek information in CIA, with
a particular focus on traceability and development artifacts that are not
source code. We show that engineers have different information seeking
behavior, and that some do not consider traceability particularly useful when
conducting CIA. Furthermore, we observe a tendency for engineers to prefer less
rigid types of support rather than formal approaches, i.e., engineers value
support that allows flexibility in how to practically conduct CIA. Finally, due
to diverse information seeking behavior, we argue that future CIA support
should embrace individual preferences to identify change impact by empowering
several seeking alternatives, including searching, browsing, and tracing.Comment: Accepted for publication in the proceedings of the 25th International
Conference on Program Comprehensio
Crosscutting, what is and what is not? A Formal definition based on a Crosscutting Pattern
Crosscutting is usually described in terms of scattering and tangling. However, the distinction between these concepts is vague, which could lead to ambiguous statements. Sometimes, precise definitions are required, e.g. for the formal identification of crosscutting concerns. We propose a conceptual framework for formalizing these concepts based on a crosscutting pattern that shows the mapping between elements at two levels, e.g. concerns and representations of concerns. The definitions of the concepts are formalized in terms of linear algebra, and visualized with matrices and matrix operations. In this way, crosscutting can be clearly distinguished from scattering and tangling. Using linear algebra, we demonstrate that our definition generalizes other definitions of crosscutting as described by Masuhara & Kiczales [21] and Tonella and Ceccato [28]. The framework can be applied across several refinement levels assuring traceability of crosscutting concerns. Usability of the framework is illustrated by means of applying it to several areas such as change impact analysis, identification of crosscutting at early phases of software development and in the area of model driven software development
- …