2,397 research outputs found

    Alien Registration- Adams, Andrew K. (Presque Isle, Aroostook County)

    Get PDF
    https://digitalmaine.com/alien_docs/34324/thumbnail.jp

    COMBINING SOCIAL AUTHENTICATION AND UNTRUSTED CLOUDS FOR PRIVATE LOCATION SHARING

    Get PDF
    With the advent of GPS-enabled smartphones, location-sharing services (LSSs) have emerged that share data collected through those mobile devices. However, research has shown that many users are uncomfortable with LSS operators managing their location histories, and that the ease with which contextual data can be shared with unintended audiences can lead to regrets that sometimes outweigh the benefits of these systems. In an effort to address these issues, we have developed SLS: a secure location sharing system that combines location-limited channels, multi-channel key establishment, and untrusted cloud storage to hide user locations from LSS operators while also limiting unintended audience sharing. In addition to describing the key agreement and location- sharing protocols used by the architecture, we discuss an iOS implementation of SLS that enables location sharing at tunable granularity through an intuitive policy interface on the user’s mobile device

    Reproducible computational biology experiments with SED-ML - The Simulation Experiment Description Markup Language

    Get PDF
    Background: The increasing use of computational simulation experiments to inform modern biological research creates new challenges to annotate, archive, share and reproduce such experiments. The recently published Minimum Information About a Simulation Experiment (MIASE) proposes a minimal set of information that should be provided to allow the reproduction of simulation experiments among users and software tools. Results: In this article, we present the Simulation Experiment Description Markup Language (SED-ML). SED-ML encodes in a computer-readable exchange format the information required by MIASE to enable reproduction of simulation experiments. It has been developed as a community project and it is defined in a detailed technical specification and additionally provides an XML schema. The version of SED-ML described in this publication is Level 1 Version 1. It covers the description of the most frequent type of simulation experiments in the area, namely time course simulations. SED-ML documents specify which models to use in an experiment, modifications to apply on the models before using them, which simulation procedures to run on each model, what analysis results to output, and how the results should be presented. These descriptions are independent of the underlying model implementation. SED-ML is a software-independent format for encoding the description of simulation experiments; it is not specific to particular simulation tools. Here, we demonstrate that with the growing software support for SED-ML we can effectively exchange executable simulation descriptions. Conclusions: With SED-ML, software can exchange simulation experiment descriptions, enabling the validation and reuse of simulation experiments in different tools. Authors of papers reporting simulation experiments can make their simulation protocols available for other scientists to reproduce the results. Because SED-ML is agnostic about exact modeling language(s) used, experiments covering models from different fields of research can be accurately described and combined

    Chronology Protection in Galileon Models and Massive Gravity

    Full text link
    Galileon models are a class of effective field theories that have recently received much attention. They arise in the decoupling limit of theories of massive gravity, and in some cases they have been treated in their own right as scalar field theories with a specific nonlinearly realized global symmetry (Galilean transformation). It is well known that in the presence of a source, these Galileon theories admit superluminal propagating solutions, implying that as quantum field theories they must admit a different notion of causality than standard local Lorentz invariant theories. We show that in these theories it is easy to construct closed timelike curves (CTCs) within the {\it naive} regime of validity of the effective field theory. However, on closer inspection we see that the CTCs could never arise since the Galileon inevitably becomes infinitely strongly coupled at the onset of the formation of a CTC. This implies an infinite amount of backreaction, first on the background for the Galileon field, signaling the break down of the effective field theory, and subsequently on the spacetime geometry, forbidding the formation of the CTC. Furthermore the background solution required to create CTCs becomes unstable with an arbitrarily fast decay time. Thus Galileon theories satisfy a direct analogue of Hawking's chronology protection conjecture.Comment: 34 pages, no figure
    • …
    corecore