1,866 research outputs found

    Relating two standard notions of secrecy

    Get PDF
    Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s should never be disclosed while equivalence-based secrecy states that two executions of a protocol with distinct instances for s should be indistinguishable to an attacker. Although the second formulation ensures a higher level of security and is closer to cryptographic notions of secrecy, decidability results and automatic tools have mainly focused on the first definition so far. This paper initiates a systematic investigation of the situations where syntactic secrecy entails strong secrecy. We show that in the passive case, reachability-based secrecy actually implies equivalence-based secrecy for digital signatures, symmetric and asymmetric encryption provided that the primitives are probabilistic. For active adversaries, we provide sufficient (and rather tight) conditions on the protocol for this implication to hold.Comment: 29 pages, published in LMC

    Memory usage verification using Hip/Sleek.

    Get PDF
    Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at compile-time, to prevent memory-related software failure after deployment. Previous proposals on memory usage verification are not satisfactory as they usually can only handle restricted subsets of programs, especially when shared mutable data structures are involved. In this paper, we propose a simple but novel solution. We instrument programs with explicit memory operations so that memory usage verification can be done along with the verification of other properties, using an automated verification system Hip/Sleek developed recently by Chin et al.[10,19]. The instrumentation can be done automatically and is proven sound with respect to an underlying semantics. One immediate benefit is that we do not need to develop from scratch a specific system for memory usage verification. Another benefit is that we can verify more programs, especially those involving shared mutable data structures, which previous systems failed to handle, as evidenced by our experimental results

    Anticancer activity of "Trigno M", extract of Prunus spinosa drupes, against in vitro 3D and in vivo colon cancer models

    Get PDF
    Abstract In 2018 there were over 1.8 million new cases worldwide of colorectal cancer and relapses after clinical treatments. Many studies ascribe the risk of the appearance of this cancer to the Western life style : a sedentary life, obesity, and low -fiber, high -fat diets can promote the onset of disease. Several studies have shown supplement phytochemicals to have an inhibiting effect on the growth of various cancers through the activation of apoptosis. Our goal was to prove the effectiveness of a natural compound in the combined therapy of colorectal cancer. Trigno M supplement was an optimal candidate as anticancer product for its high concentrations of phenolic acids, flavonoids and anthocyanins. Our work showed the antitumor activity of Trigno M, extract of Prunus spinosa drupes combined with the nutraceutical activator complex (NAC), in 2D, 3D and in vivo colorectal cancer models. The cellular model we used both in vitro and in vivo was the HCT116 cell line, particularly suitable for engraftment after inoculation in mice. Trigno M inhibited the growth and colony formation of HCT116 cells (35%) as compared to the chemotherapy treatment with 5-fluorouracil (80%) used in clinical therapy. The reduction of the morphological dimensions in the spheroid cells after Trigno M, was compared with 5-fluorouracil demonstrating the efficacy of the Trigno M compound also in 3D models. Flow cytometric analysis on 3D cells showed a significant increase in the apoptotic cell fraction after Trigno M treatment (44.8%) and a low level of necrotic fraction (6.7%) as compared with control cells. Trigno M and 5-fluorouracil induced the apoptosis in a comparable percentage. Monotherapy with Trigno M in severely immunodeficient mice, carrying colon rectal cancer xenografts, significantly reduced tumor growth. The histopatological analysis of the ectopic tumors showed a lower level of necrosis after Trigno M treatment compared with the control. We conclude that Trigno M is well tolerated by mice, delays colorectal cancer growth in these animals and should be weighed up for integration of the current multi-drug protocols in the treatment of colon carcinoma

    Patho- physiological role of BDNF in fibrin clotting

    Get PDF
    Circulating levels of Brain Derived Neurotrophic Factor (BDNF) are lower in coronary heart disease (CHD) than in healthy subjects and are associated with coronary events and mortality. However, the mechanism(s) underling this association is not fully understood. We hypothesize that BDNF may influence fibrin fiber structure and clot stability, favoring clot lysis and thrombus resolution. We showed that recombinant BDNF (rh-BDNF) influenced with clot formation in a concentration-dependent manner in both purified fibrinogen and plasma from healthy subjects. In particular, rh-BDNF reduced the density of fibrin fibers, the maximum clot firmness (MCF) and the maximum clot turbidity, and affected the lysis of clot. In addition, both thrombin and reptilase clotting time were prolonged by rh-BDNF, despite the amount of thrombin formed was greater. Intriguingly, CHD patients had lower levels of BDNF, greater fibrin fibers density, higher MCF than control subjects, and a negative correlation between BDNF and MCF was found. Of note, rh-BDNF markedly modified fibrin clot profile restoring physiological clot morphology in CHD plasma. In conclusion, we provide evidence that low levels of BDNF correlate with the formation of bigger thrombi (in vitro) and that this effect is mediated, at least partially, by the alteration of fibrin fibers formation

    Globally Governed Session Semantics

    Get PDF
    This paper proposes a bisimulation theory based on multiparty session types where a choreography specification governs the behaviour of session typed processes and their observer. The bisimulation is defined with the observer cooperating with the observed process in order to form complete global session scenarios and usable for proving correctness of optimisations for globally coordinating threads and processes. The induced bisimulation is strictly more fine-grained than the standard session bisimulation. The difference between the governed and standard bisimulations only appears when more than two interleaved multiparty sessions exist. This distinct feature enables to reason real scenarios in the large-scale distributed system where multiple choreographic sessions need to be interleaved. The compositionality of the governed bisimilarity is proved through the soundness and completeness with respect to the governed reduction-based congruence. Finally, its usage is demonstrated by a thread transformation governed under multiple sessions in a real usecase in the large-scale cyberinfrustracture

    Curricular orientations to real-world contexts in mathematics

    Get PDF
    A common claim about mathematics education is that it should equip students to use mathematics in the ‘real world’. In this paper, we examine how relationships between mathematics education and the real world are materialised in the curriculum across a sample of eleven jurisdictions. In particular, we address the orientation of the curriculum towards application of mathematics, the ways that real-world contexts are positioned within the curriculum content, the ways in which different groups of students are expected to engage with real-world contexts, and the extent to which high-stakes assessments include real-world problem solving. The analysis reveals variation across jurisdictions and some lack of coherence between official orientations towards use of mathematics in the real world and the ways that this is materialised in the organisation of the content for students

    Metastatic appendiceal adenocarcinoma presenting late as epididymo-orchitis: a case report and review of literature

    Get PDF
    BACKGROUND: Whereas testicular metastases are in themselves a rare entity, testicular secondaries from an appendiceal carcinoma have not yet been described. The case also illustrates the diagnostic dilemma of a tumour presenting as epididymo-orchitis. CASE PRESENTATION: The authors present a case of an appendiceal carcinoma that, two years after radical therapy, manifested as a secondary in the testis. It was misdiagnosed as an epididymo-orchitis and was only revealed through histology. CONCLUSIONS: Practitioners need to remember that long-standing testicular inflammation may result form secondary tumours. Even "exotic" primary tumours in the medical history of the patient must give rise to an increased suspicion threshold

    Offloading electromagnetic shower transport to GPUs

    Full text link
    Making general particle transport simulation for high-energy physics (HEP) single-instruction-multiple-thread (SIMT) friendly, to take advantage of accelerator hardware, is an important alternative for boosting the throughput of simulation applications. To date, this challenge is not yet resolved, due to difficulties in mapping the complexity of Geant4 components and workflow to the massive parallelism features exposed by graphics processing units (GPU). The AdePT project is one of the R\&D initiatives tackling this limitation and exploring GPUs as potential accelerators for offloading some part of the CPU simulation workload. Our main target is to implement a complete electromagnetic shower demonstrator working on the GPU. The project is the first to create a full prototype of a realistic electron, positron, and gamma electromagnetic shower simulation on GPU, implemented as either a standalone application or as an extension of the standard Geant4 CPU workflow. Our prototype currently provides a platform to explore many optimisations and different approaches. We present the most recent results and initial conclusions of our work, using both a standalone GPU performance analysis and a first implementation of a hybrid workflow based on Geant4 on the CPU and AdePT on the GPU.Comment: 8 pages, 4 figures, 20th International Workshop on Advanced Computing and Analysis Techniques in Physics Research (ACAT 2021), to be published in Journal of Physics: Conference Series, editor Andrei Gheat

    Measurement of J/ψ production in association with a W ± boson with pp data at 8 TeV

    Get PDF
    A measurement of the production of a prompt J/ψ meson in association with a W± boson with W± → μν and J/ψ → μ+μ− is presented for J/ψ transverse momenta in the range 8.5–150 GeV and rapidity |yJ/ψ| < 2.1 using ATLAS data recorded in 2012 at the LHC. The data were taken at a proton-proton centre-of-mass energy of s = 8 TeV and correspond to an integrated luminosity of 20.3 fb−1. The ratio of the prompt J/ψ plus W± cross-section to the inclusive W± cross-section is presented as a differential measurement as a function of J/ψ transverse momenta and compared with theoretical predictions using different double-parton-scattering cross-sections. [Figure not available: see fulltext.]
    corecore