2,012 research outputs found

    Relating two standard notions of secrecy

    Get PDF
    Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s should never be disclosed while equivalence-based secrecy states that two executions of a protocol with distinct instances for s should be indistinguishable to an attacker. Although the second formulation ensures a higher level of security and is closer to cryptographic notions of secrecy, decidability results and automatic tools have mainly focused on the first definition so far. This paper initiates a systematic investigation of the situations where syntactic secrecy entails strong secrecy. We show that in the passive case, reachability-based secrecy actually implies equivalence-based secrecy for digital signatures, symmetric and asymmetric encryption provided that the primitives are probabilistic. For active adversaries, we provide sufficient (and rather tight) conditions on the protocol for this implication to hold.Comment: 29 pages, published in LMC

    Resource Control for Synchronous Cooperative Threads

    Get PDF
    We develop new methods to statically bound the resources needed for the execution of systems of concurrent, interactive threads. Our study is concerned with a \emph{synchronous} model of interaction based on cooperative threads whose execution proceeds in synchronous rounds called instants. Our contribution is a system of compositional static analyses to guarantee that each instant terminates and to bound the size of the values computed by the system as a function of the size of its parameters at the beginning of the instant. Our method generalises an approach designed for first-order functional languages that relies on a combination of standard termination techniques for term rewriting systems and an analysis of the size of the computed values based on the notion of quasi-interpretation. We show that these two methods can be combined to obtain an explicit polynomial bound on the resources needed for the execution of the system during an instant. As a second contribution, we introduce a virtual machine and a related bytecode thus producing a precise description of the resources needed for the execution of a system. In this context, we present a suitable control flow analysis that allows to formulte the static analyses for resource control at byte code level

    Improving Upper Extremity Motor Skills in Girls with Rett Syndrome Using Virtual Reality

    Get PDF
    Introduction: Rett Syndrome is a genetic disorder that limits a girl's ability to use her upper extremities for daily activities, such as dressing and playing. One possible intervention to improve upper extremity function in this population is virtual reality, which can be used to increase activity demands during therapy sessions. Objectives: To determine the feasibility of using internet-based virtual reality intervention for Rett Syndrome (RTT-IVR), to decrease hand wringing/mouthing and increase hand and arm movements away from the midline by identifying attributes and limitations to the proposed intervention. Materials and Methods: Using FAAST Software and Microsoft Kinect sensor, RTT-IVR was trialed with 6 girls with RTT. Upper extremity movements were used to play free Internet games as means of increasing repetitions and purposeful arm movements. Data regarding attributes and limitations of the RTT-IVR intervention were collected via observation and post-session parent interviews. Results: Interviews and observation revealed successful game play when games were motivating, clearly established cause and effect, and matched level of cognitive ability of the participant. Limitations include technological glitches regarding Kinect sensor sensitivity and identifying appropriate games for each participant's interests and abilities. Conclusion: Internet based virtual reality interventions for girls with RTT should be highly individualized to increase motivation and success of intervention

    Flood loss modelling with FLF-IT: a new flood loss function for Italian residential structures

    Get PDF
    The damage triggered by different flood events costs the Italian economy millions of euros each year. This cost is likely to increase in the future due to climate variability and economic development. In order to avoid or reduce such significant financial losses, risk management requires tools which can provide a reliable estimate of potential flood impacts across the country. Flood loss functions are an internationally accepted method for estimating physical flood damage in urban areas. In this study, we derived a new flood loss function for Italian residential structures (FLF-IT), on the basis of empirical damage data collected from a recent flood event in the region of Emilia-Romagna. The function was developed based on a new Australian approach (FLFA), which represents the confidence limits that exist around the parameterized functional depth–damage relationship. After model calibration, the performance of the model was validated for the prediction of loss ratios and absolute damage values. It was also contrasted with an uncalibrated relative model with frequent usage in Europe. In this regard, a three-fold cross-validation procedure was carried out over the empirical sample to measure the range of uncertainty from the actual damage data. The predictive capability has also been studied for some sub-classes of water depth. The validation procedure shows that the newly derived function performs well (no bias and only 10 % mean absolute error), especially when the water depth is high. Results of these validation tests illustrate the importance of model calibration. The advantages of the FLF-IT model over other Italian models include calibration with empirical data, consideration of the epistemic uncertainty of data, and the ability to change parameters based on building practices across Italy

    Batalin-Vilkovisky Integrals in Finite Dimensions

    Full text link
    The Batalin-Vilkovisky method (BV) is the most powerful method to analyze functional integrals with (infinite-dimensional) gauge symmetries presently known. It has been invented to fix gauges associated with symmetries that do not close off-shell. Homological Perturbation Theory is introduced and used to develop the integration theory behind BV and to describe the BV quantization of a Lagrangian system with symmetries. Localization (illustrated in terms of Duistermaat-Heckman localization) as well as anomalous symmetries are discussed in the framework of BV.Comment: 35 page

    A nature‐inspired nrf2 activator protects retinal explants from oxidative stress and neurodegeneration

    Get PDF
    Oxidative stress (OS) plays a key role in retinal dysfunctions and acts as a major trigger of inflammatory and neurodegenerative processes in several retinal diseases. To prevent OS‐induced retinal damage, approaches based on the use of natural compounds are actively investigated. Recently, structural features from curcumin and diallyl sulfide have been combined in a nature‐inspired hybrid (NIH1), which has been described to activate transcription nuclear factor erythroid‐ 2‐related factor‐2 (Nrf2), the master regulator of the antioxidant response, in different cell lines. We tested the antioxidant properties of NIH1 in mouse retinal explants. NIH1 increased Nrf2 nuclear translocation, Nrf2 expression, and both antioxidant enzyme expression and protein levels after 24 h or six days of incubation. Possible toxic effects of NIH1 were excluded since it did not alter the expression of apoptotic or gliotic markers. In OS‐treated retinal explants, NIH1 strengthened the antioxidant response inducing a massive and persistent expression of antioxidant enzymes up to six days of incubation. These effects resulted in prevention of the accumulation of reactive oxygen species, of apoptotic cell death, and of gliotic reactivity. Together, these data indicate that a strategy based on NIH1 to counteract OS could be effective for the treatment of retinal diseases

    CXCL5-mediated accumulation of mature neutrophils in lung cancer tissues impairs the differentiation program of anticancer CD8 T cells and limits the efficacy of checkpoint inhibitors

    Get PDF
    Lung tumor-infiltrating neutrophils are known to support growth and dissemination of cancer cells and to suppress T cell responses. However, the precise impact of tissue neutrophils on programming and differentiation of anticancer CD8 T cells in vivo remains poorly understood. Here, we identified cancer cell-autonomous secretion of CXCL5 as sufficient to drive infiltration of mature, protumorigenic neutrophils in a mouse model of non-small cell lung cancer (NSCLC). Consistently, CXCL5 transcripts correlate with neutrophil density and poor prognosis in a large human lung adenocarcinoma compendium. CXCL5 genetic deletion, unlike antibody-mediated depletion, completely and selectively prevented neutrophils accumulation in lung tissues. Depletion of tumor-infiltrating neutrophils promoted expansion of tumor-specific CD8 T cells, differentiation into effector cells and acquisition of cytolytic functions. Transfer of effector CD8 T cells into neutrophil-rich tumors, inhibited IFN-ϒ production, indicating active suppression of effector functions. Importantly, blocking neutrophils infiltration in the lung, overcame resistance to checkpoint blockade. Hence, this study demonstrates that neutrophils curb acquisition of cytolytic functions in lung tumor tissues and suggests targeting of CXCL5 as a strategy to restore anti-tumoral T cell functions

    Masonry components

    Get PDF
    Masonry is a non-homogeneous material, composed of units and mortar, which can be of different types, with distinct mechanical properties. The design of both masonry units and mortar is based on the role of the walls in the building. Load-bearing walls relate to structural elements that bear mainly vertical loads, but can serve also to resist to horizontal loads. When a structural masonry building is submitted to in-plane and out-of-plane loadings induced by an earthquake for example, the masonry walls are the structural elements that ensure the global stability of the building. This means that the walls should have adequate mechanical properties that enable them to resist to different combinations of compressive, shear and tensile stresses.The boundary conditions influence the resisting mechanisms of the structural walls under in-plane loading and in a buildings the connection at the intersection walls are of paramount importance for the out-of-plane resisting mechanism. However, it is well established that the masonry mechanical properties are also relevant for the global mechanical performance of the structural masonry walls. Masonry units for load-bearing walls are usually laid so that their perforations are vertically oriented, whereas for partition walls, brick units with horizontal perforation are mostly adopted

    Globally Governed Session Semantics

    Get PDF
    This paper proposes a bisimulation theory based on multiparty session types where a choreography specification governs the behaviour of session typed processes and their observer. The bisimulation is defined with the observer cooperating with the observed process in order to form complete global session scenarios and usable for proving correctness of optimisations for globally coordinating threads and processes. The induced bisimulation is strictly more fine-grained than the standard session bisimulation. The difference between the governed and standard bisimulations only appears when more than two interleaved multiparty sessions exist. This distinct feature enables to reason real scenarios in the large-scale distributed system where multiple choreographic sessions need to be interleaved. The compositionality of the governed bisimilarity is proved through the soundness and completeness with respect to the governed reduction-based congruence. Finally, its usage is demonstrated by a thread transformation governed under multiple sessions in a real usecase in the large-scale cyberinfrustracture

    Choreography Rehearsal ⋆

    Get PDF
    Abstract. We propose a methodology for statically predicting the possible interaction patterns of services within a given choreography. We focus on choreographies exploiting the event notification paradigm to manage service interactions. Control Flow Analysis techniques statically approximate which events can be delivered to match the choreography constraints and how the multicast groups can be optimised to handle event notification within the service choreography.
    • 

    corecore