10,772 research outputs found
Recommended from our members
Required Information Release
Many computer systems have a functional requirement to release information. Such requirements are an important part of a system's information security requirements. Current information-flow control techniques are able to reason about permitted information flows, but not required information flows.
In this paper, we introduce and explore the specification and enforcement of required information release in a language-based setting. We define semantic security conditions that express both what information a program is required to release, and how an observer is able to learn this information. We also consider the relationship between permitted and required information release, and define bounded release, which provides upper- and lower-bounds on the information a program releases. We show that both required information release and bounded release can be enforced using a security-type system.Engineering and Applied Science
Next-to-leading order QCD effects in associated charged Higgs and W boson production in the MSSM at the CERN Large Hadron Collider
We present the calculations of the next-to-leading order (NLO) QCD
corrections to the inclusive total cross sections for the associated production
of the through annihilation in the Minimal
Supersymmetric Standard Model at the CERN Large Hadron Collider. The NLO QCD
corrections can either enhance or reduce the total cross sections, but they
generally efficiently reduce the dependence of the total cross sections on the
renormalization/factorization scale. The magnitude of the NLO QCD corrections
is about 10% in most of the parameter space and can reach 15% in some parameter
regions. We also show the Monte Carlo simulation results for the
signature from the and the
decays including the NLO QCD effects, and find an observable signal at a
level in some parameter region of the minimal supergravity model.Comment: version to be published in Phys.Rev.
Food Safety Knowledge and Practice Among Community in Sg. Pelek, Sepang, Selangor Darul Ehsan
Food safety is a basic requirement of food quality. It is an increasingly important public health issue to prevent and control food borne illnesses. A cross-sectional study was designed to determine level of knowledge and practice on food safety, to determine the association between knowledge and practice, and also to identify the association between socio-demographic factors and practice score of the population studied. This study was conducted among adult population in Taman Bahagia, Sungai Pelek, Sepang, Selangor Darul Ehsan. Data were collected using an interviewed structured questionnaire. A stratified random sampling was performed to obtain houses, followed by simple random sampling to select sample in the house. A total of 115 data sets were analysed using Statistical Package for Social Sciences (SPSS) version 20.0. Analysis showed that 35% of respondents have poor level of knowledge on food safety, whereas 27% of the respondents have poor level of practices on food safety. Multiple linear regression revealed that there are a significant association between education level (p<0.001), Adj b=2.57 (95% CI: 1.15, 3.99) and gender (p=0.048), Adj b=1.15 (95% CI: 0.01, 2.29) with practice score on food safety. Therefore, health promotion and education on the importance of practicing food safety at home should be focused to prevent further unwanted health effects
Monotone integrated large eddy simulations for supersonic boundary layer flows
Monotone integrated large eddy simulation (MILES) has been carried out to simulate supersonic
turbulent boundary layer flows for relatively high Reynolds numbers. Two Riemann solver based
methods, Osher’s and Roe’s schemes, were tested along with a MUSCL scheme to investigate their
suitability for MILES simulation. The effects of different limiters used in the MUSCL scheme were
also tested regarding the MILES simulations
SiO and H2O Maser Observations of Red Supergiants in Star Clusters Embedded in the Galactic Disk
We present the result of radio observations of red supergiants in the star
cluster, Stephenson's #2, and candidates for red supergiants in the star
clusters, Mercer et al. (2005)'s #4, #8, and #13, in the SiO and HO maser
lines.The Stephenson's #2 cluster and nearby aggregation at the South-West
contain more than 15 red supergiants. We detected one at the center of
Stephenson's #2 and three in the south-west aggregation in the SiO maser line,
and three of these 4 were also detected in the H2O maser line. The average
radial velocity of the 4 detected objects is 96 km s^{-1}, giving a kinematic
distance of 5.5 kpc, which locates this cluster near the base of the
Scutum-Crux spiral arm. We also detected 6 SiO emitting objects associated with
the other star clusters. In addition, mapping observations in the CO J=1--0
line toward these clusters revealed that an appreciable amount of molecular gas
still remains around Stephenson's #2 cluster in contrast to the prototypical
red-supergiant cluster, Bica et al.'s #122. It indicates that a time scale of
gas expulsion differs considerably in individual clusters.Comment: high res. figures available at
http://www.nro.nao.ac.jp/~lib_pub/report/data/no674.pdf. PASJ 62, No.2 (2010,
April 25 issue) in pres
Recommended from our members
Asynchronous Functional Reactive Programming for GUIs
Graphical user interfaces (GUIs) mediate many of our interactions with computers. Functional Reactive Programming (FRP) is a promising approach to GUI design, providing high-level, declarative, compositional abstractions to describe user interactions and time-dependent computations. We present Elm, a practical FRP language focused on easy creation of responsive GUIs. Elm has two major features: simple declarative support for Asynchronous FRP; and purely functional graphical layout.
Asynchronous FRP allows the programmer to specify when the global ordering of event processing can be violated, and thus enables efficient concurrent execution of FRP programs; long-running computation can be executed asynchronously and not adversely affect the responsiveness of the user interface.
Layout in Elm is achieved using a purely functional declarative framework that makes it simple to create and combine text, images, and video into rich multimedia displays.
Together, Elm's two major features simplify the complicated task of creating responsive and usable GUIs.Engineering and Applied Science
Si/Ge hole-tunneling double-barrier resonant tunneling diodes formed on sputtered flat Ge layers
We have demonstrated Si/Ge hole-tunneling double-barrier resonant tunneling diodes (RTDs) formed on flat Ge layers with a relaxation rate of 89% by our proposed method; in this method, the flat Ge layers can be directly formed on highly B-doped Si(001) substrates using our proposed sputter epitaxy method. The RTDs exhibit clear negative differential resistance effects in the static current–voltage (I–V) curves at room temperature. The quantized energy level estimation suggests that resonance peaks that appeared in the I–V curves are attributed to hole tunneling through the first heavy- and light-hole energy levels
Security Attributes Based Digital Rights Management
Most real-life systems delegate responsibilities to different authorities. We apply this model to a digital rights management system, to achieve flexible security. In our model a hierarchy of authorities issues certificates that are linked by cryptographic means. This linkage establishes a chain of control, identity-attribute-rights, and allows flexible rights control over content. Typical security objectives, such as identification, authentication, authorization and access control can be realised. Content keys are personalised to detect illegal super distribution. We describe a working prototype, which we develop using standard techniques, such as standard certificates, XML and Java. We present experimental results to evaluate the scalability of the system. A formal analysis demonstrates that our design is able to detect a form of illegal super distribution
Effectiveness of Hindman's theorem for bounded sums
We consider the strength and effective content of restricted versions of
Hindman's Theorem in which the number of colors is specified and the length of
the sums has a specified finite bound. Let denote the
assertion that for each -coloring of there is an infinite
set such that all sums for and have the same color. We prove that there is a
computable -coloring of such that there is no infinite
computable set such that all nonempty sums of at most elements of
have the same color. It follows that is not provable
in and in fact we show that it implies in
. We also show that there is a computable instance of
with all solutions computing . The proof of this
result shows that implies in
- …