935 research outputs found
Chemical Changes in the Serum Associated With Equine Encephalomyelitis and Moldy Corn Poisoning of Horses
Specific infectious equine encephalomyelitis and moldy corn poisoning in horses are becoming more prevalent in Iowa yearly. Encephalomyelitis has been described, the etiology determined, the mode of transmission established and the typical clinical and pathological findings resolved
Recommended from our members
Intermediate progenitors support migration of neural stem cells into dentate gyrus outer neurogenic niches.
The hippocampal dentate gyrus (DG) is a unique brain region maintaining neural stem cells (NCSs) and neurogenesis into adulthood. We used multiphoton imaging to visualize genetically defined progenitor subpopulations in live slices across key stages of mouse DG development, testing decades old static models of DG formation with molecular identification, genetic-lineage tracing, and mutant analyses. We found novel progenitor migrations, timings, dynamic cell-cell interactions, signaling activities, and routes underlie mosaic DG formation. Intermediate progenitors (IPs, Tbr2+) pioneered migrations, supporting and guiding later emigrating NSCs (Sox9+) through multiple transient zones prior to converging at the nascent outer adult niche in a dynamic settling process, generating all prenatal and postnatal granule neurons in defined spatiotemporal order. IPs (Dll1+) extensively targeted contacts to mitotic NSCs (Notch active), revealing a substrate for cell-cell contact support during migrations, a developmental feature maintained in adults. Mouse DG formation shares conserved features of human neocortical expansion
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples
Human-driven Machine-automation of Engineering Research
This paper presents a framework for efficiently producing engineering research in a global
collaborative effort in a rigorous scientific manner. The proposed framework reduces subjective analysis,
automates several mundane research tasks and provides a suitable formal structure for efficient information sharing and collaboration. The implementation of the framework involves multiple research groups
setting up different web-servers that can perform the steps of the scientific method and automatically
determine the quality and value of new research by directly communicating between servers via public and
private Application Programming Interfaces (APIs) using a set of object-oriented protocols. The automation of many mundane research tasks (e.g. data manipulation), would allow researchers to focus more on
the novel aspects of their research efforts. The increased clarity around the quality and value of research
would allow the research efforts of individuals and available research funding to be better disbursed. The
paper discusses the major aspects of the scientific method, object-orientated programming, the application of the proposed research framework for experimental/analytical/numerical engineering research,
some of the potential benefits and drawbacks, as well as the current state of implementation
Deduction with XOR Constraints in Security API Modelling
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module. We also show how our technique can be applied to standard security protocols
- …