4,954 research outputs found
New waterboatmen records for Western Canada (Hemiptera: Corixidae)
Trichocorixa verticalis (Fieber) is reported for the first time from the mainland of British Columbia and the subspecific assignment is discussed. Based on specimens in the Spencer Entomological Museum, one provincial record and one territorial record are added to the recent checklist of Canadian Hemiptera
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples
Competitive market for multiple firms and economic crisis
The origin of economic crises is a key problem for economics. We present a
model of long-run competitive markets to show that the multiplicity of
behaviors in an economic system, over a long time scale, emerge as statistical
regularities (perfectly competitive markets obey Bose-Einstein statistics and
purely monopolistic-competitive markets obey Boltzmann statistics) and that how
interaction among firms influences the evolutionary of competitive markets. It
has been widely accepted that perfect competition is most efficient. Our study
shows that the perfectly competitive system, as an extreme case of competitive
markets, is most efficient but not stable, and gives rise to economic crises as
society reaches full employment. In the economic crisis revealed by our model,
many firms condense (collapse) into the lowest supply level (zero supply,
namely bankruptcy status), in analogy to Bose-Einstein condensation. This
curious phenomenon arises because perfect competition (homogeneous
competitions) equals symmetric (indistinguishable) investment direction, a fact
abhorred by nature. Therefore, we urge the promotion of monopolistic
competition (heterogeneous competitions) rather than perfect competition. To
provide early warning of economic crises, we introduce a resolving index of
investment, which approaches zero in the run-up to an economic crisis. On the
other hand, our model discloses, as a profound conclusion, that the
technological level for a long-run social or economic system is proportional to
the freedom (disorder) of this system; in other words, technology equals the
entropy of system. As an application of this new concept, we give a possible
answer to the Needham question: "Why was it that despite the immense
achievements of traditional China it had been in Europe and not in China that
the scientific and industrial revolutions occurred?"Comment: 17 pages; 3 figure
Artemis Curation: Preparing for Sample Return from the Lunar South Pole
Space Policy Directive-1 mandates that the United States will lead the return of humans to the Moon for long-term exploration and utilization, followed by human missions to Mars and other destinations. In addition, the Vice President stated that It is the stated policy of this administration and the United States of America to return American astronauts to the Moon within the next five years, that is, by 2024. These efforts, under the umbrella of the recently formed Artemis Program, include such historic goals as the flight of the first woman to the Moon and the exploration of the lunar south-polar region. Among the top priorities of the Artemis Program is the return of a suite of geologic samples, providing new and significant opportunities for progressing lunar science and human exploration. In particular, successful sample return is necessary for understanding the history of volatiles in the Solar System and the evolution of the Earth-Moon system, fully constraining the hazards of the lunar polar environment for astronauts, and providing the necessary data for constraining the abundance and distribution of resources for in-situ resource utilization (ISRU). Here we summarize the ef-forts of the Astromaterials Acquisition and Curation Office (hereafter referred to as the Curation Office) to ensure the success of Artemis sample return (per NASA Policy Directive (NPD) 7100.10E)
Overcharging a Black Hole and Cosmic Censorship
We show that, contrary to a widespread belief, one can overcharge a near
extremal Reissner-Nordstrom black hole by throwing in a charged particle, as
long as the backreaction effects may be considered negligible. Furthermore, we
find that we can make the particle's classical radius, mass, and charge, as
well as the relative size of the backreaction terms arbitrarily small, by
adjusting the parameters corresponding to the particle appropriately. This
suggests that the question of cosmic censorship is still not wholly resolved
even in this simple scenario. We contrast this with attempting to overcharge a
black hole with a charged imploding shell, where we find that cosmic censorship
is upheld. We also briefly comment on a number of possible extensions.Comment: 26 pages, 3 figures, LaTe
Notes on Conformal Invisibility Devices
As a consequence of the wave nature of light, invisibility devices based on
isotropic media cannot be perfect. The principal distortions of invisibility
are due to reflections and time delays. Reflections can be made exponentially
small for devices that are large in comparison with the wavelength of light.
Time delays are unavoidable and will result in wave-front dislocations. This
paper considers invisibility devices based on optical conformal mapping. The
paper shows that the time delays do not depend on the directions and impact
parameters of incident light rays, although the refractive-index profile of any
conformal invisibility device is necessarily asymmetric. The distortions of
images are thus uniform, which reduces the risk of detection. The paper also
shows how the ideas of invisibility devices are connected to the transmutation
of force, the stereographic projection and Escheresque tilings of the plane
Classification of Complex Polynomial Vector Fields in One Complex Variable
A classification of the global structure of monic and centered one-variable
complex polynomial vector fields is presented.Comment: 57 pages, 35 figures, submitted to the Journal of Difference
Equations and Application
Formal Verification of Security Protocol Implementations: A Survey
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages. Recently, some researchers have started investigating techniques that bring automated formal proofs closer to real implementations. This paper surveys these attempts, focusing on approaches that target the application code that implements protocol logic, rather than the libraries that implement cryptography. According to these approaches, libraries are assumed to correctly implement some models. The aim is to derive formal proofs that, under this assumption, give assurance about the application code that implements the protocol logic. The two main approaches of model extraction and code generation are presented, along with the main techniques adopted for each approac
A phenomenological approach to the simulation of metabolism and proliferation dynamics of large tumour cell populations
A major goal of modern computational biology is to simulate the collective
behaviour of large cell populations starting from the intricate web of
molecular interactions occurring at the microscopic level. In this paper we
describe a simplified model of cell metabolism, growth and proliferation,
suitable for inclusion in a multicell simulator, now under development
(Chignola R and Milotti E 2004 Physica A 338 261-6). Nutrients regulate the
proliferation dynamics of tumor cells which adapt their behaviour to respond to
changes in the biochemical composition of the environment. This modeling of
nutrient metabolism and cell cycle at a mesoscopic scale level leads to a
continuous flow of information between the two disparate spatiotemporal scales
of molecular and cellular dynamics that can be simulated with modern computers
and tested experimentally.Comment: 58 pages, 7 figures, 3 tables, pdf onl
- …