893 research outputs found

    An Interactive Tool to Explore and Improve the Ply Number of Drawings

    Full text link
    Given a straight-line drawing Γ\Gamma of a graph G=(V,E)G=(V,E), for every vertex vv the ply disk DvD_v is defined as a disk centered at vv where the radius of the disk is half the length of the longest edge incident to vv. The ply number of a given drawing is defined as the maximum number of overlapping disks at some point in R2\mathbb{R}^2. Here we present a tool to explore and evaluate the ply number for graphs with instant visual feedback for the user. We evaluate our methods in comparison to an existing ply computation by De Luca et al. [WALCOM'17]. We are able to reduce the computation time from seconds to milliseconds for given drawings and thereby contribute to further research on the ply topic by providing an efficient tool to examine graphs extensively by user interaction as well as some automatic features to reduce the ply number.Comment: Appears in the Proceedings of the 25th International Symposium on Graph Drawing and Network Visualization (GD 2017

    Software Protection

    Get PDF
    A computer system's security can be compromised in many ways a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdrop per can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside-we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system- from system administrators down to ordinary users-to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention. Methods for protecting against MATE attacks are variously known as anti-tamper techniques, digital asset protection, or, more

    Software protection

    Get PDF
    A computer system's security can be compromised in many ways—a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdropper can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside—we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system—from system administrators down to ordinary users—to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention

    Transanal total mesorectal excision with triangle rules: a road map to prevent injuries

    Get PDF
    [Extract] Transanal total mesorectal excision (TaTME) is presented as a promising new surgical technique for the approach to the distal rectum, providing the ability to perform a highquality resection, with technical advantages over the laparoscopic approach. However, the new surgical anatomy of the TaTME resection complicates surgical understanding and increases the risks of inadvertent injuries to important anatomic structures...info:eu-repo/semantics/publishedVersio

    A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes

    Get PDF
    With their increasing popularity in cryptosystems, biometrics have attracted more and more attention from the information security community. However, how to handle the relevant privacy concerns remains to be troublesome. In this paper, we propose a novel security model to formalize the privacy concerns in biometric-based remote authentication schemes. Our security model covers a number of practical privacy concerns such as identity privacy and transaction anonymity, which have not been formally considered in the literature. In addition, we propose a general biometric-based remote authentication scheme and prove its security in our security model

    Dual rotor magnetically geared power split device for hybrid electric vehicles

    Get PDF
    The paper presents a theoretical and experimental investigation into a dual rotor magnetically geared power split device for hybrid electric drivetrains. It is shown that the modulation of magnetic field created by rotor permanent magnets by an array of ferromagnetic pole pieces results in two dominant space harmonics in the airgap adjacent to the stator. Thus, special attention is given to the design of the stator and the selection of the winding configuration, and the effects of air gap space harmonics on performance of the device are discussed. A full-scale prototype for a mid-sized passenger vehicle is designed, built and tested, and the operation as a power split device is demonstrated and it is shown that efficiencies in excess of 94% can be achieved. Furthermore, torsional vibration attenuation by the proposed device is discussed and experimentally demonstrated on a purpose built test rig

    Biomarkers of idiosyncratic drug-induced liver injury (DILI) - a systematic review

    Get PDF
    Introduction: Idiosyncratic drug-induced liver injury (DILI) is an unpredictable event, and there are no specific biomarkers that can distinguish DILI from alternative explanations or predict its clinical outcomes. Areas covered: This systematic review summarizes the available evidence for all biomarkers proposed to have a role in the diagnosis or prognosis of DILI. Following a comprehensive search, we included all types of studies in humans. We included DILI cases based on any threshold criteria but excluded intrinsic DILI, commonly caused by paracetamol overdose. We classified studies into diagnostic and prognostic categories and assessed their methodological quality. After reviewing the literature, 14 studies were eligible. Expert Opinion: Diagnostic studies were heterogeneous with regard to the study population and outcomes measured. Prognostic models were developed by integrating novel biomarkers, risk scores, and traditional biomarkers, which increased their prognostic ability to predict death or transplantation by 6 months. This systematic review highlights the case of need for non-genetic biomarkers that distinguish DILI from acute liver injury related to alternative etiology. Biomarkers with the potential to identify serious adverse outcomes from acute DILI should be validated in independent prospective cohorts with a substantial number of cases.This paper was funded by the Innovative Medicines Initiative 2 Joint Undertaking under grant agreement No 821283 (www.imi.europa.eu). This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and EFPIA. Translational Safety Biomarker Pipeline (TransBioLine): Enabling develop- ment and implementation of novel safety biomarkers in clinical trials and diagnosis of disease’ — ‘TransBioLine’ (‘action’). Grant Number: 821283
    corecore