612 research outputs found

    A Comparison of Petri Net Semantics under the Collective Token Philosophy

    Get PDF
    In recent years, several semantics for place/transition Petri nets have been proposed that adopt the collective token philosophy. We investigate distinctions and similarities between three such models, namely configuration structures, concurrent transition systems, and (strictly) symmetric (strict) monoidal categories. We use the notion of adjunction to express each connection. We also present a purely logical description of the collective token interpretation of net behaviours in terms of theories and theory morphisms in partial membership equational logic

    A Cross-level Verification Methodology for Digital IPs Augmented with Embedded Timing Monitors

    Get PDF
    Smart systems implement the leading technology advances in the context of embedded devices. Current design methodologies are not suitable to deal with tightly interacting subsystems of different technological domains, namely analog, digital, discrete and power devices, MEMS and power sources. The interaction effects between the components and between the environment and the system must be modeled and simulated at system level to achieve high performance. Focusing on digital subsystem, additional design constraints have to be considered as a result of the integration of multi-domain subsystems in a single device. The main digital design challenges combined with those emerging from the heterogeneous nature of the whole system directly impact on performance, hence propagation delay, of the digital component. In this paper we propose a design approach to enhance the RTL model of a given digital component for the integration in smart systems, and a methodology to verify the added features at system-level. The design approach consists of ``augmenting'' the RTL model through the automatic insertion of delay sensors, which are capable of detecting and correcting timing failures. The verification methodology consists of an automatic flow of two steps. Firstly the augmented model is abstracted to system-level (i.e., SystemC TLM); secondly mutants, which are code mutations to emulate timing failures, are automatically injected into the abstracted model. Experimental results demonstrate the applicability of the proposed design and verification methodology and the effectiveness of the simulation performance

    Rol de las ciudades intermedias en la copresencia de modelos de producción agropecuarios : Enseñanzas del caso de Rodez (Francia) para las problemáticas identificadas en Francia y Argentina

    Get PDF
    El objetivo de este trabajo consiste en analizar el rol de las ciudades intermedias localizadas en el corazón de espacios rurales y agropecuarios, tomando el caso de la ciudad de Rodez, en la Región Occitania, en el suroeste de Francia, en tanto caso emblemático para luego generar una reflexión metodológica en un espacio representativo de lo agropecuario a nivel mundial: la región pampeana argentina. Nuestra hipótesis es que estas ciudades intermedias en esos espacios cumplen un papel esencial en la articulación, competencia y dependencia/ complementariedad funcional con la actividad agropecuaria en su área de influencia y aún en otras escalas. Partimos de considerar que no hay espacios rurales dinámicos sin ciudades dinámicas y que este tipo de dupla produce innovaciones sociales, económicas y tecnológicas que hacen a un proyecto territorial. Para lograr este objetivo, en este trabajo se movilizan dos conceptos centrales para aprehender la ciudad y la actividad agropecuaria en una visión geográfica. Por un lado, el concepto de ciudad intermedia y, por otro, el de copresencia. El análisis demuestra la copresencia de modelos agropecuarios que operan por simultaneidad en la ciudad intermedia de Rodez y emerge así un dispositivo para el estudio de estas problemáticas que se están aplicando en otras ciudades de Francia y de la Argentina.Facultad de Ciencias Agrarias y ForestalesConsejo Nacional de Investigaciones Científicas y TécnicasInstituto Nacional de Tecnología Agropecuari

    Cocaine-mediated circadian reprogramming in the striatum through dopamine D2R and PPARγ activation

    Get PDF
    Substance abuse disorders are linked to alteration of circadian rhythms, although the molecular and neuronal pathways implicated have not been fully elucidated. Addictive drugs, such as cocaine, induce a rapid increase of dopamine levels in the brain. Here, we show that acute administration of cocaine triggers reprogramming in circadian gene expression in the striatum, an area involved in psychomotor and rewarding effects of drugs. This process involves the activation of peroxisome protein activator receptor gamma (PPARγ), a nuclear receptor involved in inflammatory responses. PPARγ reprogramming is altered in mice with cell-specific ablation of the dopamine D2 receptor (D2R) in the striatal medium spiny neurons (MSNs) (iMSN-D2RKO). Administration of a specific PPARγ agonist in iMSN-D2RKO mice elicits substantial rescue of cocaine-dependent control of circadian genes. These findings have potential implications for development of strategies to treat substance abuse disorders

    Parkin regulates kainate receptors by interacting with the GluK2 subunit

    Get PDF
    Although loss-of-function mutations in the PARK2 gene, the gene that encodes the protein parkin, cause autosomal recessive juvenile parkinsonism, the responsible molecular mechanisms remain unclear. Evidence suggests that a loss of parkin dysregulates excitatory synapses. Here we show that parkin interacts with the kainate receptor (KAR) GluK2 subunit and regulates KAR function. Loss of parkin function in primary cultured neurons causes GluK2 protein to accumulate in the plasma membrane, potentiates KAR currents and increases KAR-dependent excitotoxicity. Expression in the mouse brain of a parkin mutant causing autosomal recessive juvenile parkinsonism results in GluK2 protein accumulation and excitotoxicity. These findings show that parkin regulates KAR function in vitro and in vivo, and suggest that KAR upregulation may have a pathogenetic role in parkin-related autosomal recessive juvenile parkinsonism

    Neutralization of schwann cell-secreted VEGF is protective to in vitro and in vivo experimental diabetic neuropathy

    Get PDF
    The pathogenetic role of vascular endothelial growth factor (VEGF) in long-term retinal and kidney complications of diabetes has been demonstrated. Conversely, little is known in diabetic neuropathy. We examined the modulation of VEGF pathway at mRNA and protein level on dorsal root ganglion (DRG) neurons and Schwann cells (SC) induced by hyperglycaemia. Moreover, we studied the effects of VEGF neutralization on hyperglycemic DRG neurons and streptozotocin-induced diabetic neuropathy. Our findings demonstrated that DRG neurons were not affected by the direct exposition to hyperglycaemia, whereas showed an impairment of neurite outgrowth ability when exposed to the medium of SC cultured in hyperglycaemia. This was mediated by an altered regulation of VEGF and FLT-1 receptors. Hyperglycaemia increased VEGF and FLT-1 mRNA without changing their intracellular protein levels in DRG neurons, decreased intracellular and secreted protein levels without changing mRNA level in SC, while reduced the expression of the soluble receptor sFLT-1 both in DRG neurons and SC. Bevacizumab, a molecule that inhibits VEGF activity preventing the interaction with its receptors, restored neurite outgrowth and normalized FLT-1 mRNA and protein levels in co-cultures. In diabetic rats, it both prevented and restored nerve conduction velocity and nociceptive thresholds. We demonstrated that hyperglycaemia early affected neurite outgrowth through the impairment of SC-derived VEGF/FLT-1 signaling and that the neutralization of SC-secreted VEGF was protective both in vitro and in vivo models of diabetic neuropathy

    The 4C spectrum of fundamental behavioral relations for concurrent systems

    Get PDF
    The design of concurrent software systems, in particular process-aware information systems, involves behavioral modeling at various stages. Recently, approaches to behavioral analysis of such systems have been based on declarative abstractions defined as sets of behavioral relations. However, these relations are typically defined in an ad-hoc manner. In this paper, we address the lack of a systematic exploration of the fundamental relations that can be used to capture the behavior of concurrent systems, i.e., co-occurrence, conflict, causality, and concurrency. Besides the definition of the spectrum of behavioral relations, which we refer to as the 4C spectrum, we also show that our relations give rise to implication lattices. We further provide operationalizations of the proposed relations, starting by proposing techniques for computing relations in unlabeled systems, which are then lifted to become applicable in the context of labeled systems, i.e., systems in which state transitions have semantic annotations. Finally, we report on experimental results on efficiency of the proposed computations

    Higher-order architectural connectors

    Get PDF
    We develop a notion of higher-order connector towards supporting the systematic construction of architectural connectors for software design. A higher-order connector takes connectors as parameters and allows for services such as security protocols and fault-tolerance mechanisms to be superposed over the interactions that are handled by the connectors passed as actual arguments. The notion is first illustrated over CommUnity, a parallel program design language that we have been using for formalizing aspects of architectural design. A formal, algebraic semantics is then presented which is independent of any Architectural Description Language. Finally, we discuss how our results can impact software design methods and tools

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
    corecore