4,651 research outputs found

    Surface width scaling in noise reduced Eden clusters

    Full text link
    The surface width scaling of Eden A clusters grown from a single aggregate site on the square lattice is investigated as a function of the noise reduction parameter. A two-exponent scaling ansatz is introduced and used to fit the results from simulations covering the range from fully stochastic to the zero-noise limit.Comment: 4 pages, RevTex, 3 figure

    Supporting security-oriented, collaborative nanoCMOS electronics research

    Get PDF
    Grid technologies support collaborative e-Research typified by multiple institutions and resources seamlessly shared to tackle common research problems. The rules for collaboration and resource sharing are commonly achieved through establishment and management of virtual organizations (VOs) where policies on access and usage of resources by collaborators are defined and enforced by sites involved in the collaboration. The expression and enforcement of these rules is made through access control systems where roles/privileges are defined and associated with individuals as digitally signed attribute certificates which collaborating sites then use to authorize access to resources. Key to this approach is that the roles are assigned to the right individuals in the VO; the attribute certificates are only presented to the appropriate resources in the VO; it is transparent to the end user researchers, and finally that it is manageable for resource providers and administrators in the collaboration. In this paper, we present a security model and implementation improving the overall usability and security of resources used in Grid-based e-Research collaborations through exploitation of the Internet2 Shibboleth technology. This is explored in the context of a major new security focused project at the National e-Science Centre (NeSC) at the University of Glasgow in the nanoCMOS electronics domain

    Federated authentication and authorisation for e-science

    Get PDF
    The Grid and Web service community are defining a range of standards for a complete solution for security. The National e-Science Centre (NeSC) at the University of Glasgow is investigating how the various pre-integration components work together in a variety of e-Science projects. The EPSRC-funded nanoCMOS project aims to allow electronics designers and manufacturers to use e-Science technologies and expertise to solve problems of device variability and its impact on system design. To support the security requirements of nanoCMOS, two NeSC projects (VPMan and OMII-SP) are providing tools to allow easy configuration of security infrastructures, exploiting previous successful projects using Shibboleth and PERMIS. This paper presents the model in which these tools interoperate to provide secure and simple access to Grid resources for non-technical users

    The Interpreter In An Undergraduate Compilers Course

    Full text link
    An undergraduate compilers course poses significant challenges to students, in both the conceptual richness of the major components and in the programming effort necessary to implement them. In this paper, I argue that a related architecture, the interpreter, serves as an effective conceptual framework in which to teach some of the later stages of the compiler pipeline. This framework can serve both to unify some of the major concepts that are taught in a typical undergraduate course and to structure the implementation of a semester-long compiler project.Comment: Final version to appear in SIGCSE '1

    Integrating security solutions to support nanoCMOS electronics research

    Get PDF
    The UK Engineering and Physical Sciences Research Council (EPSRC) funded Meeting the Design Challenges of nanoCMOS Electronics (nanoCMOS) is developing a research infrastructure for collaborative electronics research across multiple institutions in the UK with especially strong industrial and commercial involvement. Unlike other domains, the electronics industry is driven by the necessity of protecting the intellectual property of the data, designs and software associated with next generation electronics devices and therefore requires fine-grained security. Similarly, the project also demands seamless access to large scale high performance compute resources for atomic scale device simulations and the capability to manage the hundreds of thousands of files and the metadata associated with these simulations. Within this context, the project has explored a wide range of authentication and authorization infrastructures facilitating compute resource access and providing fine-grained security over numerous distributed file stores and files. We conclude that no single security solution meets the needs of the project. This paper describes the experiences of applying X.509-based certificates and public key infrastructures, VOMS, PERMIS, Kerberos and the Internet2 Shibboleth technologies for nanoCMOS security. We outline how we are integrating these solutions to provide a complete end-end security framework meeting the demands of the nanoCMOS electronics domain

    The impact of consent on observational research: a comparison of outcomes from consenters and non consenters to an observational study

    Get PDF
    Background Public health benefits from research often rely on the use of data from personal medical records. When neither patient consent nor anonymisation is possible, the case for accessing such records for research purposes depends on an assessment of the probabilities of public benefit and individual harm. Methods In the late 1990s, we carried out an observational study which compared the care given to affluent and deprived women with breast cancer. Patient consent was not required at that time for review of medical records, but was obtained later in the process prior to participation in the questionnaire study. We have re-analysed our original results to compare the whole sample with those who later provided consent. Results Two important findings emerged from the re-analysis of our data which if presented initially would have resulted in insufficient and inaccurate reporting. Firstly, the reduced dataset contains no information about women presenting with locally advanced or metastatic cancer and we would have been unable to demonstrate one of our initial key findings: namely a larger number of such women in the deprived group. Secondly, our re-analysis of the consented women shows that significantly more women from deprived areas (51 v 31%, p = 0.018) received radiotherapy compared to women from more affluent areas. Previously published data from the entire sample demonstrated no difference in radiotherapy treatment between the affluent and deprived groups. Conclusion The risk benefit assessment made regarding the use of medical records without consent should include the benefits of obtaining research evidence based on 100% of the population and the possibility of inappropriate or insufficient findings if research is confined to consented populations
    • 

    corecore