2,167 research outputs found

    Geometric depolarization in patterns formed by backscattered light

    Full text link
    We formulate a framework for the depolarization of linearly polarized backscattered light based on the concept of geometric phase, {\it i.e} Berry's phase. The predictions of this theory are applied to the patterns formed by backscattered light between crossed or parallel polarizers. This theory should be particularly adapted to the situation in which polarized light is scattered many times but predominantly in the forward direction. We apply these ideas to the patterns which we obtained experimentally with backscattered polarized light from a colloidal suspension.Comment: 3 pages and 3 figure

    Accessible and Interactive: New Methods of Data Visualization as Tools for Data Analysis and Information Sharing in Transitional Justice Research

    Get PDF
    The production and use of datasets is a growing area in transitional justice research. One constant limitation, however, is the way this data is visualized. Relying only on static graphics and tables, many of these datasets are insufficiently explored and analyzed, and remain inaccessible for other researchers. Interactive data visualization tools are an ideal method for overcoming this gap. They are able to adequately present a wide range of quantitative and qualitative data- types, such as geographic, temporal, network, and text data, and their interactive functions allow for a better exploration and understanding of the data. This article examines the visualization needs of transitional justice research, and demonstrates how interactive visualization can facilitate data analysis as well as information sharing. Presenting selected tools for different data types, the article provides hands-on methodological examples for effective handling of transitional justice data using, for example, GIS mapping, Google Motion Charts, and Word Trees

    Trust Management within Virtual Communities: Adaptive and Socially-Compliant Trust Model

    Get PDF
    21 pagesRecent years have witnessed increasing interest of people in sharing, collaborating and interacting in many different ways among new social structures called Virtual Communities (VC). They represent aggrega- tions of entities with common interests, goals, practices or values. VCs are particularly complex environments wherein trust became, rapidly, a prerequisite for the decision-making process, and where traditional trust establishment techniques are regularly challenged. In our work we are considering how individual and collective trust policies can be managed, adapted and combined. To this aim, we propose an Adaptive and Socially-Compliant Trust Management System (ASC-TMS) based on multi-agent technologies. In this framework, policies are used as concrete implementations of trust models in order to specify both (i) user-centred (i.e. personal) and community-centred (i.e. collective) trust requirements. Agents are used to manage and combine these different policies in a decentralized and flexible way. We describe the functionalities and the architecture that supports them and discuss also a prototype implementation

    Gestion de la confiance et intégration des exigences sociales au sein de communautés virtuelles

    Get PDF
    http://www.emse.fr/~picard/publications/yaich11jfsma.pdfInternational audienceLa confiance est devenue un facteur clé des processus de décision au sein de communautés virtuelles. Le caractère ouvert et décentralisé de ces environnements couplés à leur dimension sociale défient les mécanismes actuelles de gestion de la confiance. Notamment pour ce qui concerne la gestion et l'intégration des exigences de confiance des utilisateurs et ceux de leurs communautés. Afin de répondre à ce problème, nous proposons SC-TMS, un système de gestion de la confiance adaptatif basé sur le principe de conformité sociale [4]. En nous appuyant sur les technologies multi-agents, des politiques de confiance sont utilisées pour spécifier à la fois les modèles de confiance centrés utilisateur et les modèles centrés communauté. Les agents y sont utilisés pour gérer et combiner ces différentes politiques de manière flexible et décentralisée. Nous décrivons les fonctionnalités et l'architecture qui les mettent en oeuvre et discutons de leur implémentation

    GALDIERO is CO-FIRST AUTHOR. Phagocytes as Corrupted Policemen in Cancer-Related Inflammation

    Get PDF
    Inflammation is a key component of the tumor microenvironment. Tumor-associated macrophages (TAMs) and tumor-associated neutrophils (TANs) are prototypic inflammatory cells in cancer-related inflammation. Macrophages provide a first line of resistance against infectious agents but in the ecological niche of cancer behave as corrupted policemen. TAMs promote tumor growth and metastasis by direct interactions with cancer cells, including cancer stem cells, as well as by promoting angiogenesis and tissue remodeling and suppressing effective adaptive immunity. In addition, the efficacy of chemotherapy, radiotherapy, and checkpoint blockade inhibitors is profoundly affected by regulation of TAMs. In particular, TAMs can protect and rescue tumor cells from cytotoxic therapy by orchestrating a misguided tissue repair response. Following extensive preclinical studies, there is now proof of concept that targeting tumor-promoting macrophages by diverse strategies (e.g., Trabectedin, anti-colony-stimulating factor-1 receptor antibodies) can result in antitumor activity in human cancer and further studies are ongoing. Neutrophils have long been overlooked as a minor component of the tumor microenvironment, but there is evidence for an important role of TANs in tumor progression. Targeting phagocytes (TAMs and TANs) as corrupted policemen in cancer may pave the way to innovative therapeutic strategies complementing cytoreductive therapies and immunotherapy

    Runtime Code Polymorphism as a Protection against Physical Attacks

    Get PDF
    International audienceWe present a generic framework for runtime code polymorphism,applicable to a large class of computing platforms up to embeddedsystems with low computing resources (e.g. microcontrollers withfew kilo-bytes of memory). Code polymorphism is dened as the abilityto change the observable behaviour of a software component withoutchanging its functional properties. In our framework, code polymorphismis achieved thanks to runtime code generation, which oers many leversfor code transformations: we describe the use of random register allocation,random instruction selection, instruction shuing and insertion ofnoise instructions.We evaluate the eectiveness of our framework againstdierential power analysis and its overhead impact. As compared to areference implementation of AES where the cipher key could be recoveredby DPA in less than 50 traces in average, in our implementation thekey cipher could not be extracted after 10000 traces. Our experimentalevaluation shows a moderate impact in terms of performance overhead

    Variable velocity range imaging of the choroid with dual-beam optical coherence angiography

    Get PDF
    In this study, we present dual-beam Doppler optical coherence angiography with variable beam separation. Altering beam distance, independently of the scanning protocol, provides a flexible way to select the velocity range of detectable blood flow. This system utilized a one-micrometer wavelength light source to visualize deep into the posterior eye, i.e., the choroid. Two-dimensional choroidal vasculature maps of a human subject acquired with different beam separations, and hence with several velocity ranges, are presented. Combining these maps yields a semi-quantitative visualization of axial velocity of the choroidal circulation. The proposed technique may be useful for identifying choroidal abnormalities that occur in pathological conditions of the eye
    • …
    corecore