2,848 research outputs found
Randomised trial of glutamine, selenium, or both, to supplement parenteral nutrition for critically ill patients
Peer reviewedPublisher PD
To have and have not: Variations on secret sharing to model user presence
We address the problem of locking and unlocking a device, such as a laptop, a phone or a security token, based on the absence or presence of the user. We detect user presence by sensing the proximity of a subset of their possessions, making the process automatic and effortless. As in previous work, a master key unlocks the device and a secret-sharing scheme allows us to reconstruct this master key in the presence of k-out-of-n items. We extend this basic scheme in various directions, e.g. by allowing items to issue a dynamically variable number of shares based on how confident they are that the user is present. The position we argue in this paper is that a multi-dimensional approach to authentication that fuses several contextual inputs, similar to that already adopted by major web sites, can also bring advantages at the local scale.This is the author accepted manuscript. The final published version is available at http://dl.acm.org/citation.cfm?id=2641705&CFID=518729474&CFTOKEN=85977065
The Lagrange and Markov spectra from the dynamical point of view
This text grew out of my lecture notes for a 4-hours minicourse delivered on
October 17 \& 19, 2016 during the research school "Applications of Ergodic
Theory in Number Theory" -- an activity related to the Jean-Molet Chair project
of Mariusz Lema\'nczyk and S\'ebastien Ferenczi -- realized at CIRM, Marseille,
France. The subject of this text is the same of my minicourse, namely, the
structure of the so-called Lagrange and Markov spectra (with an special
emphasis on a recent theorem of C. G. Moreira).Comment: 27 pages, 6 figures. Survey articl
The Analyticity of a Generalized Ruelle's Operator
In this work we propose a generalization of the concept of Ruelle operator
for one dimensional lattices used in thermodynamic formalism and ergodic
optimization, which we call generalized Ruelle operator, that generalizes both
the Ruelle operator proposed in [BCLMS] and the Perron Frobenius operator
defined in [Bowen]. We suppose the alphabet is given by a compact metric space,
and consider a general a-priori measure to define the operator. We also
consider the case where the set of symbols that can follow a given symbol of
the alphabet depends on such symbol, which is an extension of the original
concept of transition matrices from the theory of subshifts of finite type. We
prove the analyticity of the Ruelle operator and present some examples
3,4-O-Isopropylidene-2-C-methyl-d-galactonolactone
X-ray crystallography unequivocally confirmed the stereochemistry of the 2-C-methyl group in the title molecule, C10H16O6, in which the 1,5-lactone ring exists in a boat conformation. The use of d-galactose in the synthesis determined the absolute stereochemistry. The crystal exists as O—H⋯O hydrogen-bonded layers in the ab plane, with each molecule acting as a donor and acceptor for two hydrogen bonds
Double reading in breast cancer screening : cohort evaluation in the CO-OPS trial
Purpose:
To investigate the effect of double readings by a second radiologist on recall rates, cancer detection and characteristics of cancers detected in the National Health Service Breast Screening Program in England.
Materials and Methods:
In this retrospective analysis we evaluated 805,206 women through screening and diagnostic test results by extracting one year of routine data from 33 English breast screening centers. Centers used double reading of digital mammograms, with arbitration if there were discrepant reads. Information on reader decisions, with results of follow-up tests, were used to explore the effect of the second reader. The statistical tests used were the test for equality of proportions, the χ2 test for independence and the t-test.
Results:
The first reader recalled 4·76%, (38295/805206, 95% CI 4·71%-4·80%) of women. Two readers recalled 6·19% in total, (49857/805206, 95% CI 6·14%- 6·24%), but arbitration of discordant reads reduced recall rate to 4·08%, (32863/805206, 95% CI 4·04%-4·12%, p<0.001). 7055 cancers were detected of which 627 (8·89%, 95% CI 8·22%-9·55%, p<0.001) were detected by the second reader only. These additional cancers were more likely to be ductal carcinoma in situ, (30·5% (183/600) vs 22.0% (1344/6114), p<0.001); and additional invasive cancers were smaller (mean 14·2mm vs 16·7mm, p<0.001), had fewer involved nodes, and were likely to be lower grade.
Conclusion:
Double reading with arbitration reduces recall and increases cancer detection compared to single reading. Cancers detected only by the second reader were smaller, lower grade, and had less nodal involvement
Recommended from our members
Pico without public keys
This document is the Accepted Manuscript version of the following paper: Frank Stajano, Bruce Christianson, Mark Lomas, Graeme Jenkinson, Jeunese Payne, Max Spencer, and Quentin Stafford Fraser, 'Pico without Public Keys', Security Protocols XXIII, 23rd International Workshop Cambridge, March 31- April 2, 2015, Revised Selected Papers, pp. 195-211, part of the Lecture Notes in Computer Science book series (LNCS, Vol. 9379), first online 25 November 2015, ISBN: 978-3-319-26095-2. The final publication is available at Springer via: https://link.springer.com/chapter/10.1007%2F978-3-319-26096-9_21v.Pico is a user authentication system that does not require remembering secrets. It is based on a personal handheld token that holds the user’s credentials and that is unlocked by a “personal aura” generated by digital accessories worn by the owner. The token, acting as prover, engages in a public-key-based authentication protocol with the verifier. What would happen to Pico if success of the mythical quantum computer meant secure public key primitives were no longer available, or if for other reasons such as energy consumption we preferred not to deploy them? More generally, what would happen under those circumstances to user authentication on the web, which relies heavily on public key cryptography through HTTPS/TLS? Although the symmetric-key-vs-public-key debate dates back to the 1990s, we note that the problematic aspects of public key deployment that were identified back then are still ubiquitous today. In particular, although public key cryptography is widely deployed on the web, revocation still doesn’t work. We discuss ways of providing desirable properties of public-key-based user authentication systems using symmetric-key primitives and tamperevident tokens. In particular, we present a protocol through which a compromise of the user credentials file at one website does not require users to change their credentials at that website or any other. We also note that the current prototype of Pico, when working in compatibility mode through the Pico Lens (i.e. with websites that are unaware of the Pico protocols), doesn’t actually use public key cryptography, other than that implicit in TLS. With minor tweaks we adopt this as the native mode for Pico, dropping public key cryptography and achieving much greater deployability without any noteworthy loss in security
1-(1-Carboxymethyl-1,4-anhydro-2,3-O-isopropylidene-α-d-erythrofuranosyl)thymine
X-Ray crystallography unequivocally determined the stereochemistry of the thymine base in the title compound, C14H18N2O7. The absolute stereochemistry was determined from the use of d-ribose as the starting material. There are two independent molecules in the asymmetric unit (Z′ = 2) which exist as N—H⋯O hydrogen-bonded pairs in the crystal structure
- …