15,051 research outputs found

    Determination of species

    Get PDF
    There are no author-identified significant results in this report

    Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    Get PDF
    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples

    Effects of cosmic rays on single event upsets

    Get PDF
    Assistance was provided to the Brookhaven Single Event Upset (SEU) Test Facility. Computer codes were developed for fragmentation and secondary radiation affecting Very Large Scale Integration (VLSI) in space. A computer controlled CV (HP4192) test was developed for Terman analysis. Also developed were high speed parametric tests which are independent of operator judgment and a charge pumping technique for measurement of D(sub it) (E). The X-ray secondary effects, and parametric degradation as a function of dose rate were simulated. The SPICE simulation of static RAMs with various resistor filters was tested

    Hydrogen slush density reference system

    Get PDF
    A hydrogen slush density reference system was designed for calibration of field-type instruments and/or transfer standards. The device is based on the buoyancy principle of Archimedes. The solids are weighed in a low-mass container so arranged that solids and container are buoyed by triple-point liquid hydrogen during the weighing process. Several types of hydrogen slush density transducers were developed and tested for possible use as transfer standards. The most successful transducers found were those which depend on change in dielectric constant, after which the Clausius-Mossotti function is used to relate dielectric constant and density

    The effects of maribavir on the autophosphorylation of ganciclovir resistant mutants of the cytomegalovirus UL97 protein

    Get PDF
    BACKGROUND: The UL97 protein kinase of human cytomegalovirus phosphorylates the antiviral drug ganciclovir and is the target of maribavir action. A detailed enzyme kinetic analysis of maribavir on the various enzymatic functions of wild type and ganciclovir resistant forms of UL97 is required. METHODS: Wild type and site directed mutant forms of the human cytomegalovirus UL97 gene product were expressed using recombinant baculoviruses and the purified products used to assess the effects of maribavir on the ganciclovir (GCV) kinase and protein kinase (PK) activities. RESULTS: Maribavir was a potent inhibitor of the autophosporylation of the wild type and all the major GCV resistant UL97 mutants analysed (M460I, H520Q, A594V and L595F) with a mean IC50 of 35 nM. The M460I mutation resulted in hypersensitivity to maribavir with an IC50 of 4.8 nM. A maribavir resistant mutant of UL97 (L397R) was functionally compromised as both a GCV kinase and a protein kinase (~ 10% of wild type levels). Enzyme kinetic experiments demonstrated that maribavir was a competitive inhibitor of ATP with a Ki of 10 nM. DISCUSSION: Maribavir is a potent competitive inhibitor of the UL97 protein kinase function and shows increased activity against the M460I GCV-resistant mutant which may impact on the management of GCV drug resistance in patients

    Mo Músaem Fíorúil: a web-based search and information service for museum visitors

    Get PDF
    Abstract. We describe the prototype of an interactive, web-based, museum artifact search and information service. Mo Músaem Fíorúil clusters and indexes images of museum artifacts taken by visitors to the museum where the images are captured using a passive capture device such as Microsoft's SenseCam [1]. The system also matches clustered artifacts to images of the same artifact from the museums o cial photo collection and allows the user to view images of the same artifact taken by other visitors to the museum. This matching process potentially allows the system to provide more detailed information about a particular artifact to the user based on their inferred preferences, thereby greatly enhancing the user's overall museum experience. In this work, we introduce the system and describe, in broad terms, it's overall functionality and use. Using different image sets of artificial museum objects, we also describe experiments and results carried out in relation to the artifact matching component of the system

    Deduction with XOR Constraints in Security API Modelling

    Get PDF
    We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module. We also show how our technique can be applied to standard security protocols

    Adapting a Remote Laboratory Architecture to Support Collaboration and Supervision

    Get PDF
    Interest in, and use of, remote laboratories has been rapidly growing. These laboratories provide remote access, via the internet, to real laboratory equipment. Under appropriate circumstances they can support or even replace traditional (proximal) laboratories, provide improved access at reduced cost, and encourage inter-institutional sharing of expensive resources. Most attention to date has been on the development of the core infrastructure that manages access and interaction, and to a lesser extent consideration of pedagogic issues such as which learning outcomes are best suited to this modality. There has however been a recent recognition of the importance of also considering how collaboration and supervision can also be supported. In this paper we discuss a novel approach to the integration of support for multi-user distributed access to a single laboratory instance. The approach retains the benefits of the lightweight client inherent in the underlying architecture

    AdS/CFT and the Information Paradox

    Get PDF
    The information paradox in the quantum evolution of black holes is studied within the framework of the AdS/CFT correspondence. The unitarity of the CFT strongly suggests that all information about an initial state that forms a black hole is returned in the Hawking radiation. The CFT dynamics implies an information retention time of order the black hole lifetime. This fact determines many qualitative properties of the non-local effects that must show up in a semi-classical effective theory in the bulk. We argue that no violations of causality are apparent to local observers, but the semi-classical theory in the bulk duplicates degrees of freedom inside and outside the event horizon. Non-local quantum effects are required to eliminate this redundancy. This leads to a breakdown of the usual classical-quantum correspondence principle in Lorentzian black hole spacetimes.Comment: 16 pages, harvmac, reference added, minor correction

    Extracting Spooky-activation-at-a-distance from Considerations of Entanglement

    Get PDF
    Following an early claim by Nelson & McEvoy \cite{Nelson:McEvoy:2007} suggesting that word associations can display `spooky action at a distance behaviour', a serious investigation of the potentially quantum nature of such associations is currently underway. This paper presents a simple quantum model of a word association system. It is shown that a quantum model of word entanglement can recover aspects of both the Spreading Activation equation and the Spooky-activation-at-a-distance equation, both of which are used to model the activation level of words in human memory.Comment: 13 pages, 2 figures; To appear in Proceedings of the Third Quantum Interaction Symposium, Lecture Notes in Artificial Intelligence, vol 5494, Springer, 200
    corecore