39,948 research outputs found
Readers, readers, writers and engineers
Extended review of books <i>Knowledge, Power and Learning</i> and <i>Learning, Space and Identity</i>, both ed. Carrie Paechter et al., Paul Chapman Publishing (2001). ISBNs 0-769-6937-3 and 0-7619-6939-X
On residual finiteness of monoids, their SchĆ¼tzenberger groups and associated actions
RG was supported by an EPSRC Postdoctoral Fellowship EP/E043194/1 held at the University of St Andrews, Scotland.In this paper we discuss connections between the following properties: (RFM) residual finiteness of a monoid M ; (RFSG) residual finiteness of SchĆ¼tzenberger groups of M ; and (RFRL) residual finiteness of the natural actions of M on its Green's R- and L-classes. The general question is whether (RFM) implies (RFSG) and/or (RFRL), and vice versa. We consider these questions in all the possible combinations of the following situations: M is an arbitrary monoid; M is an arbitrary regular monoid; every J-class of M has finitely many R- and L-classes; M has finitely many left and right ideals. In each case we obtain complete answers, which are summarised in a table.PostprintPeer reviewe
Hermetically sealable package for hybrid solid-state electronic devices and the like
A light-weight, inexpensively fabricated, hermetically sealable, repairable package for small electronic or electromechanical units, having multiple connections, is described. A molded ring frame of polyamide-imide plastic (Torlon) is attached along one edge to a base plate formed of a highly heat conducting material, such as aluminum or copper. Bores are placed through a base plate within the area of the edge surface of ring frame which result in an attachment of the ring frame to the base plate during molding. Electrical leads are molded into the ring frame. The leads are L-shaped gold-plated copper wires imbedded within widened portions of the side wall of the ring frame. Within the plastic ring frame wall the leads are bent (typically, though not necessarily at 90 deg) so that they project into the interior volume of the ring frame for connection to the solid state devices
Managing Research Data: Gravitational Waves
The project which led to this report was funded by JISC in 2010ā2011 as part of its
āManaging Research Dataā programme, to examine the way in which Big Science data
is managed, and produce any recommendations which may be appropriate.
Big science data is different: it comes in large volumes, and it is shared and
exploited in ways which may differ from other disciplines. This project has explored
these differences using as a case-study Gravitational Wave data generated by the LSC,
and has produced recommendations intended to be useful variously to JISC, the funding
council (STFC) and the LSC community.
In Sect. 1 we deļ¬ne what we mean by ābig scienceā, describe the overall data
culture there, laying stress on how it necessarily or contingently differs from other
disciplines.
In Sect. 2 we discuss the beneļ¬ts of a formal data-preservation strategy, and the
cases for open data and for well-preserved data that follow from that. This leads to our
recommendations that, in essence, funders should adopt rather light-touch prescriptions
regarding data preservation planning: normal data management practice, in the areas
under study, corresponds to notably good practice in most other areas, so that the only
change we suggest is to make this planning more formal, which makes it more easily
auditable, and more amenable to constructive criticism.
In Sect. 3 we brieļ¬y discuss the LIGO data management plan, and pull together
whatever information is available on the estimation of digital preservation costs.
The report is informed, throughout, by the OAIS reference model for an open
archive. Some of the reportās ļ¬ndings and conclusions were summarised in [1].
See the document history on page 37
Fire extinguishing apparatus having a slidable mass for a penetrator nozzle
A fire extinguishing apparatus for delivering an extinguishing agent through a tarrier surrounding a structure into its interior includes an elongated tubular nozzle body which has a pointed penetrating head carried on one end of the tubular body. A source of extinguishing agent coupled to the opposite end of the tubular body is fed through and passes through passages adjacent the head for delivering the extinguishing agent to the interior of the structure. A slidable mass is carried on the tubular body on a remote end of the tubular body from the penetrating head. By manipulating the slidable mass and bringing such in contact with an abutment the force imparted to the tubular body causes the head to penetrate the structure
Prevention of arthritis by interleukin 10-producing B cells
In this study we have shown that activation of arthritogenic splenocytes with antigen and agonistic anti-CD40 gives raise to a B cell population that produce high levels of interleukin (IL)-10 and low levels of interferon (IFN)-{gamma}. Transfer of these B cells into DBA/1-TcR-Ć-Tg mice, immunized with bovine collagen (CII) emulsified in complete Freund's adjuvant inhibited T helper type 1 differentiation, prevented arthritis development, and was also effective in ameliorating established disease. IL-10 is essential for the regulatory function of this subset of B cells, as the B cells population isolated from IL-10 knockout mice failed to mediate this protective function. Furthermore, B cells isolated from arthritogenic splenocytes treated in vitro with antiāIL-10/antiāIL-10R were unable to protect recipient mice from developing arthritis. Our results suggest a new role of a subset of B cells in controlling T cell differentiation and autoimmune disorders
Advanced grid authorisation using semantic technologies - AGAST
Collaborative research requires flexible and fine-grained access control, beyond the common all-or-nothing access based purely on authentication. Existing systems can be hard to use, and do not lend themselves naturally to federation. We present an access-control architecture which builds on RDFs natural strength as an integration framework, which uses RDF scavenged from X.509 certificates, and policies expressed as ontologies and SPARQL queries, to provide flexible and distributed access control. We describe initial implementations
Semantic security: specification and enforcement of semantic policies for security-driven collaborations
Collaborative research can often have demands on finer-grained security that go beyond the authentication-only paradigm as typified by many e-Infrastructure/Grid based solutions. Supporting finer-grained access control is often essential for domains where the specification and subsequent enforcement of authorization policies is needed. The clinical domain is one area in particular where this is so. However it is the case that existing security authorization solutions are fragile, inflexible and difficult to establish and maintain. As a result they often do not meet the needs of real world collaborations where robustness and flexibility of policy specification and enforcement, and ease of maintenance are essential. In this paper we present results of the JISC funded Advanced Grid Authorisation through Semantic Technologies (AGAST) project (www.nesc.ac.uk/hub/projects/agast) and show how semantic-based approaches to security policy specification and enforcement can address many of the limitations with existing security solutions. These are demonstrated into the clinical trials domain through the MRC funded Virtual Organisations for Trials and Epidemiological Studies (VOTES) project (www.nesc.ac.uk/hub/projects/votes) and the epidemiological domain through the JISC funded SeeGEO project (www.nesc.ac.uk/hub/projects/seegeo)
Forensically-Sound Analysis of Security Risks of using Local Password Managers
Password managers have been developed to address the human challenges associated with password security, i.e., to solve usability issues in a secure way. They offer, e.g., features to create strong passwords, to manage the increasing number of passwords a typical user has, and to auto-fill passwords, sparing users the hassle of not only remembering but also typing them. Previous studies have focused mainly on the security analysis of cloud-based and browser-based password managers; security of local password managers remains mostly under-explored. This paper takes a forensic approach and reports on a case study of three popular local password managers: KeePass (v2.28), Password Safe (v3.35.1) and RoboForm (v7.9.12). Results revealed that either the master password or the content of the password database could be found unencrypted in Temp folders, Page files or Recycle bin, even after the applications had been closed. Therefore, an attacker or malware with temporary access to the computer on which the password managers were running may be able to steal sensitive information, even though these password managers are meant to keep the databases encrypted and protected at all times
Recommended from our members
VIPER : a 25-MHz, 100-MIPS peak VLIW micro-processor
This paper describes the design and implementation of a very long instruction word (VLIW) microprocessor. The VIPER (VLIW integer processor) contains four pipelined functional units, and can achieve 100 MIPS peak performance at 25 MHz. The procesor is capable of performing multiway branch operations, two load/store operations and up to four ALU operations in each clock cycle, with full register file access to each functional unit. VIPER is the first VLIW microprocessor known that can achieve this level of performance. Designed in twelve months, the processor is integrated with an instruction cache controller and a data cache, requiring 450,000 transistors and a die size of 12.9 by 9.1 mm in a 1.2 Āµm technology
- ā¦