1,775 research outputs found
A Centralized Mechanism to Make Predictions Based on Data From Multiple WSNs
In this work, we present a method that exploits a scenario with
inter-Wireless Sensor Networks (WSNs) information exchange by making
predictions and adapting the workload of a WSN according to their outcomes. We
show the feasibility of an approach that intelligently utilizes information
produced by other WSNs that may or not belong to the same administrative
domain. To illustrate how the predictions using data from external WSNs can be
utilized, a specific use-case is considered, where the operation of a WSN
measuring relative humidity is optimized using the data obtained from a WSN
measuring temperature. Based on a dedicated performance score, the simulation
results show that this new approach can find the optimal operating point
associated to the trade-off between energy consumption and quality of
measurements. Moreover, we outline the additional challenges that need to be
overcome, and draw conclusions to guide the future work in this field.Comment: 10 pages, simulation results and figures. Published i
Computer-aided proofs for multiparty computation with active security
Secure multi-party computation (MPC) is a general cryptographic technique
that allows distrusting parties to compute a function of their individual
inputs, while only revealing the output of the function. It has found
applications in areas such as auctioning, email filtering, and secure
teleconference. Given its importance, it is crucial that the protocols are
specified and implemented correctly. In the programming language community it
has become good practice to use computer proof assistants to verify correctness
proofs. In the field of cryptography, EasyCrypt is the state of the art proof
assistant. It provides an embedded language for probabilistic programming,
together with a specialized logic, embedded into an ambient general purpose
higher-order logic. It allows us to conveniently express cryptographic
properties. EasyCrypt has been used successfully on many applications,
including public-key encryption, signatures, garbled circuits and differential
privacy. Here we show for the first time that it can also be used to prove
security of MPC against a malicious adversary. We formalize additive and
replicated secret sharing schemes and apply them to Maurer's MPC protocol for
secure addition and multiplication. Our method extends to general polynomial
functions. We follow the insights from EasyCrypt that security proofs can be
often be reduced to proofs about program equivalence, a topic that is well
understood in the verification of programming languages. In particular, we show
that in the passive case the non-interference-based definition is equivalent to
a standard game-based security definition. For the active case we provide a new
NI definition, which we call input independence
The intron-containing gene for yeast profilin (PFY) encodes a vital function
The gene coding for profilin (PFY), an actin-binding protein, occurs as a single copy in the haploid genome of Saccharomyces cerevisiae and is required for spore germination and cell viability. Displacement of one gene copy in a diploid cell by a nonfunctional allele is recessively lethal: tetrad analysis yields only two viable spores per ascus. The PFY gene maps on chromosome XV and is linked to the ADE2 marker. The primary transcript of about 1,000 bases contains an intron of 209 bases and is spliced into a messenger of about 750 bases. The intron was identified by comparison with a cDNA clone, which also revealed the 3' end of the transcript. The 5' end of the mRNA was mapped by primer elongation. The gene is transcribed constitutively and has a coding capacity for a protein of 126 amino acids. The deduced molecular weight o
The impact of a dedicated training program for oral examiners at a medical school in Germany: a survey among participants from operative and non-operative disciplines
BACKGROUND: Oral examinations have been a crucial format in ancient and modern assessment to evaluate and guarantee quality of medical education and thereby to secure patient safety. To achieve a high level of quality in the oral part of the final examination of medical students, a training program for oral examiners at the Medical Faculty of Ulm (Germany) has been established since 2007. However, little is known about the attitude of the examiners in regard to the impact of this training program and of oral examinations as instruments to ensure patient safety. METHODS: All 367 academic clinicians from operative and non-operative disciplines, attending the one-day examiner training program at the University of Ulm between 2007 and 2012 have been asked to answer an online survey (EvaSys 5.0). Focus of the survey was to find out in which respect the examiners profited from the trainings, if the training effects were discipline-dependent, and to which degree the oral examinations could contribute to patient safety. Statistical analysis was performed using the t-test for independent samples. Results were considered statistically significant when p < 0.05. RESULTS: A total of 63 participants answered the survey, but in 4 cases the questionnaire was not fully completed (with single items missing). More than half of the study participants (n = 34/59; 58%) have experienced (at least sometimes or rarely) candidates that they deemed incompetent and perhaps even dangerous to the patients’ health who nevertheless passed the oral exam successfully. The majority of participants were convinced that oral examinations using concrete clinical cases could significantly contribute to patient safety, if grading is based on clear criteria and if examinations as well as grading are performed more critically. The impact of the training program was rated significantly stronger by surgeons than by non-surgeons in several categories. These categories included “strengths and weaknesses of oral examinations”, “reliability”, “validity”, “competence in grading”, “critical grading”, and “departmental improvements” concerning oral examinations. CONCLUSIONS: In respect to patient safety, it seems crucial to prevent incompetent candidates from passing the oral examination. The present study indicates the importance to continue and to develop our examiner trainings, with main emphasis on concrete clinical problems and a criteria-based critical grading system for oral examinations. Since the impact of the training was particularly high for colleagues from the operative disciplines, the training program should be offered especially in surgical departments
- …
