Wireless Personal Communications - In cloud-assisted data outsourcing systems, the privacy of sensitive data is a major concern. Thus, data are uploaded in encrypted form in many cloud applications... 相似文献
Hyperproperties, such as non-interference and observational determinism, relate multiple computation traces with each other and are thus not monitorable by tools that consider computations in isolation. We present the monitoring approach implemented in the latest version of \(\text {RVHyper}\), a runtime verification tool for hyperproperties. The input to the tool are specifications given in the temporal logic \(\text {HyperLTL}\), which extends linear-time temporal logic (LTL) with trace quantifiers and trace variables. \(\text {RVHyper}\) processes execution traces sequentially until a violation of the specification is detected. In this case, a counterexample, in the form of a set of traces, is returned. \(\text {RVHyper}\) employs a range of optimizations: a preprocessing analysis of the specification and a procedure that minimizes the traces that need to be stored during the monitoring process. In this article, we introduce a novel trace storage technique that arranges the traces in a tree-like structure to exploit partially equal traces. We evaluate \(\text {RVHyper}\) on existing benchmarks on secure information flow control, error correcting codes, and symmetry in hardware designs. As an example application outside of security, we show how \(\text {RVHyper}\) can be used to detect spurious dependencies in hardware designs.
The Fourth Industrial Revolution – also known as Industry 4.0 (i4.0) – comprises the digitalisation of the industrial sector. This paper uses the theoretical lens of supply chain innovation (SCI) to investigate the implications of i4.0 on supply chain management. For these purposes, the method of structured content analysis is applied to more than 200 use cases of i4.0-enabled SCI introduced by both established and startup companies. i4.0-enabled SCI manifests along three dimensions: process, technology, and business architecture. The key findings of this study can be summarised as follows: first, i4.0-enabled SCI extends the initial focus on productivity improvements in SC processes towards scalability and flexibility. Second, extant i4.0 solutions rely mostly on analytics and smart things while omitting smart people technology and the human-centric approach associated with the i4.0 paradigm. Third, established companies adopt i4.0 merely to sustain their existing business architectures while startup companies radically change their operating models, relying heavily on data analytics and the platform economy. Consequently, established companies pursue a problem-driven, engineering-based approach to SCI while startup companies follow an ‘asset-light’, business-driven approach. Lastly, there are two distinct approaches to digitalising operational SC processes: platform-based crowdsourcing of standard processes and on-demand provision of customised services. 相似文献
Food Science and Biotechnology - In this study, we prepared hydrocolloid gels in which flaxseed gum (FSG), konjac glucomannan (KGM), and agar (AG) were blended in different ratios for use as a... 相似文献
Trenchless pipe replacement, or pipe bursting, is defined as the replacement of an original pipe by fragmenting the existing conduit and simultaneously installing product pipe in its place. In the static method of pipe replacement, the original pipe fails in tension by radial forces developed from the cone-shaped bursting head geometry that are applied to the pipe wall from within the pipe, as it is pulled or pushed through the existing pipe. The fragmented pieces are pressed into the surrounding soil as it is being displaced, thus creating a cavity for the product pipe. This paper presents a simplified model to calculate the maximum pull force (a function of the friction, bursting, and soil compression shear forces) required to be overcome to complete a static pipe-bursting pull. Based on site-specific information, the model provides an initial avenue for contractors, engineers, and manufacturers in planning successful trenchless pipe replacement projects. 相似文献
Fucose‐containing glycans mediate a variety of biological processes, but there is little information on reaction processes and mechanisms mediated by fucosyltransferases. We recently reported on fluorescently labeled GDP‐β‐L ‐fucose‐ATTO 550, which enabled monitoring of α1,3‐fucosyltransferase activity. Here we present an extension to the previously described results, based on the synthesis of a fluorescein‐isothiocyanate (FITC)‐labeled and two carboxyfluorescein‐labeled (FAM‐labeled) NDP‐β‐L ‐fucose derivatives, and applied all four compounds in labeling of different glycoproteins with the aid of four different fucosyltransferases. The labeling processes were analyzed by in‐gel fluorescence and fluorescence polarization measurements. Comparison with the ATTO‐labeled sugar revealed that the FITC‐labeled fucose was the best of these substrates, and that the bacterial enzyme HP‐FucT tolerated the fluorescent substrates better than human fucosyltransferases. 相似文献
MathLink is Wolfram Research?s protocol for communicating with the Mathematica Kernel and is used extensively in their own Notebook Frontends. The Mathematica Book insinuates that linking C programs with MathLink is straightforward but in practice there are quite a number of stumbling blocks, in particular in cross-language and cross-platform usage. This write-up tries to clarify the main issues and hopefully makes it easier for software authors to set up Mathematica interfacing in a portable way. 相似文献