Learn More
Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world. As applied to privacy, DIFC allows untrusted software to compute with private data while trusted security code controls the release of that data. As applied to(More)
We measured esophageal pressures, respiratory flow rates, and expired O2 and CO2 in six adult bottlenose dolphins (Tursiops truncatus) during voluntary breaths and maximal (chuff) respiratory efforts. The data were used to estimate the dynamic specific lung compliance (sCL), the O2 consumption rate (V̇O2 ) and CO2 production rates (V̇CO2 ) during rest. Our(More)
The accurate estimation of field metabolic rates (FMR) in wild animals is a key component of bioenergetic models, and is important for understanding the routine limitations for survival as well as individual responses to disturbances or environmental changes. Several methods have been used to estimate FMR, including accelerometer-derived activity budgets,(More)
Based on developmental biology's Rule of Normal Neighbors, we develop a new mechanism for spatial patterning, exhibiting spontaneous symmetry breaking, regeneration, and approximate scale invariance. The desired pattern is represented as a topological adjacency graph, yielding an energy function that cells minimize through local interactions. Combined with(More)
Today's Web depends on a particular pact between sites and users: sites invest capital and labor to create and market a set of features, and users gain access to these features by giving up control of their data (photos, personal information, creative musings, etc.). This paper imagines a very different Web ecosystem, in which users retain control of their(More)
In May of 2011, a live mass stranding of 26 short-finned pilot whales (Globicephala macrorhynchus) occurred in the lower Florida Keys. Five surviving whales were transferred from the original stranding site to a nearby marine mammal rehabilitation facility where they were constantly attended to by a team of volunteers. Bacteria cultured during the routine(More)
We present a secure service prototype built from untrusted, contributed code. The service manages private data for a variety of different users, and user programs frequently require access to other users' private data. However, aside from covert timing channels, no part of the service can corrupt private data or leak it between users or outside the system(More)
Today's Web depends on a particular pact between sites and users: sites invest capital and labor to create and market a set of features, and users gain access to these features by giving up control of their data (photos, personal information, creative musings, etc.). This paper imagines a very different Web ecosystem, in which users retain control of their(More)