Learn More
The systematic translation of cancer genomic data into knowledge of tumour biology and therapeutic possibilities remains challenging. Such efforts should be greatly aided by robust preclinical model systems that reflect the genomic diversity of human cancers and for which detailed genetic and pharmacological annotation is available. Here we describe the(More)
A rise in neck pain cases has initiated an exponential interest in the assessment and treatment of cervical spine range of motion (CROM). Experimental limitations, however, have been reported as therapists strive to collect continuous, dynamic data to aid prognosis. This technical report seeks to explore the viability of using inertial sensors to reliably(More)
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach to negotiating trust is for the participants to exchange access control policies to inform each other of the requirements for establishing trust. When a policy is received at(More)
This paper presents a formal verification algorithm for finding errors in models of concurrent systems. The algorithm improves explicit guided model checking by applying the empirical Bayes method to revise heuristic estimates of the distance from a given state to an error state. Guided search using the revised estimates finds errors with less search effort(More)
We present an incremental proof of the producer/consumer property for the PCI protocol. In the incremental proof, a corrected model of the multi-bus PCI 2.1 protocol is shown to be a refinement of the producer/consumer property. Multi-bus PCI must be corrected because the original PCI specification violates the producer/consumer property. The final model of(More)
The transaction ordering problem of the original PCI 2.1 standard bus speciication violates the desired correctness property of maintaining the so called`Producer/Consumer' relationship between writers and readers of data. This violation stems mainly from the so called completion stealing problem, rst identiied and solved by Corella et al 4], and supported(More)