skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


This content will become publicly available on August 1, 2025

Title: Langshaw: Declarative Interaction Protocols Based on Sayso and Conflict
Current languages for specifying multiagent protocols either over-constrain protocol enactments or complicate capturing their meanings. We propose Langshaw, a declarative protocol language based on (1) sayso, a new construct that captures who has priority over setting each attribute, and (2) nono and nogo, two constructs to capture conflicts between actions. Langshaw combines flexibility with an information model to express meaning. We give a formal semantics for Langshaw, procedures for determining the safety and liveness of a protocol, and a method to generate a message-oriented protocol (embedding needed coordination) suitable for flexible asynchronous enactment.  more » « less
Award ID(s):
1908374
PAR ID:
10538051
Author(s) / Creator(s):
; ;
Publisher / Repository:
International Joint Conferences on Artificial Intelligence Organization
Date Published:
Volume:
30
ISBN:
978-1-956792-04-1
Page Range / eLocation ID:
202 to 210
Format(s):
Medium: X
Location:
Jeju, South Korea
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract Three‐dimensional cell encapsulation has rendered itself a staple in the tissue engineering field. Using recombinantly engineered, biopolymer‐based hydrogels to encapsulate cells is especially promising due to the enhanced control and tunability it affords. Here, we describe in detail the synthesis of our hyaluronan (i.e., hyaluronic acid) and elastin‐like protein (HELP) hydrogel system. In addition to validating the efficacy of our synthetic process, we also demonstrate the modularity of the HELP system. Finally, we show that cells can be encapsulated within HELP gels over a range of stiffnesses, exhibit strong viability, and respond to stiffness cues. © 2023 Wiley Periodicals LLC. Basic Protocol 1: Elastin‐like protein modification with hydrazine Basic Protocol 2: Nuclear magnetic resonance quantification of elastin‐like protein modification with hydrazine Basic Protocol 3: Hyaluronic acid–benzaldehyde synthesis Basic Protocol 4: Nuclear magnetic resonance quantification of hyaluronic acid–benzaldehyde Basic Protocol 5: 3D cell encapsulation in hyaluronan elastin‐like protein gels 
    more » « less
  2. Reverse proxy servers play a critical role in optimizing Internet services, offering benefits ranging from load balancing to Denial of Service (DoS) protection. A known shortcoming of such proxies is that the backend server becomes oblivious to the IP address of the client who initiated the connection since all requests are forwarded by the proxy server. For HTTP, this issue is trivially solved by the X-Forwarded-For header, which allows the proxy server to pass to the backend server the IP address of the client that originated the request. Unfortunately, no such equivalent exists for many other protocols. To solve this issue, HAProxy created the PROXY protocol, which communicates client information from a proxy server to a backend server at a lower level in the network stack (Layer 4), making it protocol agnostic. In this work, we are the first to study the use of the PROXY protocol at Internet scale and investigate the security impact of its misconfigurations. We launched a measurement study on the full IPv4 address range and found that, over HTTP, more than 170,000 hosts accept PROXY protocol data from arbitrary sources. We demonstrate how to abuse this protocol to bypass onpath proxies (and their protections) and leak sensitive information from backend infrastructures. We discovered over 10,000 servers that are vulnerable to an access bypass, triggered by injecting a (spoofed) PROXY protocol header. Using this technique, we obtained access to over 500 internal servers providing control over IoT monitoring platforms and smart home automation devices, allowing us to, for example, regulate remote controlled window blinds or control security cameras and alarm systems. Beyond HTTP, we demonstrate how the PROXY protocol can be used to turn over 350 SMTP servers into open relays, enabling an attacker to send arbitrary emails from any email address. In sum, our study exposes how PROXY protocol misconfigurations lead to severe security issues that affect multiple protocols prominently used in the wild. 
    more » « less
  3. Abstract Promoters and the noncoding sequences that drive their function are fundamental aspects of genes that are critical to their regulation. The transcription preinitiation complex binds and assembles on promoters where it facilitates transcription. The transcription start site (TSS) is located downstream of the promoter sequence and is defined as the location in the genome where polymerase begins transcribing DNA into RNA. Knowing the location of TSSs is useful for annotation of genes, identification of non‐coding sequences important to gene regulation, detection of alternative TSSs, and understanding of 5′ UTR content. Several existing techniques make it possible to accurately identify TSSs, but are often difficult to perform experimentally, require large amounts of input RNA, or are unable to identify a large number of TSSs from a single sample. Many of these protocols take advantage of template switching reverse transcriptases (TSRTs), which reliably place an adaptor at the 5′ end of a first strand synthesis of cDNA. Here, we introduce a protocol that exploits TSRT activity combined with rolling circle amplification to identify TSSs with several unique advantages over existing methods. Sequence adaptors are placed on the 5′ and 3′ end of the full‐length cDNA copy of a transcript. A splint compatible with those adaptors is then used to circularize the full‐length cDNA. Linear DNA containing concatemers of the cDNA are generated using rolling circle amplification, and a sequencing library is formed by fragmenting the concatemers. This protocol is straightforward to execute, requiring limited bench time with relatively stable reagents. Using extremely low amounts of RNA input, this protocol produces large numbers of accurate, deduplicated TSSs genome wide. © 2023 The Authors. Current Protocols published by Wiley Periodicals LLC. Basic Protocol 1: Splint generation Basic Protocol 2: RNA extraction Basic Protocol 3: cDNA synthesis Basic Protocol 4: cDNA circularization and amplification Basic Protocol 5: Library generation 
    more » « less
  4. Twin-field QKD (TF-QKD) protocols allow for increased key rates over long distances when compared to standard QKD protocols. They are even able to surpass the PLOB bound without the need for quantum repeaters. In this work, we revisit a previous TF-QKD protocol and derive a new, simple, proof of security for it. We also look at several variants of the protocol and investigate their performance, showing some interesting behaviors due to the asymmetric nature of the protocol. 
    more » « less
  5. Abstract Fluorescence fluctuation spectroscopy (FFS) encompasses a bevy of techniques that involve analyzing fluorescence intensity fluctuations occurring due to fluorescently labeled molecules diffusing in and out of a microscope's focal region. Statistical analysis of these fluctuations may reveal the oligomerization (i.e., association) state of said molecules. We have recently developed a new FFS‐based method, termed Two‐Dimensional Fluorescence Intensity Fluctuation (2D FIF) spectrometry, which provides quantitative information on the size and stability of protein oligomers as a function of receptor concentration. This article describes protocols for employing FIF spectrometry to quantify the oligomerization of a membrane protein of interest, with specific instructions regarding cell preparation, image acquisition, and analysis of images given in detail. Application of the FIF Spectrometry Suite, a software package designed for applying FIF analysis on fluorescence images, is emphasized in the protocol. Also discussed in detail is the identification, removal, and/or analysis of inhomogeneous regions of the membrane that appear as bright spots. The 2D FIF approach is particularly suited to assess the effects of agonists and antagonists on the oligomeric size of membrane receptors of interest. © 2022 Wiley Periodicals LLC. Basic Protocol 1: Preparation of live cells expressing protein constructs Basic Protocol 2: Image acquisition and noise correction Basic Protocol 3: Drawing and segmenting regions of interest Basic Protocol 4: Calculating the molecular brightness and concentration of individual image segments Basic Protocol 5: Combining data subsets using a manual procedure (Optional) Alternate Protocol 1: Combining data subsets using the advanced FIF spectrometry suite (Optional; alternative to Basic Protocol 5) Basic Protocol 6: Performing meta‐analysis of brightness spectrograms Alternate Protocol 2: Performing meta‐analysis of brightness spectrograms (alternative to Basic Protocol 6) Basic Protocol 7: Spot extraction and analysis using a manual procedure or by writing a program (Optional) Alternate Protocol 3: Automated spot extraction and analysis (Optional; alternative to Protocol 7) Support Protocol: Monomeric brightness determination 
    more » « less