Welcome to the UA Campus Repository, a service of the University of Arizona Libraries. The repository shares, archives and preserves unique digital materials from faculty, staff, students and affiliated contributors. Contact us at email@example.com with any questions.
- Posters and research papers from Class of 2019 PharmD graduates are now available in the Pharmacy Student Research Projects collection.
- Proceedings from the 2019 International Telemetering Conference are now available in the repository.
- OSIRIS-REx Science Implementation Plan materials are now available in the repository through the efforts of UAL Special Collections personnel and the OSIRIS-REx team.
- We're welcoming the Arizona State Museum to the UA Campus Repository, with the addition of the ASM Archaeological Series collection. Content from this series is currently being digitized, and we're excited to announce the public availability of "River of Change: Prehistory of the Middle Little Colorado River Valley, Arizona" at https://repository.arizona.edu/handle/10150/634831. Digitization of this collection is made possible by our colleagues at the University of Arizona Press, Special Collections and the Office of Digital Innovation & Stewardship at the University Libraries, and the Arizona State Museum.
- We celebrated International Open Access Week, October 21-27, by playing "The Game of Open Access" with library colleagues. Visit http://www.openaccessweek.org to learn about other international open access initiatives around the 2019 theme "Open for Whom? Equity in Open Knowledge"
- Have you heard about the UA Libraries' Open Access Investment Fund? The fund supports initiatives and projects that advance open access. It also supports institutional memberships with specific publishers; UA authors benefit from discounts on article processing charges.
- The UA Campus Repository has achieved the milestone of making more than 70,000 items publically available. The 70,000th item added to the repository was Bernice Ackerman's Characteristics of Summer Radar Echoes in Arizona, 1956, from the Institute of Atmospheric Physics Scientific Report series.
- The UA Faculty Publications collection now contains more than 6,000 articles contributed by faculty and researchers under the UA Open Access Policy passed by the UA Faculty Senate.
Communities in the UA Campus Repository
Select a community to browse its collections.
Analysis, Simulation, and Optimization of Stochastic Vesicle Dynamics in Synaptic TransmissionSynaptic transmission is the mechanism of information transfer from one neuron to another (or from a neuron to a muscle or to an endocrine cell). An important step in this physiological process is the stochastic release of neurotransmitter from vesicles that fuse with the presynaptic membrane and spill their contents into the synaptic cleft. We are concerned here with the formulation, analysis, and simulation of a mathematical model that describes the stochastic docking, undocking, and release of synaptic vesicles and their effect on synaptic signal transmission. The focus of this paper is on the parameter p(0), the probability of release for each docked vesicle when an action potential arrives. We study the influence of this parameter on the statistics of the release process and on the theoretical capability of the model synapse in reconstructing various desired outputs based on the timing and amount of neurotransmitter release. This theoretical capability is assessed by formulating and solving an optimal filtering problem. Methods for parameter identification are proposed and applied to simulated data. (c) 2019 Wiley Periodicals, Inc.
Code Obfuscation: Why is This Still a Thing?Early developments in code obfuscation were chiefly motivated by the needs of Digital Rights Management (DRM) . Other suggested applications included intellectual property protection of software  and code diversification to combat the monoculture problem of operating systems . Code obfuscation is typically employed in security scenarios where an adversary is in complete control over a device and the software it contains and can tamper with it at will. We call such situations the Man-At-The-End (MATE)  scenario. MATE scenarios are the best of all worlds for attackers and, consequently, the worst of all worlds for defenders: Not only do attackers have physical access to a device and can reverse engineer and tamper with it at their leisure, they often have unbounded resources (time, computational power, etc.) to do so. Defenders, on the other hand, are often severely constrained in the types of protective techniques available to them and the amount of overhead they can tolerate. In other words, there is an asymmetry between the constraints of attackers and defenders. Moreover, DRM is becoming less prevalent (songs for sale on the Apple iTunes Store are no longer protected by DRM, for example); there are new cryptographically-based obfuscation techniques  that promise provably secure obfuscation; secure enclaves  are making it into commodity hardware, providing a safe haven for security sensitive code; and recent advances in program analysis  and generic de-obfuscation  provide algorithms that render current code obfuscation techniques impotent. Thus, one may reasonably ask the question: "Is Code Obfuscation Still a Thing?" Somewhat surprisingly, it appears that the answer is yes. In a recent report, Gartner  lists 19 companies active in this space (8 of which were founded since 2010) and there are still (in 2017) many papers published on code obfuscation, code de-obfuscation, anti-tamper protection, reverse engineering, and related technologies. One of the reasons for this resurgence of code obfuscation as a protective technology is that, more and more, we are faced with applications where security-sensitive code needs to run on unsecured endpoints. In this talk we will show MATE attacks that appear in many novel and unlikely scenarios, including smart cars , smart meters , mobile applications such as Snapchat and smartphone games, Internet of Things applications , and ad blockers in web browsers . We will furthermore show novel code obfuscation techniques that increase the workload of attackers  and which, at least for a time, purport to restore the symmetry between attackers and defenders.
Growing Up: Greenhouse Designs for Urban SpacesWith the world heading towards a potential food crisis by the year 2050 we need to start looking at current solutions to future problems. One idea is to create more efficient greenhouses where more food can be grown in a smaller space and closer to population centers. By first understanding a brief history of the origins of greenhouses and their historic uses we can further our understanding of how to push these designs into a better future. By utilizing new construction materials, buildings designs, and growing methods, greenhouses may be able to help stem the need for additional agricultural land and food transport. Many companies are already creating urban farms but there is still room for improvement. This study takes a look at some basic ideas towards furthering this goal.