8,396 research outputs found
Software that Learns from its Own Failures
All non-trivial software systems suffer from unanticipated production
failures. However, those systems are passive with respect to failures and do
not take advantage of them in order to improve their future behavior: they
simply wait for them to happen and trigger hard-coded failure recovery
strategies. Instead, I propose a new paradigm in which software systems learn
from their own failures. By using an advanced monitoring system they have a
constant awareness of their own state and health. They are designed in order to
automatically explore alternative recovery strategies inferred from past
successful and failed executions. Their recovery capabilities are assessed by
self-injection of controlled failures; this process produces knowledge in
prevision of future unanticipated failures
Social dilemmas, time preferences and technology adoption in a commons problem
Agents interacting on a body of water choose between technologies to catch fish. One is harmless to the resource, as it allows full recovery; the other yields high immediate catches, but low(er) future catches. Strategic interaction in one 'objective'resource game may induce several 'subjective' games in the class of social dilemmas. Which unique 'subjective'game is actually played depends crucially on how the agents discount their future payo¤s. We examine equilibrium behavior and its consequences on sustainability of the common-pool resource system under exponential and hyperbolic discounting. A sufficient degree of patience on behalf of the agents may lead to equilibrium behavior averting exhaustion of the resource, though full restraint (both agents choosing the ecologically or environmentally sound technology) is not necessarily achieved. Furthermore, if the degree of patience between agents is sufficiently dissimilar, the more patient is exploited by the less patient one in equilibrium. We demonstrate the generalizability of our approach developed throughout the paper. We provide recommendations to reduce the enormous complexity surrounding the general cases
How Equine-Facilitated Psychotherapy Addresses Military Sexual Trauma among Female Veterans: Systematic Review
There were roughly 5, 061 reports of MST since the Department of Defense\u27s (DOD) fiscal year of 2012. The DOD believes that MST is vastly under reported and estimates that less than 20% of sexual assaults have been reported over the past seven years. The research question for this systematic literature review was: In what ways does equine-facilitated psychotherapy (EFP) address military sexual trauma (MST) among female veterans? Levels of publication utilized in this systematic review included peer-reviewed articles, gray literature, and dissertations. Types of studies included in this systematic review include empirically supported studies and qualitative and quantitative studies. The key search terms included: military, sexual trauma, sexual assault, rape, veterans, women, equine-facilitated therapy, equine-assisted therapy, equine, horse, holistic, therapy, animal, animal assisted therapy, equine-assisted learning, equine-facilitated learning, animal-assisted interventions, MST, mind-body, trauma-informed, complementary therapy, and integrative therapy. Primary findings included: EFP decreased PTSD symptomology through mindfulness, EFP improved relational functioning, EFP led to mind-body reintegration, EFP improved the therapeutic encounter, and EFP led to recovery and empowerment. The systematic review illuminated that equine-facilitated psychotherapy is a non-traditional form of therapy that may be appealing, and relevant, to female veteran survivors of MST who may otherwise not be amenable to traditional talk therapy. Equines are arguably more effective than other animals when it comes to therapeutic interventions with female survivors of MST. Mounted work could be considered one of the most powerful, movement-based therapies for sexual trauma due to the unique circumstances of riding
Recommended from our members
Binary-level Function Profiling for Intrusion Detection and Smart Error Virtualization
Most current approaches to self-healing software (SHS) suffer from semantic incorrectness of the response mechanism. To support SHS, we propose Smart Error Virtualization (SEV), which treats functions as transactions but provides a way to guide the program state and remediation to be a more correct value than previous work. We perform runtime binary-level profiling on unmodified applications to learn both good return values and error return values (produced when the program encounters ``bad'' input). The goal is to ``learn from mistakes'' by converting malicious input to the program's notion of ``bad'' input. We introduce two implementations of this system that support three major uses: function profiling for regression testing, function profiling for host-based anomaly detection (environment-specialized fault detection), and function profiling for automatic attack remediation via SEV. Our systems do not require access to the source code of the application to enact a fix. Finally, this paper is, in part, a critical examination of error virtualization in order to shed light on how to approach semantic correctness
ENSURING SPECIFICATION COMPLIANCE, ROBUSTNESS, AND SECURITY OF WIRELESS NETWORK PROTOCOLS
Several newly emerged wireless technologies (e.g., Internet-of-Things, Bluetooth, NFC)—extensively backed by the tech industry—are being widely adopted and have resulted in a proliferation of diverse smart appliances and gadgets (e.g., smart thermostat, wearables, smartphones), which has ensuingly shaped our modern digital life. These technologies include several communication protocols that usually have stringent requirements stated in their specifications. Failing to comply with such requirements can result in incorrect behaviors, interoperability issues, or even security vulnerabilities. Moreover, lack of robustness of the protocol implementation to malicious attacks—exploiting subtle vulnerabilities in the implementation—mounted by the compromised nodes in an adversarial environment can limit the practical utility of the implementation by impairing the performance of the protocol and can even have detrimental effects on the availability of the network. Even having a compliant and robust implementation alone may not suffice in many cases because these technologies often expose new attack surfaces as well as new propagation vectors, which can be exploited by unprecedented malware and can quickly lead to an epidemic
The Impact of Trauma on Young Children/The Effect of Animal-Assisted Intervention on Young Children with Trauma
The purpose of this study is to determine the impact of trauma on the development of young children. This study will define trauma and its symptoms, determine the effect of trauma on the brain and critical development, and identify strategies and interventions.
The purpose of this study is to identify the effects of Animal-Assisted Intervention (AAI) on young children with trauma. This study will define AAI and determine if animals are an appropriate therapy for young children
08141 Abstracts Collection -- Organic Computing - Controlled Self-organization
From March 30th to April 4th 2008, the Dagstuhl Seminar 08141 "Organic Computing - Controlled Self-organization"\u27 was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl.
During the seminar, several participants presented their current
research, and ongoing work and open problems were discussed. Abstracts of
the presentations given during the seminar as well as abstracts of
seminar results and ideas are put together in this paper. The first section
describes the seminar topics and goals in general.
Links to extended abstracts or full papers are provided, if available
Automatic Software Repair: a Bibliography
This article presents a survey on automatic software repair. Automatic
software repair consists of automatically finding a solution to software bugs
without human intervention. This article considers all kinds of repairs. First,
it discusses behavioral repair where test suites, contracts, models, and
crashing inputs are taken as oracle. Second, it discusses state repair, also
known as runtime repair or runtime recovery, with techniques such as checkpoint
and restart, reconfiguration, and invariant restoration. The uniqueness of this
article is that it spans the research communities that contribute to this body
of knowledge: software engineering, dependability, operating systems,
programming languages, and security. It provides a novel and structured
overview of the diversity of bug oracles and repair operators used in the
literature
I-BaR: Integrated Balance Rehabilitation Framework
Neurological diseases are observed in approximately one billion people
worldwide. A further increase is foreseen at the global level as a result of
population growth and aging. Individuals with neurological disorders often
experience cognitive, motor, sensory, and lower extremity dysfunctions. Thus,
the possibility of falling and balance problems arise due to the postural
control deficiencies that occur as a result of the deterioration in the
integration of multi-sensory information. We propose a novel rehabilitation
framework, Integrated Balance Rehabilitation (I-BaR), to improve the
effectiveness of the rehabilitation with objective assessment, individualized
therapy, convenience with different disability levels and adoption of an
assist-as-needed paradigm and, with an integrated rehabilitation process as a
whole, i.e., ankle-foot preparation, balance, and stepping phases,
respectively. Integrated Balance Rehabilitation allows patients to improve
their balance ability by providing multi-modal feedback: visual via utilization
of Virtual Reality; vestibular via anteroposterior and mediolateral
perturbations with the robotic platform; proprioceptive via haptic feedback.Comment: 37 pages, 2 figures, journal pape
- …