15,632 research outputs found

    Current and potential distributions of three non-native invasive plants in the contiguous USA

    Get PDF
    Biological invasions pose a serious threat to biodiversity, but monitoring for invasive species is time consuming and costly. Understanding where species have the potential to invade enables land managers to focus monitoring efforts. In this paper, we compared two simple types of models to predict the potential distributions of three non-native invasive plants (Geranium robertianum, Hedera spp., and Ilex aquifolium) in the contiguous USA. We developed models based on the climatic requirements of the species as reported in the literature (literature-based) and simple climate envelope models based on the climate where the species already occur (observation-based). We then compared the results of these models with the current species distributions. Most models accurately predicted occurrences, but overall accuracy was often low because these species have not yet spread throughout their potential ranges. However, literature-based models for Geranium and observation-based models for Ilex illustrated potential problems with the methodology. Although neither model type produced accurate predictions in all cases, comparing the two methods with each other and with the current species distributions provided rough estimates of the potential habitat for each species. More importantly, this methodology raised specific questions for further research to increase our understanding of invasion patterns of these species. Although these types of models do not replace more rigorous modeling techniques, we suggest that this methodology can be an important early step in understanding the potential distributions of non-native species and can allow managers of natural areas to be aware of potential invaders and implement early detection

    Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection

    Full text link
    Recent studies observe that app foreground is the most striking component that influences the access control decisions in mobile platform, as users tend to deny permission requests lacking visible evidence. However, none of the existing permission models provides a systematic approach that can automatically answer the question: Is the resource access indicated by app foreground? In this work, we present the design, implementation, and evaluation of COSMOS, a context-aware mediation system that bridges the semantic gap between foreground interaction and background access, in order to protect system integrity and user privacy. Specifically, COSMOS learns from a large set of apps with similar functionalities and user interfaces to construct generic models that detect the outliers at runtime. It can be further customized to satisfy specific user privacy preference by continuously evolving with user decisions. Experiments show that COSMOS achieves both high precision and high recall in detecting malicious requests. We also demonstrate the effectiveness of COSMOS in capturing specific user preferences using the decisions collected from 24 users and illustrate that COSMOS can be easily deployed on smartphones as a real-time guard with a very low performance overhead.Comment: Accepted for publication in IEEE INFOCOM'201

    The Santa Clara, 2018-10-11

    Get PDF
    https://scholarcommons.scu.edu/tsc/1076/thumbnail.jp
    • …
    corecore