183 research outputs found

    Evaluation of a Spyware Detection System Using Thin Client Computing

    Get PDF
    In previous work, we introduced a bait injection system designed to delude and detect crimeware by forcing it to reveal itself during the exploitation of monitored information. Although effective as a technique, our original system was practically limited, as it was implemented in a personal VM environment. In this paper, we extend our system by applying it to thin-clien to demonstrate how the approach can be used in a large-scale deployment. Adapting our system to such an environment revealed a number of challenging issues, such as scalability, portability, and choice of physical communication means. We provide implementation details, as well as experimental results that demonstrate the scalability and effectiveness of our system

    Phase transitions for suspension flows

    Full text link
    This paper is devoted to study thermodynamic formalism for suspension flows defined over countable alphabets. We are mostly interested in the regularity properties of the pressure function. We establish conditions for the pressure function to be real analytic or to exhibit a phase transition. We also construct an example of a potential for which the pressure has countably many phase transitions.Comment: Example 5.2 expanded. Typos corrected. Section 6.1 superced the note "Thermodynamic formalism for the positive geodesic flow on the modular surface" arXiv:1009.462

    COS-Speech: Protocol to develop a core outcome set for dysarthria after stroke for use in clinical practice and research

    Get PDF
    BACKGROUND: Dysarthria after stroke is when speech intelligibility is impaired, and this occurs in half of all stroke survivors. Dysarthria often leads to social isolation, poor psychological well-being and can prevent return to work and social lives. Currently, a variety of outcome measures are used in clinical research and practice when monitoring recovery for people who have dysarthria. When research studies use different measures, it is impossible to compare results from trials and delays our understanding of effective clinical treatments. The aim of this study is to develop a core outcome set (COS) to agree what aspects of speech recovery should be measured for dysarthria after stroke (COS-Speech) in research and clinical practice. METHODS: The COS-Speech study will include five steps: (1) development of a long list of possible outcome domains of speech that should be measured to guide the survey; (2) recruitment to the COS-Speech study of three key stakeholder groups in the UK and Australia: stroke survivors, communication researchers and speech and language therapists/pathologists; (3) two rounds of the Delphi survey process; (4) a consensus meeting to agree the speech outcomes to be measured and a follow-up consensus meeting to match existing instruments/measures (from parallel systematic review) to the agreed COS-Speech; (5) dissemination of COS-Speech. DISCUSSION: There is currently no COS for dysarthria after stroke for research trials or clinical practice. The findings from this research study will be a minimum COS, for use in all dysarthria research studies and clinical practice looking at post-stroke recovery of speech. These findings will be widely disseminated using professional and patient networks, research and clinical forums as well as using a variety of academic papers, videos, accessible writing such as blogs and links on social media. TRIAL REGISTRATION: COS-Speech is registered with the Core Outcome Measures in Effectiveness Trials (COMET) database, October 2021 https://www.comet-initiative.org/Studies/Details/1959. In addition, “A systematic review of the psychometric properties and clinical utility of instruments measuring dysarthria after stroke” will inform the consensus meeting to match measures to COS-Speech. The protocol for the systematic reviews registered with the International Prospective Register of Systematic Reviews. PROSPERO registration number: CRD42022302998. SUPPLEMENTARY INFORMATION: The online version contains supplementary material available at 10.1186/s13063-022-06958-7

    The Centurion 18 telescope of the Wise Observatory

    Full text link
    We describe the second telescope of the Wise Observatory, a 0.46-m Centurion 18 (C18) installed in 2005, which enhances significantly the observing possibilities. The telescope operates from a small dome and is equipped with a large-format CCD camera. In the last two years this telescope was intensively used in a variety of monitoring projects. The operation of the C18 is now automatic, requiring only start-up at the beginning of a night and close-down at dawn. The observations are mostly performed remotely from the Tel Aviv campus or even from the observer's home. The entire facility was erected for a component cost of about 70k$ and a labor investment of a total of one man-year. We describe three types of projects undertaken with this new facility: the measurement of asteroid light variability with the purpose of determining physical parameters and binarity, the following-up of transiting extrasolar planets, and the study of AGN variability. The successful implementation of the C18 demonstrates the viability of small telescopes in an age of huge light-collectors, provided the operation of such facilities is very efficient.Comment: 16 pages, 13 figures, some figures quality was degraded, accepted for publication in Astrophysics and Space Scienc

    Modeling User Search Behavior for Masquerade Detection

    Get PDF
    Masquerade attacks are a common security problem that is a consequence of identity theft. This paper extends prior work by modeling user search behavior to detect deviations indicating a masquerade attack. We hypothesize that each individual user knows their own file system well enough to search in a limited, targeted and unique fashion in order to find information germane to their current task. Masqueraders, on the other hand, will likely not know the file system and layout of another user's desktop, and would likely search more extensively and broadly in a manner that is different than the victim user being impersonated. We identify actions linked to search and information access activities, and use them to build user models. The experimental results show that modeling search behavior reliably detects all masqueraders with a very low false positive rate of 1.1%, far better than prior published results. The limited set of features used for search behavior modeling also results in large performance gains over the same modeling techniques that use larger sets of features

    Detecting genuine multipartite continuous-variable entanglement

    Get PDF
    We derive necessary conditions in terms of the variances of position and momentum linear combinations for all kinds of separability of a multi-party multi-mode continuous-variable state. Their violations can be sufficient for genuine multipartite entanglement, provided the combinations contain both conjugate variables of all modes. Hence a complete state determination, for example by detecting the entire correlation matrix of a Gaussian state, is not needed.Comment: 13 pages, 3 figure

    Circular orbits of corotating binary black holes: comparison between analytical and numerical results

    Get PDF
    We compare recent numerical results, obtained within a ``helical Killing vector'' (HKV) approach, on circular orbits of corotating binary black holes to the analytical predictions made by the effective one body (EOB) method (which has been recently extended to the case of spinning bodies). On the scale of the differences between the results obtained by different numerical methods, we find good agreement between numerical data and analytical predictions for several invariant functions describing the dynamical properties of circular orbits. This agreement is robust against the post-Newtonian accuracy used for the analytical estimates, as well as under choices of resummation method for the EOB ``effective potential'', and gets better as one uses a higher post-Newtonian accuracy. These findings open the way to a significant ``merging'' of analytical and numerical methods, i.e. to matching an EOB-based analytical description of the (early and late) inspiral, up to the beginning of the plunge, to a numerical description of the plunge and merger. We illustrate also the ``flexibility'' of the EOB approach, i.e. the possibility of determining some ``best fit'' values for the analytical parameters by comparison with numerical data.Comment: Minor revisions, accepted for publication in Phys. Rev. D, 19 pages, 6 figure

    The Southwest Pacific Ocean circulation and climate experiment (SPICE) : report to CLIVAR SSG

    Get PDF
    The Southwest Pacific Ocean Circulation and Climate Experiment (SPICE) is an international research program under the auspices of CLIVAR. The key objectives are to understand the Southwest Pacific Ocean circulation and the South Pacific Convergence Zone (SPCZ) dynamics, as well as their influence on regional and basin-scale climate patterns. South Pacific thermocline waters are transported in the westward flowing South Equatorial Current (SEC) toward Australia and Papua-New Guinea. On its way, the SEC encounters the numerous islands and straits of the Southwest Pacific and forms boundary currents and jets that eventually redistribute water to the equator and high latitudes. The transit in the Coral, Solomon, and Tasman Seas is of great importance to the climate system because changes in either the temperature or the amount of water arriving at the equator have the capability to modulate the El Nino-Southern Oscillation, while the southward transports influence the climate and biodiversity in the Tasman Sea. After 7 years of substantial in situ oceanic observational and modeling efforts, our understanding of the region has much improved. We have a refined description of the SPCZ behavior, boundary currents, pathways, and water mass transformation, including the previously undocumented Solomon Sea. The transports are large and vary substantially in a counter-intuitive way, with asymmetries and gating effects that depend on time scales. This paper provides a review of recent advancements and discusses our current knowledge gaps and important emerging research directions

    Algebraic entropy in locally linearly compact vector spaces

    Get PDF
    We introduce algebraic entropy for continuous endomorphisms of locally linearly compact vector spaces over a discrete field, as a natural extension of the algebraic entropy for endomorphisms of discrete vector spaces studied in Giordano Bruno and Salce (Arab J Math 1:69\u201387, 2012). We show that the main properties continue to hold in the general context of locally linearly compact vector spaces, in particular we extend the Addition Theorem
    • …
    corecore