2,859 research outputs found

    How useful are the stages of change for targeting interventions? randomized test of a brief intervention to reduce smoking

    Get PDF
    Objectives. To see whether the stages of change are useful for targeting a brief intervention to reduce smoking based on implementation intentions. A second objective was to rule out demand characteristics as an alternative explanation for the findings of intervention studies based on the transtheoretical model and implementation intentions. Design. Participants (N = 350) were randomized to a passive control condition (questionnaire only), active control condition (questionnaire-plus-instruction to plan to quit) or experimental condition (questionnaire, plan to quit, form an implementation intention). Their behavior and psychosocial orientation to quit were measured at baseline and 2-month follow-up. Main Outcome Measures. Theory of planned behavior variables, nicotine dependence and quitting. Results. Significantly more people quit smoking in the experimental condition than in the control conditions, and the planning instructions changed intention to quit and perceived control over quitting, but not behavior. Stage of change moderated these effects such that implementation intentions worked best for individuals who were in the preparation stage at baseline. Conclusion. Harnessing both motivational and volitional processes seems to enhance the effectiveness of smoking cessation programs, although further work is required to clarify inconsistencies in the literature using the stages of change.</p

    Nonmalleable Information Flow: Technical Report

    Full text link
    Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system. Unfortunately, it is too restrictive for real systems. Mechanisms for downgrading information are needed to capture real-world security requirements, but downgrading eliminates the strong compositional security guarantees of noninterference. We introduce nonmalleable information flow, a new formal security condition that generalizes noninterference to permit controlled downgrading of both confidentiality and integrity. While previous work on robust declassification prevents adversaries from exploiting the downgrading of confidentiality, our key insight is transparent endorsement, a mechanism for downgrading integrity while defending against adversarial exploitation. Robust declassification appeared to break the duality of confidentiality and integrity by making confidentiality depend on integrity, but transparent endorsement makes integrity depend on confidentiality, restoring this duality. We show how to extend a security-typed programming language with transparent endorsement and prove that this static type system enforces nonmalleable information flow, a new security property that subsumes robust declassification and transparent endorsement. Finally, we describe an implementation of this type system in the context of Flame, a flow-limited authorization plugin for the Glasgow Haskell Compiler

    OPTIMAL STOCKING OF RANGELAND FOR LIVESTOCK PRODUCTION WITHIN A DYNAMIC FRAMEWORK

    Get PDF
    A dynamic model is constructed and utilized to illustrate the interactions of several primary dynamic ecologic and economic relationships that are important in effective rangeland management. Within this context, the implications of various range management strategies are explored.Livestock Production/Industries,

    MANAGEMENT OF INTENSIVE FORAGE-BEEF PRODUCTION UNDER YIELD UNCERTAINTY

    Get PDF
    Forage production variability is incorporated into a decision theory framework for a beef producer in East Texas. The results suggest that the least risky, and also the most profitable, approach to intensive forage beef production is to plan for relatively poor weather conditions and low forage production. This results in a more diverse forage system and a smaller herd size than would be found optimal under the assumption of constant average forage production. These results also demonstrate that the assumption of constant average forage production may results in grossly exaggerated estimates of expected net returns.Livestock Production/Industries, Risk and Uncertainty,

    Economic Value of Groundwater Resources and Irrigated Agriculture in the Oklahoma Panhandle

    Get PDF
    An economic optimization model was developed using available groundwater resources in the Oklahoma Panhandle to estimate value of water for irrigated agriculture in the area. The model will serve as policy tool to analyze alternative water management strategies and conservation programs to assess the economic impact of depleting Ogallala Aquifer.Ogallala Aquifer, Irrigated Agriculture, Groundwater Conservation, Water Management Policy, Oklahoma Panhandle, Resource /Energy Economics and Policy,

    Implications of sperm banking for health-related quality of life up to 1 year after cancer diagnosis.

    Get PDF
    Sperm banking is recommended for all men diagnosed with cancer where treatment is associated with risk of long-term gonadatoxicity, to offer the opportunity of fatherhood and improved quality of life. However, uptake of sperm banking is lower than expected and little is known about why men refuse. Our aims were to determine: (i) demographic and medical variables associated with decisions about banking and (ii) differences in quality of life between bankers and non-bankers at diagnosis (Time 1 (T1)) and 1 year later (Time 2 (T2))

    JRIF: Reactive Information Flow Control for Java

    Get PDF
    A reactive information flow (RIF) automaton for a value v specifies (i) allowed uses for v and (ii) the RIF automaton for any value that might be directly or indirectly derived from v. RIF automata thus specify how transforming a value alters how the result might be used. Such labels are more expressive than existing approaches for controlling downgrading. We devised a type system around RIF automata and incorporated it into Jif, a dialect of Java that supports a classic form of labels for information flow. By implementing a compiler for the resulting JRIF language, we demonstrate how easy it is to replace a classic information-flow type system by a more expressive RIF-based type system. We programmed two example applications in JRIF, and we discuss insights they provide into the benefits of RIF-based security labels.Supported in part by AFOSR grants F9550-06-0019 and FA9550-11-1-0137, National Science Foundation grants 0430161, 0964409, and CCF-0424422 (TRUST), ONR grants N00014-01- 1-0968 and N00014-09-1-0652, and grants from Microsoft

    National counter-terrorism (C-T) policies and challenges to human rights and civil liberties: Case study of United Kingdom

    Get PDF
    In the UK the rise post-2005 in “home-grown” terrorism, relying to a significant extent on strikes on soft targets by “self-starters,” means that the search for effective preventive measures remains a continuing concern. Below a number of the preventive counter-terror measures adopted post-9/11, and incrementally strengthened in response to the current threat, are found to fall into three categories and represent interventions at the stages in the path toward attacks. This chapter focuses on selected examples of these preventive measures. In terms of three key stages, firstly, there is the attempt to prevent radicalization, under the “Prevent” strategy. A second strategy relies on taking certain measures to control the activities of those considered likely – on the balance of probabilities – to engage in terrorist-related activity. A third preventive strategy relies on the special terrorism offences under the Terrorism Acts 2000 and 2006, as amended, intended to allow for intervention at a very early stage in terrorist plots and in preparing or instigating terrorist acts (“precursor” offences)

    Automatic partitioning of database applications

    Get PDF
    Database-backed applications are nearly ubiquitous in our daily lives. Applications that make many small accesses to the database create two challenges for developers: increased latency and wasted resources from numerous network round trips. A well-known technique to improve transactional database application performance is to convert part of the application into stored procedures that are executed on the database server. Unfortunately, this conversion is often difficult. In this paper we describe Pyxis, a system that takes database-backed applications and automatically partitions their code into two pieces, one of which is executed on the application server and the other on the database server. Pyxis profiles the application and server loads, statically analyzes the code's dependencies, and produces a partitioning that minimizes the number of control transfers as well as the amount of data sent during each transfer. Our experiments using TPC-C and TPC-W show that Pyxis is able to generate partitions with up to 3x reduction in latency and 1.7x improvement in throughput when compared to a traditional non-partitioned implementation and has comparable performance to that of a custom stored procedure implementation.National Science Foundation (U.S.). Graduate Research Fellowshi

    Sound-Induced Flash Illusion is Resistant to Feedback Training

    Get PDF
    A single flash accompanied by two auditory beeps tends to be perceived as two flashes (Shams et al. Nature 408:788, 2000, Cogn Brain Res 14:147–152, 2002). This phenomenon is known as ‘sound-induced flash illusion.’ Previous neuroimaging studies have shown that this illusion is correlated with modulation of activity in early visual cortical areas (Arden et al. Vision Res 43(23):2469–2478, 2003; Bhattacharya et al. NeuroReport 13:1727–1730, 2002; Shams et al. NeuroReport 12(17):3849–3852, 2001, Neurosci Lett 378(2):76–81, 2005; Watkins et al. Neuroimage 31:1247–1256, 2006, Neuroimage 37:572–578, 2007; Mishra et al. J Neurosci 27(15):4120–4131, 2007). We examined how robust the illusion is by testing whether the frequency of the illusion can be reduced by providing feedback. We found that the sound-induced flash illusion was resistant to feedback training, except when the amount of monetary reward was made dependent on accuracy in performance. However, even in the latter case the participants reported that they still perceived illusory two flashes even though they correctly reported single flash. Moreover, the feedback training effect seemed to disappear once the participants were no longer provided with feedback suggesting a short-lived refinement of discrimination between illusory and physical double flashes rather than vanishing of the illusory percept. These findings indicate that the effect of sound on the perceptual representation of visual stimuli is strong and robust to feedback training, and provide further evidence against decision factors accounting for the sound-induced flash illusion
    corecore