81 research outputs found

    Embodied Emotion Modulates Neural Signature of Performance Monitoring

    Get PDF
    BACKGROUND:Recent research on the "embodiment of emotion" implies that experiencing an emotion may involve perceptual, somatovisceral, and motor feedback aspects. For example, manipulations of facial expression and posture appear to induce emotional states and influence how affective information is processed. The present study investigates whether performance monitoring, a cognitive process known to be under heavy control of the dopaminergic system, is modulated by induced facial expressions. In particular, we focused on the error-related negativity, an electrophysiological correlate of performance monitoring. METHODS/PRINCIPAL FINDINGS:During a choice reaction task, participants held a Chinese chop stick either horizontally between the teeth ("smile" condition) or, in different runs, vertically ("no smile") with the upper lip. In a third control condition, no chop stick was used ("no stick"). It could be shown on a separate sample that the facial feedback procedure is feasible to induce mild changes in positive affect. In the ERP sample, the smile condition, hypothesized to lead to an increase in dopaminergic activity, was associated with a decrease of ERN amplitude relative to "no smile" and "no stick" conditions. CONCLUSION:Embodying emotions by induced facial expressions leads to a changes in the neural correlates of error detection. We suggest that this is due to the joint influence of the dopaminergic system on positive affect and performance monitoring

    LICSTER -- A Low-cost ICS Security Testbed for Education and Research

    Full text link
    Unnoticed by most people, Industrial Control Systems (ICSs) control entire productions and critical infrastructures such as water distribution, smart grid and automotive manufacturing. Due to the ongoing digitalization, these systems are becoming more and more connected in order to enable remote control and monitoring. However, this shift bears significant risks, namely a larger attack surface, which can be exploited by attackers. In order to make these systems more secure, it takes research, which is, however, difficult to conduct on productive systems, since these often have to operate twenty-four-seven. Testbeds are mostly very expensive or based on simulation with no real-world physical process. In this paper, we introduce LICSTER, an open-source low-cost ICS testbed, which enables researchers and students to get hands-on experience with industrial security for about 500 Euro. We provide all necessary material to quickly start ICS hacking, with the focus on low-cost and open-source for education and research

    The breadcrumb forwarding service

    No full text

    Network monitoring system design

    No full text

    Congestion Control in a Reliable Scalable Message-Oriented Middleware

    No full text
    This paper presents congestion control mechanisms for reliable and scalable message-oriented middleware following the publish/subscribe communication model. We identify the key requirements of congestion control in this environment, how it differs from congestion control for the Internet, and propose a combination of two congestion control mechanisms, (1) driven by a publisher hosting broker (PDCC), (2) driven by a subscriber hosting broker (SDCC). SDCC decouples the notion of a receive window and a NACK window, and is used by subscriber hosting brokers in recovery mode. PDCC implements a scalable and low latency feedback loop between a publisher hosting broker and all subscriber hosting brokers, which is used to adjust the rate of publishing new messages, to allow brokers in recovery to eventually catch up, and other brokers to keep up. We present a detailed experimental evaluation of our implementation of these mechanisms in the Gryphon system by injecting network failures and link congestion

    Resilient Overlay Networks

    No full text
    A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications to detect and recover from path outages and periods of degraded performance within several seconds, improving over today’s wide-area routing protocols that take at least several minutes to recover. A RON is an application-layer overlay on top of the existing Internet routing substrate. The RON nodes monitor the functioning and quality of the Internet paths among themselves, and use this information to decide whether to route packets directly over the Internet or by way of other RON nodes, optimizing application-specific routing metrics. Results from two sets of measurements of a working RON deployed at sites scattered across the Internet demonstrate the benefits of our architecture. For instance, over a 64-hour sampling period in March 2001 across a twelve-node RON, there were 32 significant outages, each lasting over thirty minutes, over the 132 measured paths. RON’s routing mechanism was able to detect, recover, and route around all of them, in less than twenty seconds on average, showing that its methods for fault detection and recovery work well at discovering alternate paths in the Internet. Furthermore, RON was able to improve the loss rate, latency, or throughput perceived by data transfers; for example, about 5 % of the transfers doubled their TCP throughput and 5 % of our transfers saw their loss probability reduced by 0.05. We found that forwarding packets via at most one intermediate RON node is sufficient to overcome faults and improve performance in most cases. These improvements, particularly in the area of fault detection and recovery, demonstrate the benefits of moving some of the control over routing into the hands of end-systems
    corecore