237 research outputs found

    Mental Representations Constructed by Experts and Novices in Object-Oriented Program Comprehension

    Get PDF
    Previous studies on program comprehension were carried out largely in the context of procedural languages. Our purpose is to develop and evaluate a cognitive model of object-oriented (OO) program understanding. Our model is based on the van Dijk and Kintsch's model of text understanding (1983). One key aspect of this theoretical approach is the distinction between two kinds of representation the reader might construct from a text: the textbase and the situation model. On the basis of results of an experiment we have conducted, we evaluate the cognitive validity of this distinction in OO program understanding. We examine how the construction of these two representations is differentially affected by the programmer's expertise and how they evolve differentially over time

    The grinch who stole wisdom

    Get PDF
    Dr. Seuss is wise. How the Grinch Stole Christmas (Seuss, 1957) could serve as a parable for our time. It can also be seen as a roadmap for the development of contemplative wisdom. The abiding popularity of How the Grinch Stole Christmas additionally suggests that contemplative wisdom is more readily available to ordinary people, even children, than is normally thought. This matters because from the point of view of contemplatives in any of the world's philosophies or religions, people are confused about wisdom. The content of the nascent field of wisdom studies, they might say, is largely not wisdom at all but rather what it's like to live in a particular kind of prison cell, a well appointed cell perhaps, but not a place that makes possible either personal satisfaction or deep problem solving. I believe that what the contemplative traditions have to say is important; they offer a different orientation to what personal wisdom is, how to develop it, and how to use it in the world than is presently contained in either our popular culture or our sciences. In order to illustrate this I will examine, in some detail, one contemplative path within Buddhism. Buddhism is particularly useful in this respect because its practices are nontheistic and thus avoid many of the cultural landmines associated with the contemplative aspects of Western religions

    Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Get PDF
    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-Threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-As-Target) or gender group's ability (group-As-Target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-As-Target nor a group-As-Target stereotype affected significantly gaming performance, or gamerelated self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat

    Preoperative Y-90 microsphere selective internal radiation treatment for tumor downsizing and future liver remnant recruitment: a novel approach to improving the safety of major hepatic resections

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Extended liver resections are being performed more liberally than ever. The extent of resection of liver metastases, however, is restricted by the volume of the future liver remnant (FLR). An intervention that would both accomplish tumor control and induce compensatory hypertrophy, with good patient tolerability, could improve clinical outcomes.</p> <p>Case presentation</p> <p>A 53-year-old woman with a history of cervical cancer presented with a large liver mass. Subsequent biopsy indicated poorly differentiated carcinoma with necrosis suggestive of squamous cell origin. A decision was made to proceed with pre-operative chemotherapy and Y-90 microsphere SIRT with the intent to obtain systemic control over the disease, downsize the hepatic lesion, and improve the FLR. A surgical exploration was performed six months after the first SIRT (three months after the second). There was no extrahepatic disease. The tumor was found to be significantly decreased in size with central and peripheral scarring. The left lobe was satisfactorily hypertrophied. A formal right hepatic lobectomy was performed with macroscopic negative margins.</p> <p>Conclusion</p> <p>Selective internal radiation treatment (SIRT) with yttrium-90 (Y-90) microspheres has emerged as an effective liver-directed therapy with a favorable therapeutic ratio. We present this case report to suggest that the portal vein radiation dose can be substantially increased with the intent of inducing portal/periportal fibrosis. Such a therapeutic manipulation in lobar Y-90 microsphere treatment could accomplish the end points of PVE with avoidance of the concern regarding tumor progression.</p

    Expression of CD11c Is Associated with Unconventional Activated T Cell Subsets with High Migratory Potential

    Get PDF
    Ajudes rebudes: Marie Curie Career Integration Grant; Dexeus Foundation for Women's Health Research; i Contratos Ramón y CajalCD11c is an α integrin classically employed to define myeloid dendritic cells. Although there is little information about CD11c expression on human T cells, mouse models have shown an association of CD11c expression with functionally relevant T cell subsets. In the context of genital tract infection, we have previously observed increased expression of CD11c in circulating T cells from mice and women. Microarray analyses of activated effector T cells expressing CD11c derived from naïve mice demonstrated enrichment for natural killer (NK) associated genes. Here we find that murine CD11c+ T cells analyzed by flow cytometry display markers associated with non-conventional T cell subsets, including γδ T cells and invariant natural killer T (iNKT) cells. However, in women, only γδ T cells and CD8+ T cells were enriched within the CD11c fraction of blood and cervical tissue. These CD11c+ cells were highly activated and had greater interferon (IFN)-γ secretory capacity than CD11c- T cells. Furthermore, circulating CD11c+ T cells were associated with the expression of multiple adhesion molecules in women, suggesting that these cells have high tissue homing potential. These data suggest that CD11c expression distinguishes a population of circulating T cells during bacterial infection with innate capacity and mucosal homing potential

    Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge

    Get PDF
    When critical assets or functionalities are included in a piece of software accessible to the end users, code protections are used to hinder or delay the extraction or manipulation of such critical assets. The process and strategy followed by hackers to understand and tamper with protected software might differ from program understanding for benign purposes. Knowledge of the actual hacker behaviours while performing real attack tasks can inform better ways to protect the software and can provide more realistic assumptions to the developers, evaluators, and users of software protections. Within Aspire, a software protection research project funded by the EU under framework programme FP7, we have conducted three industrial case studies with the involvement of professional penetration testers and a public challenge consisting of eight attack tasks with open participation. We have applied a systematic qualitative analysis methodology to the hackers’ reports relative to the industrial case studies and the public challenge. The qualitative analysis resulted in 459 and 265 annotations added respectively to the industrial and to the public challenge reports. Based on these annotations we built a taxonomy consisting of 169 concepts. They address the hacker activities related to (i) understanding code; (ii) defining the attack strategy; (iii) selecting and customizing the tools; and (iv) defeating the protections. While there are many commonalities between professional hackers and practitioners, we could spot many fundamental differences. For instance, while industrial professional hackers aim at elaborating automated and reproducible deterministic attacks, practitioners prefer to minimize the effort and try many different manual tasks. This analysis allowed us to distill a number of new research directions and potential improvements for protection techniques. In particular, considering the critical role of analysis tools, protection techniques should explicitly attack them, by exploiting analysis problems and complexity aspects that available automated techniques are bad at addressing

    A53T-alpha-synuclein-overexpression in the mouse nigrostriatal pathway leads to early increase of 14-3-3 epsilon and late increase of GFAP

    Get PDF
    Parkinson’s disease (PD) is a neurodegenerative disorder frequent at old age characterized by atrophy of the nigrostriatal projection. Overexpression and A53T-mutation of the presynaptic, vesicle-associated chaperone alpha-synuclein are known to cause early-onset autosomal dominant PD. We previously generated mice with transgenic overexpression of human A53T-alpha-synuclein (A53T-SNCA) in dopaminergic substantia nigra neurons as a model of early PD. To elucidate the early and late effects of A53T-alpha-synuclein on the proteome of dopaminergic nerve terminals in the striatum, we now investigated expression profiles of young and old mice using two-dimensional fluorescence difference in gel electrophoresis (2D-DIGE) and mass spectrometry. In total, 15 proteins were upregulated and 2 downregulated. Mice before the onset of motor anomalies showed an upregulation of the spot containing 14-3-3 proteins, in particular the epsilon isoform, as well as altered levels of chaperones, vesicle trafficking and bioenergetics proteins. In old mice, the persistent upregulation of 14-3-3 proteins was aggravated by an increase of glial fibrillary acidic protein (GFAP) suggesting astrogliosis due to initial neurodegeneration. Independent immunoblots corroborated GFAP upregulation and 14-3-3 upregulation for the epsilon isoform, and also detected significant eta and gamma changes. Only for 14-3-3 epsilon a corresponding mRNA increase was observed in midbrain, suggesting it is transcribed in dopaminergic perikarya and accumulates as protein in presynapses, together with A53T-SNCA. 14-3-3 proteins associate with alpha-synuclein in vitro and in pathognomonic Lewy bodies of PD brains. They act as chaperones in signaling, dopamine synthesis and stress response. Thus, their early dysregulation probably reflects a response to alpha-synuclein toxicity

    Heritability of non-speech auditory processing skills

    Get PDF
    Recent insight into the genetic bases for autism spectrum disorder, dyslexia, stuttering, and language disorders suggest that neurogenetic approaches may also reveal at least one etiology of auditory processing disorder (APD). A person with an APD typically has difficulty understanding speech in background noise despite having normal pure-tone hearing sensitivity. The estimated prevalence of APD may be as high as 10% in the pediatric population, yet the causes are unknown and have not been explored by molecular or genetic approaches. The aim of our study was to determine the heritability of frequency and temporal resolution for auditory signals and speech recognition in noise in 96 identical or fraternal twin pairs, aged 6–11 years. Measures of auditory processing (AP) of non-speech sounds included backward masking (temporal resolution), notched noise masking (spectral resolution), pure-tone frequency discrimination (temporal fine structure sensitivity), and nonsense syllable recognition in noise. We provide evidence of significant heritability, ranging from 0.32 to 0.74, for individual measures of these non-speech-based AP skills that are crucial for understanding spoken language. Identification of specific heritable AP traits such as these serve as a basis to pursue the genetic underpinnings of APD by identifying genetic variants associated with common AP disorders in children and adults
    corecore