2,169 research outputs found

    Repository Replication Using NNTP and SMTP

    Full text link
    We present the results of a feasibility study using shared, existing, network-accessible infrastructure for repository replication. We investigate how dissemination of repository contents can be ``piggybacked'' on top of existing email and Usenet traffic. Long-term persistence of the replicated repository may be achieved thanks to current policies and procedures which ensure that mail messages and news posts are retrievable for evidentiary and other legal purposes for many years after the creation date. While the preservation issues of migration and emulation are not addressed with this approach, it does provide a simple method of refreshing content with unknown partners.Comment: This revised version has 24 figures and a more detailed discussion of the experiments conducted by u

    Advertising

    Get PDF

    “In Landlessness Alone Resides the Highest Truth”; or, At Sea with Honors

    Get PDF
    The recent explosion on an oil rig in the Gulf of Mexico was a grim reminder of the BP disaster in 2010, from which Gulf Coast residents and workers are still trying to recover. We all must have responded to that disaster with a similar sense of outrage as we watched the live underwater video feed of millions of gallons of oil spewing into the ocean and saw images of oil-soaked wildlife, coastlines, and marshlands. Shared memories of Hurricane Katrina heighten our collective sympathy for the people whose livelihoods this disaster still threatens. At the same time, our individual responses are shaped by personal associations—such as relatives living in the Gulf, memories of a beach vacation, or a fondness for Gulf shrimp. As students and teachers, we also cannot help but view such events through our disciplines, our majors and minors, the books we read, and the courses we take and teach. I imagine the oil spill has already become a reference point in classes ranging from Microbiology and Environmental Studies to Economics and Public Relations

    Our Calendar

    Get PDF

    Teaching Citizenship in a Democracy

    Get PDF

    Faculty Members

    Get PDF

    Current Educational Publications: A Book for the Times

    Get PDF

    Synaptic input from CA3 pyramidal cells to dentate basket cells in rat hippocampus.

    Get PDF
    1. Excitatory inputs from CA3 pyramidal cells to dentate basket cells were examined using the whole-cell recording technique in neonatal (10-16 days) rat hippocampal slices to characterize this unexpected feedback pathway. 2. Minimal electrical stimulation of the CA3 pyramidal layer evoked in basket cells short latency (5.2 +/- 0.4 ms) glutamate receptor-mediated excitatory postsynaptic currents (EPSCs) with fast rise times (at -70 mV, 0.9 +/- 0.2 ms), fast decay time constants (3.6 +/- 0.6 ms), and small amplitudes (-14 +/- 3.4 pA). Minimal electrical stimulation evoked monosynaptic EPSCs in only 48 +/- 9.2% of the trials suggesting that the CA3 pyramidal cell to basket cell pathway was unreliable. 3. CA3 pyramidal cell layer stimulation did not antidromically or synaptically activate granule cells but did evoke polysynaptic IPSCs in granule cells, suggesting that the net effect of CA3 pyramidal cell firing on the dentate gyrus was granule cell inhibition. 4. Stimulation of the CA3 pyramidal cell layer evoked both monosynaptic and polysynaptic EPSCs in basket cells, which were eliminated by a knife lesion separating CA3 from the dentate gyrus. The latencies of the EPSCs evoked in 0.6 mM extracellular calcium were the same as the earliest latencies of EPSCs in 1.5 mM calcium, suggesting that those EPSCs were monosynaptic. The polysynaptic input was more prominent in the presence of 10 microM bicuculline, implying that inhibitory GABAergic circuits normally limit this feedback from CA3 to basket cells. 5. In recordings from 103 pairs of CA3 pyramidal cells and dentate basket cells from 11 slices, two polysynaptic connections were found that were active only when the presynaptic CA3 pyramidal neuron fired in bursts. No monosynaptic connections between CA3 pyramidal cells and basket cells were identified indicating that connections between the two cell types may be sparse. 6. Raising the external potassium concentration from 3.5 to 8.5 mM, which elicited burst firing in CA3 pyramidal cells, resulted in a barrage of EPSCs and action potentials in basket cells. In contrast, granule cells neither fired action potentials nor exhibited increased EPSC frequency in elevated potassium but instead received a higher frequency of bicuculline-sensitive IPSCs, consistent with interneuron firing. The CA3 pyramidal cell to basket cell monosynaptic pathway exhibited paired-pulse facilitation as manifested by an increased probability of release, which supports the idea that basket cells were better activated by short trains of action potentials than by single inputs

    Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse

    Get PDF
    Privacy is a concept with real life ties and implications. Privacy infringement has the potential to lead to serious consequences for the stakeholders involved, hence researchers and organisations have developed various privacy enhancing techniques and tools. However, there is no solution that fits all, and there are instances where privacy solutions could be misused, for example to hide nefarious activities. Therefore, it is important to provide suitable measures and to make necessary design tradeoffs in order to avoid such misuse. This short paper aims to make a case for the need of careful consideration when designing a privacy solution, such that the design effectively addresses the user requirements while at the same time minimises the risk of inadvertently assisting potential offenders. In other words, this paper strives to promote “sensible privacy” design, which deals with the complex challenges in balancing privacy, usability and accountability. We illustrate this idea through a case study involving the design of privacy solutions for domestic violence survivors. This is the main contribution of the paper. The case study presents specific user requirements and operating conditions, which coupled with the attacker model, provide a complex yet interesting scenario to explore. One example of our solutions is described in detail to demonstrate the feasibility of our approach

    Immunity and inflammation in status epilepticus and its sequelae: possibilities for therapeutic application.

    Get PDF
    Status epilepticus (SE) is a life-threatening neurological emergency often refractory to available treatment options. It is a very heterogeneous condition in terms of clinical presentation and causes, which besides genetic, vascular and other structural causes also include CNS or severe systemic infections, sudden withdrawal from benzodiazepines or anticonvulsants and rare autoimmune etiologies. Treatment of SE is essentially based on expert opinions and antiepileptic drug treatment per se seems to have no major impact on prognosis. There is, therefore, urgent need of novel therapies that rely upon a better understanding of the basic mechanisms underlying this clinical condition. Accumulating evidence in animal models highlights that inflammation ensuing in the brain during SE may play a determinant role in ongoing seizures and their long-term detrimental consequences, independent of an infection or auto-immune cause; this evidence encourages reconsideration of the treatment flow in SE patients
    corecore