417 research outputs found

    Role of medial prefrontal cortex and primary somatosensory cortex in self and other-directed vicarious social touch: a TMS study

    Get PDF
    Conflicting evidence points to the contribution of several key nodes of the 'social brain' to the processing of both discriminatory and affective qualities of interpersonal touch. Whether the primary somatosensory cortex (S1) and the medial prefrontal cortex (mPFC), two brain areas vital for tactile mirroring and affective mentalizing, play a functional role in shared representations of C-tactile (CT) targeted affective touch is still a matter of debate. Here, we used offline continuous theta-burst Transcranial Magnetic Stimulation (cTBS) to mPFC, S1 and Vertex (control) prior to participants providing ratings of vicarious touch pleasantness for self and others delivered across several body sites at CT-targeted velocities. We found that S1-cTBS led to a significant increase in touch ratings to the self, with this effect being positively associated to levels of interoceptive awareness. Conversely, mPFC-cTBS reduced pleasantness ratings for touch to another person. These effects were not specific for CT-optimal (slow) stroking velocities, but rather they applied to all types of social touch. Overall, our findings challenge the causal role of the S1 and mPFC in vicarious affective touch and suggest that self- vs. other-directed vicarious touch responses might crucially depend on the specific involvement of key social networks in gentle tactile interactions

    An integrated concurrency and core-ISA architectural envelope definition, and test oracle, for IBM POWER multiprocessors

    Get PDF
    Funding: Scottish Funding Council (SICSA Early Career Industry Fellowship)Weakly consistent multiprocessors such as ARM and IBM POWER have been with us for decades, but their subtle programmer-visible concurrency behaviour remains challenging, both to implement and to use; the traditional architecture documentation, with its mix of prose and pseudocode, leaves much unclear. In this paper we show how a precise architectural envelope model for such architectures can be defined, taking IBM POWER as our example. Our model specifies, for an arbitrary test program, the set of all its allowable executions, not just those of some particular implementation. The model integrates an operational concurrency model with an ISA model for the fixedpoint non-vector user-mode instruction set (largely automatically derived from the vendor pseudocode, and expressed in a new ISA description language). The key question is the interface between these two: allowing all the required concurrency behaviour, without overcommitting to some particular microarchitectural implementation, requires a novel abstract structure. Our model is expressed in a mathematically rigorous language that can be automatically translated to an executable test-oracle tool; this lets one either interactively explore or exhaustively compute the set of all allowed behaviours of intricate test cases, to provide a reference for hardware and software development.Postprin

    Performance profiling of virtual machines

    Full text link

    BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection

    Get PDF
    We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementation of BotSwindler relies upon an out-of-host software agent that drives user-like interactions in a virtual machine, seeking to convince malware residing within the guest OS that it has captured legitimate credentials. To aid in the accuracy and realism of the simulations, we propose a low overhead approach, called virtual machine verification, for verifying whether the guest OS is in one of a predefined set of states. We present results from experiments with real credential-collecting malware that demonstrate the injection of monitored financial bait for detecting compromises. Additionally, using a computational analysis and a user study, we illustrate the believability of the simulations and we demonstrate that they are sufficiently human-like. Finally, we provide results from performance measurements to show our approach does not impose a performance burden

    Longitudinal trends of future climate change and oil palm growth: empirical evidence for tropical Africa

    Get PDF
    Palms are highly significant tropical plants. Oil palms produce palm oil, the basic commodity of a highly important industry. Climate change from greenhouse gasses is likely to decrease the ability of palms to survive, irrespective of them providing ecosystem services to communities. Little information about species survival in tropical regions under climate change is available and data on species migration under climate change is important. Palms are particularly significant in Africa: a palm oil industry already exists with Nigeria being the largest producer. Previous work using CLIMEX modelling indicated that Africa will have reduced suitable climate for oil palm in Africa. The current paper employs this modelling to assess how suitable climate for growing oil palm changed in Africa from current time to 2100. An increasing trend in suitable climate from west to east was observed indicating that refuges could be obtained along the African tropical belt. Most countries had reduced suitable climates but others had increased, with Uganda being particularly high. There may be a case for developing future oil palm plantations towards the east of Africa. The information may be usefully applied to other palms. However, it is crucial that any developments will fully adhere to environmental regulations. Future climate change will have severe consequences to oil palm cultivation but there may be scope for eastwards mitigation in Africa.info:eu-repo/semantics/publishedVersio

    Future scenarios for oil palm mortality and infection by Phytophthora palmivora in Colombia, Ecuador and Brazil, extrapolated to Malaysia and Indonesia

    Get PDF
    Palm oil is a very important commodity especially to Malaysia and Indonesia. However, Latin American countries have significant industries, particularly Colombia. Climate change (CC) is a highly probable phenomenon which will affect diseases of oil palm (OP) with Phytophthora palmivora causing devastating outbreaks in Latin America and especially Colombia. Furthermore, the oomycete is an endemic pathogen to other crops in Malaysia such as durian, and is capable of causing disease of OP in vitro. A similar disease has been recorded in Thailand. It is crucial that P. palmivora is controlled in Malaysia and Indonesia because the organism is highly virulent, although there are acute and chronic forms. This current paper investigates the effect of CC on P. palmivora disease and on OP survival via a CLIMEX model for future suitable growth of OP. Postulated schemes are provided for Malaysia and Indonesia for acute and chronic forms of the disease which indicate an extremely high and increasing threat, likely to reduce the sustainability of the OP industry by 2050 and further by 2070 and/or 2100. Brazil appears less threatened by the disease under these scenarios, but their OP is likely to have 100% mortality. The chronic and acute forms of the malady present reduced and high threats respectively to Malaysia and Indonesia. The data herein will be useful for, inter alia, plantation managers who will be able to assess the accuracy of these scenarios in the future. Amelioration methods are required urgently and quarantine procedures need strengthening.(undefined)info:eu-repo/semantics/publishedVersio

    Topography and relationship-specific social touching in individuals displaying body image disturbances

    Get PDF
    Interpersonal touch is intimately related to the emotional bond between the touch giver and the touch receiver. Which bodily regions we touch in those individuals in our social network is relationship specific. Perception of interpersonal touch is altered in psychiatric disorders characterised by body image disturbances (BIDs). Here, we examined whether the ‘imagined’ experience of social touch in individuals with BIDs is body topography- and relationship-specific. By using an interactive media mobile App, the Virtual Touch Toolkit, high versus low levels of BIDs participants completed heatmaps of full-body virtual avatars, to indicate the body regions they find soothing/unpleasant to be touched by a loved one versus an acquaintance. Self-reports of interoceptive awareness and dysmorphic concerns were also measured. Overall, imagined touch was rated as the most soothing when received from a loved one, and also when this was delivered to ‘social’ body regions. The importance of the social relationship for the imagined tactile interactions was particularly evident for the high levels of BIDs group, with greater problems with interoceptive awareness predicting higher soothing touch ratings when this was received by a loved one. Despite the evidence that imagined bodily contacts between meaningful people is the most pleasant for socially acceptable bodily regions, our findings may suggest a greater sensitivity to relation-specific bodily patterns of social touch particularly in the high level of BIDs group. Heightened interoceptive awareness may also play a key role in this experience of bodily affective contacts. Future research for body-oriented therapy for BIDs is encouraged to systematically probe the efficacy of imagined social touch interaction protocols which use more plausible, ecological, scenarios where touch is delivered by loved ones and to socially acceptable bodily regions

    Replica placement to mitigate attacks on clouds

    Get PDF
    Execution of critical services traditionally requires multiple distinct replicas, supported by independent networks and hardware. To operate properly, these services often depend on the correctness of a fraction of replicas, usually over 2/3 or 1/2. Defying the ideal situation, economical reasons may tempt users to replicate critical services onto a single multi-tenant cloud infrastructure. Since this may expose users to correlated failures, we assess the risks for two kinds of majorities: a conventional one, related to the number of replicas, regardless of the machines where they run; and a second one, related to the physical machines where the replicas run. This latter case may exist in multi-tenant virtualized environments only. To assess these risks, under crash and Byzantine failures of virtual and physical machines, we resort to theoretical and experimental evaluation. Contrary to what one might expect, we conclude that it is not always favorable to distribute replicas evenly over a fixed number of physical machines. On the contrary, we found cases where they should be as unbalanced as possible. We systematically identify the best defense for each kind of failure and majority to preserve. We then review the most common real-life attacks on clouds and discuss the a priori placement of service replicas that minimizes the effects of these attacks
    • …
    corecore