1,582 research outputs found

    Healing of Periodontal Flaps Following Use of MBR 4197 (Flucrylate) in Rhesus Monkeys: A Biometric and Histometric Evaluation

    Full text link
    Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/141198/1/jper0305.pd

    Static analysis-based approaches for secure software development

    Get PDF
    Software security is a matter of major concern for software development enterprises that wish to deliver highly secure software products to their customers. Static analysis is considered one of the most effective mechanisms for adding security to software products. The multitude of static analysis tools that are available provide a large number of raw results that may contain security-relevant information, which may be useful for the production of secure software. Several mechanisms that can facilitate the production of both secure and reliable software applications have been proposed over the years. In this paper, two such mechanisms, particularly the vulnerability prediction models (VPMs) and the optimum checkpoint recommendation (OCR) mechanisms, are theoretically examined, while their potential improvement by using static analysis is also investigated. In particular, we review the most significant contributions regarding these mechanisms, identify their most important open issues, and propose directions for future research, emphasizing on the potential adoption of static analysis for addressing the identified open issues. Hence, this paper can act as a reference for researchers that wish to contribute in these subfields, in order to gain solid understanding of the existing solutions and their open issues that require further research

    Idea-caution before exploitation:the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities

    Get PDF
    The transfer of cybersecurity domain knowledge from security experts (‘Ethical Hackers’) to software engineers is discussed in terms of desirability and feasibility. Possible mechanisms for the transfer are critically examined. Software engineering methodologies do not make use of security domain knowledge in its form of vulnerability databases (e.g. CWE, CVE, Exploit DB), which are therefore not appropriate for this purpose. An approach based upon the improved use of pattern languages that encompasses security domain knowledge is proposed

    Axions and the pulsation periods of variable white dwarfs revisited

    Get PDF
    Axions are the natural consequence of the introduction of the Peccei-Quinn symmetry to solve the strong CP problem. All the efforts to detect such elusive particles have failed up to now. Nevertheless, it has been recently shown that the luminosity function of white dwarfs is best fitted if axions with a mass of a few meV are included in the evolutionary calculations. Our aim is to show that variable white dwarfs can provide additional and independent evidence about the existence of axions. The evolution of a white dwarf is a slow cooling process that translates into a secular increase of the pulsation periods of some variable white dwarfs, the so-called DAV and DBV types. Since axions can freely escape from such stars, their existence would increase the cooling rate and, consequently, the rate of change of the periods as compared with the standard ones. The present values of the rate of change of the pulsation period of G117-B15A are compatible with the existence of axions with the masses suggested by the luminosity function of white dwarfs, in contrast with previous estimations. Furthermore, it is shown that if such axions indeed exist, the drift of the periods of pulsation of DBV stars would be noticeably perturbed.Comment: Accepted for publication in Astronomy & Astrophysic

    A Global Analog of Cheshire Charge

    Full text link
    It is shown that a model with a spontaneously broken global symmetry can support defects analogous to Alice strings, and a process analogous to Cheshire charge exchange can take place. A possible realization in superfluid He-3 is pointed out.Comment: 24 pages (figures 1-4 included as uu-encoded tar files), CALT-68-1865 (Revised version: an expression (eq. 17) for global charge density is corrected; some typos and sign mismatches are removed.

    Testing an Intentional Naming Scheme Using Genetic Algorithms

    Full text link
    Abstract. Various attempts have been made to use genetic algorithms (GAs) for software testing, a problem that consumes a large amount of time and eort in software development. We demonstrate the use of GAs in automating testing of complex data structures and methods for manipulating them, which to our knowledge has not been successfully displayed before on non-trivial software structures. We evaluate the ef-fectiveness of our GA-based test suite generation technique by applying it to test the design and implementation of the Intentional Naming Sys-tem (INS), a new scheme for resource discovery and service location in a dynamic networked environment. Our analysis using GAs reveals serious problems with both the design of INS and its inventors ' implementation.

    Cosmic F- and D-strings

    Full text link
    Macroscopic fundamental and Dirichlet strings have several potential instabilities: breakage, tachyon decays, and confinement by axion domain walls. We investigate the conditions under which metastable strings can exist, and we find that such strings are present in many models. There are various possibilities, the most notable being a network of (p,q) strings. Cosmic strings give a potentially large window into string physics.Comment: 27 pages, 5 figures; v. 5: JHEP style, added comments in section 2.

    Fitness benefits of prolonged post-reproductive lifespan in women

    Get PDF
    Most animals reproduce until they die, but in humans, females can survive long after ceasing reproduction. In theory, a prolonged post-reproductive lifespan will evolve when females can gain greater fitness by increasing the success of their offspring than by continuing to breed themselves. Although reproductive success is known to decline in old age, it is unknown whether women gain fitness by prolonging lifespan post-reproduction. Using complete multi-generational demographic records, we show that women with a prolonged post-reproductive lifespan have more grandchildren, and hence greater fitness, in pre-modern populations of both Finns and Canadians. This fitness benefit arises because post-reproductive mothers enhance the lifetime reproductive success of their offspring by allowing them to breed earlier, more frequently and more successfully. Finally, the fitness benefits of prolonged lifespan diminish as the reproductive output of offspring declines. This suggests that in female humans, selection for deferred ageing should wane when one's own offspring become post-reproductive and, correspondingly, we show that rates of female mortality accelerate as their offspring terminate reproduction

    Design and analysis of low boom concepts at Langley Research Center

    Get PDF
    The objective of the sonic boom research in the current High Speed Research Program is to ultimately make possible overland supersonic flight by a high speed civil transport. To accomplish this objective, it is felt that results in four areas must demonstrate that such a vehicle would be acceptable by the general public, by the airframers, and by the airlines. It should be demonstrated: (1) that some waveform shape has the possibility of being acceptable to the general public; (2) that the atmosphere would not totally destroy such a waveform during propagation; (3) that a viable airplane could be built which produces such a waveform; and (4) that any performance penalty suffered by a low boom aircraft would be counteracted by the economic benefit of overland supersonic flight. The work being done at LaRC is in support of the third element listed above--the area of configuration design. The initial part of the paper will give a review of the theory being used for configuration designs and discuss two theory validation models which were built and tested within the past two years. Discussion of the wind tunnel and theoretical results (linear theory and higher order methods) and their implications for future designs will be included
    corecore