432 research outputs found

    Exploring the cause of game (derived) arousal: What biometric accounts of player experience revealed

    Get PDF
    The function of this paper is to present research findings that ordinarily would never see the light of day, not because they have no value or significance, but they might seem marginal and less significant given the main focus of the research conducted. When studying player experience, there is value in widening the focus of research to avoid attributing too much value to one kind of experience over others. The findings presented here come from a much larger three-year research study into player experiences with games containing violence. The broad intent of the study was to query the strong association between effects research and responsive regulation measures (game classification). The research was guided by the idea that exploring “the extent to which the public’s perception of causal links between game playing and various social ills’ might be ‘moderated or even undermined by [knowledge of] how players actually respond to and negotiate their way through the content and characteristics of the medium” (OFLC, 2009, p. 24). To do this, the research employed a mixed methodology to examine player experience (as introduced in Schott et al., 2013a). The study produced a number of data points in order to characterize the multi-dimensional nature of players’ experiences. This paper focuses specifically on the outcome of utilizing a biometric measure (GSR) as a guide for determining which aspects, from game experiences that required hours of game play, should be assessed for their significance. The value of employing GSR as a textually neutral method for detecting which aspects of a game had an impact on players is assessed

    Recent Advances in Declarative Networking

    Get PDF
    Declarative networking is a programming methodology that enables developers to concisely specify network protocols and services, and directly compile these specifications into a dataflow framework for execution. This paper describes recent advances in declarative networking, tracing its evolution from a rapid prototyping framework towards a platform that serves as an important bridge connecting formal theories for reasoning about protocol correctness and actual implementations. In particular, the paper focuses on the use of declarative networking for addressing four main challenges in the distributed systems development cycle: the generation of safe routing implementations, debugging, security and privacy, and optimizing distributed systems

    Prospective Evaluation of the Ultrasound Signs Proposed for the Description of Uterine Niche in Nonpregnant Women

    Get PDF
    OBJECTIVES: To evaluate the new ultrasound-based signs for the diagnosis of post-cesarean section uterine niche in nonpregnant women. METHODS: We investigated prospectively a cohort of 160 consecutive women with one previous term cesarean delivery (CD) between December 2019 and 2020. All women were separated into two subgroups according to different stages of labor at the time of their CD: subgroup A (n = 109; 68.1%) for elective CD and CD performed in latent labor at a cervical dilatation (≤4 cm) and subgroup B (n = 51; 31.9%); for CD performed during the active stage of labor (>4 cm). RESULTS: Overall, the incidence of a uterine niche was significantly (P  3 mm in subgroup A than in subgroup B and a significant negative relationship was found between the RMT and the cervical dilatation at CD (r = -0.22; P = .008). CONCLUSIONS: Sonographic cesarean section scar assessment indicates that the type of CD and the stage of labor at which the hysterotomy is performed have an impact on the location of the scar and the scarification process including the niche formation and RMT

    A³: An Extensible Platform for Application-Aware Anonymity

    Get PDF
    This paper presents the design and implementation of Application-Aware Anonymity (A³), an extensible platform for deploying anonymity-based services on the Internet. A³ allows applications to tailor their anonymity properties and performance characteristics according to specific communication requirements. To support flexible path construction, A³ exposes a declarative language (A³LOG) that enables applications to compactly specify path selection and instantiation policies executed by a declarative networking engine. We demonstrate that our declarative language is sufficiently expressive to encode novel multi-metric performance constraints as well as existing relay selection algorithms employed by Tor and other anonymity systems, using only a few lines of concise code. We experimentally evaluate the A³ system using a combination of trace-driven simulations and deployment on Planet- Lab. Our experimental results demonstrate that A3 can flexibly support a wide range of path selection and instantiation strategies at low performance overhead

    Towards Secure Cloud Data Management

    Get PDF
    This paper explores the security challenges posed by data-intensive applications deployed in cloud environments that span administrative and network domains. We propose a data-centric view of cloud security and discuss data management challenges in the areas of secure distributed data processing, end-to-end query result verification, and cross-user trust policy management. In addition, we describe our current and future efforts to investigate security challenges in cloud data management using the Declarative Secure Distributed Systems (DS2) platform, a declarative infrastructure for specifying, analyzing, and deploying secure information systems

    Are forested buffers an effective conservation strategy for riparian fauna? An assessment using meta-analysis

    Get PDF
    Historically, forested riparian buffers have been created to provide protection for aquatic organisms and aquatic ecosystem functions. Increasingly, new and existing riparian buffers are being used also to meet terrestrial conservation requirements. To test the effectiveness of riparian buffers for conserving terrestrial fauna, we conducted a meta-analysis using published data from 397 comparisons of species abundance in riparian buffers and unharvested (reference) riparian sites. The response of terrestrial species to riparian buffers was not consistent between taxonomic groups; bird and arthropod abundances were significantly greater in buffers relative to unharvested areas, whereas amphibian abundance decreased. Edge-preferring species were more abundant in buffer sites than reference sites, whereas species associated with interior habitat were not significantly different in abundance. The degree of buffer effect on animal abundance was unrelated to buffer width; wider buffers did not result in greater similarity between reference and buffer sites. However, responses to buffer treatment were more variable in buffers ,50 m wide, a commonly prescribed width in many management plans. Our results indicate that current buffer prescriptions do not maintain most terrestrial organisms in buffer strips at levels comparable to undisturbed sites

    Latitudinal Variation in Top-Down and Bottom-Up Control of a Salt Marsh Food Web

    Get PDF
    The shrub Iva frutescens, which occupies the terrestrial border of U.S. Atlantic Coast salt marshes, supports a food web that varies strongly across latitude. We tested whether latitudinal variation in plant quality (higher at high latitudes), consumption by omnivores (a crab, present only at low latitudes), consumption by mesopredators (ladybugs, present at all latitudes), or the life history stage of an herbivorous beetle could explain continental-scale field patterns of herbivore density. In a mesocosm experiment, crabs exerted strong top-down control on herbivorous beetles, ladybugs exerted strong top-down control on aphids, and both predators benefited plants through trophic cascades. Latitude of plant origin had no effect on consumers. Herbivorous beetle density was greater if mesocosms were stocked with beetle adults rather than larvae, and aphid densities were reduced in the “adult beetle” treatment. Treatment combinations representing high and low latitudes produced patterns of herbivore density similar to those in the field. We conclude that latitudinal variation in plant quality is less important than latitudinal variation in top consumers and competition in mediating food web structure. Climate may also play a strong role in structuring high-latitude salt marshes by limiting the number of herbivore generations per growing season and causing high overwintering mortality

    Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse

    Full text link
    Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific type of domain squatting called "combosquatting," in which attackers register domains that combine a popular trademark with one or more phrases (e.g., betterfacebook[.]com, youtube-live[.]com). We perform the first large-scale, empirical study of combosquatting by analyzing more than 468 billion DNS records---collected from passive and active DNS data sources over almost six years. We find that almost 60% of abusive combosquatting domains live for more than 1,000 days, and even worse, we observe increased activity associated with combosquatting year over year. Moreover, we show that combosquatting is used to perform a spectrum of different types of abuse including phishing, social engineering, affiliate abuse, trademark abuse, and even advanced persistent threats. Our results suggest that combosquatting is a real problem that requires increased scrutiny by the security community.Comment: ACM CCS 1
    corecore