608 research outputs found

    A Block Oriented Fingerprinting Scheme in Relational Database

    Get PDF
    The need for protecting rights over relational data is of ever increasing concern. There have recently been some pioneering works in this area. In this paper, we propose an effective fingerprinting scheme based on the idea of block method in the area of multimedia fingerprinting. The scheme ensures that certain bit positions of the data contain specific values. The bit positions are determined by the keys known only to the owner of the data and different buyers of the database have different bit positions and different specific values for those bit positions. The detection of the fingerprint can be completed even with a small subset of a marked relation in case that the sample contains the fingerprint. Our extensive analysis shows that the proposed scheme is robust against various forms of attacks, including adding, deleting, shuffling or modifying tuples or attributes and colluding with other recipients of a relation, and ensures the integrity of relation at the same time. ? Springer-Verlag Berlin Heidelberg 2005.EI

    A Nomadic Testbed for Teaching Computer Architecture

    Get PDF
    A nomadic laboratory or testbed, based on Raspberry Pi 3 computers and Arduino microcontrollers, has been developed in order to teach subjects related to computer architecture. The testbed can be transported to the classroom. Students can access it through the available network, which can be a wireless LAN, wired LAN o a custom network. The student can access without constraints to the platforms, therefore there are a wide range of possible experiments. This laboratory was used during 2017 for practical works in the course Introduction to Technology, and during 2018 in the course Computers Architecture at Universidad Nacional of Cuyo. Some of the experiments that are been carried out by students are: to explore and analyse the architecture of the computers through Linux commands, write and run programs on different programing languages, input and output operations through memory mapped addressing and isolated addressing, write interrupt service routines in order to service interrupts, multithreading programing, explore memory maps, CPU features, etc. This paper describes the testbed architecture, experiments performed by students in the mentioned subjects, present the students feedback, and describes the possible methods in order to integrate it to a remote laboratory.XVII Workshop Tecnología Informática Aplicada en Educación (WTIAE)Red de Universidades con Carreras en Informática (RedUNCI

    Crystal and molecular structure of analgesics. II. Dezocine hydrobromide

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/44834/1/10870_2005_Article_BF01200881.pd

    Faculty research productivity: Some moderators of associated stressors

    Full text link
    Using person environment-fit theory, stress measures were developed on 894 faculty, a subgroup of the 3,972 faculty in the 1988 NCRIPTAL national survey. Within three institutional groups, three fields of study (humanities, natural sciences, and social sciences), three research output variables, and eight moderating variables (singly and collectively) were correlated (direct and partials) with two measures of stress. The findings lend support to the theoretical model. The outcomes also show that moderate levels of stress can be appreciably and significantly mitigated by some selected personal variables. The environmental variables were generally ineffective in moderating the correlations between stresses and productivity. Sex differences exist. Research self-competence is a strong modifier for both sexes and is exceptionally potent for women.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/43612/1/11162_2004_Article_BF00992157.pd

    arrayMap: A Reference Resource for Genomic Copy Number Imbalances in Human Malignancies

    Get PDF
    Background: The delineation of genomic copy number abnormalities (CNAs) from cancer samples has been instrumental for identification of tumor suppressor genes and oncogenes and proven useful for clinical marker detection. An increasing number of projects have mapped CNAs using high-resolution microarray based techniques. So far, no single resource does provide a global collection of readily accessible oncoge- nomic array data. Methodology/Principal Findings: We here present arrayMap, a curated reference database and bioinformatics resource targeting copy number profiling data in human cancer. The arrayMap database provides a platform for meta-analysis and systems level data integration of high-resolution oncogenomic CNA data. To date, the resource incorporates more than 40,000 arrays in 224 cancer types extracted from several resources, including the NCBI's Gene Expression Omnibus (GEO), EBIs ArrayExpress (AE), The Cancer Genome Atlas (TCGA), publication supplements and direct submissions. For the majority of the included datasets, probe level and integrated visualization facilitate gene level and genome wide data re- view. Results from multi-case selections can be connected to downstream data analysis and visualization tools. Conclusions/Significance: To our knowledge, currently no data source provides an extensive collection of high resolution oncogenomic CNA data which readily could be used for genomic feature mining, across a representative range of cancer entities. arrayMap represents our effort for providing a long term platform for oncogenomic CNA data independent of specific platform considerations or specific project dependence. The online database can be accessed at http://www.arraymap.org.Comment: 17 pages, 5 inline figures, 3 tables, supplementary figures/tables split into 4 PDF files; manuscript submitted to PLoS ON

    “Cloning” in academe: Mentorship and academic careers

    Full text link
    Mentor professors were surveyed with respect to their most successful “protégés” regarding scholarly production, the mentorship role, and their careers. Career stage, network stratification, and weak-tie theories provided the conceptual frameworks. The 62 mentors were highly productive professors who were predominantly both graduates and employees of research universities. Mentors overwhelmingly nominated as their most successful protégés those whose careers were essentially identical to their own—i.e., their “clones.” Women mentors named as most successfully protégés more than twice as many females and males than men did. More productive mentors linked with a greater number of protégés but were less knowledgable about their personal lives, as Granovetter's theory would predict. The results also demonstrate the openness of the network within stratified levels.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/43588/1/11162_2004_Article_BF00973512.pd
    corecore