3,761 research outputs found

    White paper: A plan for cooperation between NASA and DARPA to establish a center for advanced architectures

    Get PDF
    Large, complex computer systems require many years of development. It is recognized that large scale systems are unlikely to be delivered in useful condition unless users are intimately involved throughout the design process. A mechanism is described that will involve users in the design of advanced computing systems and will accelerate the insertion of new systems into scientific research. This mechanism is embodied in a facility called the Center for Advanced Architectures (CAA). CAA would be a division of RIACS (Research Institute for Advanced Computer Science) and would receive its technical direction from a Scientific Advisory Board established by RIACS. The CAA described here is a possible implementation of a center envisaged in a proposed cooperation between NASA and DARPA

    ProPelled: The Effects of Grants on Graduation, Earnings, and Welfare

    Get PDF
    We estimate the effect of grant aid on poor college students’ attainment and earnings using student-level administrative data from four-year public colleges in Texas. To identify these effects, we exploit a discontinuity in grant generosity as a function of family income. Eligibility for the maximum Pell Grant significantly increases degree receipt and earnings beginning four years after entry. Within 10 years, imputed taxes on eligible students’ earnings gains fully recoup total government expenditures generated by initial eligibility. To clarify how these estimates relate to social welfare, we develop a general theoretical model and derive sufficient statistics for the welfare implications of changes in the price of college. Whether additional grant aid increases welfare depends on (1) net externalities from recipients’ behavioral responses and (2) a direct effect of mitigating credit constraints or other frictions that inflate students’ in-school marginal utility. Calibrating our model using nationally representative consumption data suggests that increasing grant aid for the average college student by 1couldgeneratenegativeexternalitiesashighas1 could generate negative externalities as high as 0.50 and still improve welfare. Applying our welfare formula and estimated direct effects to our setting and others suggests considerable welfare gains from grants that target low-income students

    Becoming a Law Professor: A Candidate\u27s Guide

    Get PDF
    This is the Table of Contents and the Introduction to a forthcoming book from the American Bar Association. The authors provide detailed advice and resources for aspiring law professors, including a description of the categories of law faculty (and what they do), possible paths to careers in the legal academy, and how to guides for filling out the AALS\u27s Faculty Appointments Register, interviewing at the Faculty Recruitment Conference (the meat market ), issues for non-traditional candidates, dealing with callbacks and job offers, and getting ready for the first semester on the job

    Xilinx System Generator Based HW Components for Rapid Prototyping of Computer Vision SW/HW Systems

    Get PDF
    This paper shows how the Xilinx System Generator can be used to develop hardware-based computer vision algorithms from a system level approach without the necessity of in-depth knowing neither a hardware description language nor the particulars of the hardware platform. Also, it is demonstrated that Simulink can be employed as a co-design and co-simulation platform for rapid prototyping of Computer Vision HW/SW systems. To do this, a library of optimized image processing components based on XSG and Matlab has been developed and tested in hybrid schemes including HW and SW modules. As a part of the testing, results of the prototyping and co-simulation of a HW/SW Computer Vision System for the automated inspection of tangerine segments are presented.COSIVA (TIC 2000-1765-C03-02)Escuela TĂ©cnica Superior de IngenierĂ­a Industria

    Dynamic user authentication based on mouse movements curves

    Get PDF
    In this paper we describe a behavioural biometric approach to authenticate users dynamically based on mouse movements only and using regular mouse devices. Unlike most of the previous approaches in this domain, we focus here on the properties of the curves generated from the consecutive mouse positions during typical mouse movements. Our underlying hypothesis is that these curves have enough discriminative information to recognize users. We conducted an experiment to test and validate our model in which ten participants are involved. Back propagation neural network is used as a classifier. Our experimental results show that behavioural information with discriminating features is revealed during normal mouse usage, which can be employed for user modeling for various reasons, such as information assets protection

    Expression of poly-ADP-ribose polymerase (PARP) in endometrial adenocarcinoma: Prognostic potential

    Get PDF
    © 2020 Background: In the United States endometrial carcinoma is the most common female gynecologic malignancy. An average of more than 60,000 new cases of endometrial carcinomas have been diagnosed yearly over the past 5 years, with a higher incidence occurring in the central Appalachian states of Ohio and West Virginia. In the U.S., the national average of newly diagnosed endometrial carcinomas is 26.8 in every 100,000 women, while in the states of Ohio and West Virginia the average is 30.5 and 31.1 in every 100,000 women, respectively. This notable increase in the incidence of endometrial carcinomas may be due a variety of elevated risk factors including but not limited to: tobacco use, obesity, and genetic predisposition of the predominant demographic. The American Cancer Society estimates that approximately 55,000 new cases of endometrial carcinoma will be diagnosed in 2020 yet, this disease is widely considered understudied and under-represented in mainstream cancer research circles. Methods: The aim of this study was to quantitate the co-expression of two DNA repair proteins poly-ADP-ribose polymerase 1 and 2 (Parp-1 and Parp-2) by enzyme- linked immuno-sorbent assay (ELISA) in 60 endometrioid endometrial tumor samples and compare their expression to matched non-malignant endometrial tissue from the same corresponding donors from central Appalachia. Results: We found that Parp-1 was significantly overexpressed in endometrial carcinoma relative to corresponding normal tissue. This overexpression implicates Parp inhibition therapy as a possible treatment for the disease. Our results also found a protective effect of native Parp-2 expression in non-malignant endometrial tissue with each 1 ng/mL increase in PARP-2 concentration in normal tissue was associated with a 10 % reduction in the hazard of tumor progression (HR = 0.90; p = 0.039) and a 21 % reduction in the hazard of death (HR = 0.79; p = 0.044). Conclusions: This study demonstrated the over-expression of the druggable target Parp-1 in endometrial adenocarcinoma and observed a strong negative correlation of native Parp-2 expression and disease progression via the quantification of the Parp proteins using enzyme- linked immuno-sorbent assay (ELISA) assays

    Refactoring preserves security

    Get PDF
    Refactoring allows changing a program without changing its behaviour from an observer’s point of view. To what extent does this invariant of behaviour also preserve security? We show that a program remains secure under refactoring. As a foundation, we use the Decentralized Label Model (DLM) for specifying secure information flows of programs and transition system models for their observable behaviour. On this basis, we provide a bisimulation based formal definition of refactoring and show its correspondence to the formal notion of information flow security (noninterference). This permits us to show security of refactoring patterns that have already been practically explored
    • 

    corecore