331 research outputs found

    Senior Programmers: Characteristics of Elderly Users from Stack Overflow

    Full text link
    In this paper we presents results of research about elderly users of Stack Overflow (Question and Answer portal for programmers). They have different roles, different main activities and different habits. They are an important part of the community, as they tend to have higher reputation and they like to share their knowledge. This is a great example of possible way of keeping elderly people active and helpful for society

    The absolute position of a resonance peak

    Full text link
    It is common practice in scattering theory to correlate between the position of a resonance peak in the cross section and the real part of a complex energy of a pole of the scattering amplitude. In this work we show that the resonance peak position appears at the absolute value of the pole's complex energy rather than its real part. We further demonstrate that a local theory of resonances can still be used even in cases previously thought impossible

    Pro and Con, A Complete Investigation of the Sunday School Question Viewed from a Bible Standpoint

    Get PDF
    In the first third of the twentieth century a significant debate was held among Churches of Christ concerning the propriety of employing Sunday Schools to teach the Bible in congregational settings. Trott and Clark\u27s tract is an early summary of the arguments.https://digitalcommons.acu.edu/crs_books/1012/thumbnail.jp

    Calculations of time-dependent observables in non-Hermitian quantum mechanics: The problem and a possible solution

    Full text link
    The solutions of the time independent Schrodinger equation for non-Hermitian (NH) Hamiltonians have been extensively studied and calculated in many different fields of physics by using L^2 methods that originally have been developed for the calculations of bound states. The existing non-Hermitian formalism breaks down when dealing with wavepackets(WP). An open question is how time dependent expectation values can be calculated when the Hamiltonian is NH ? Using the F-product formalism, which was recently proposed, [J. Phys. Chem., 107, 7181 (2003)] we calculate the time dependent expectation values of different observable quantities for a simple well known study test case model Hamiltonian. We carry out a comparison between these results with those obtained from conventional(i.e., Hermitian) quantum mechanics (QM) calculations. The remarkable agreement between these results emphasizes the fact that in the NH-QM, unlike standard QM, there is no need to split the entire space into two regions; i.e., the interaction region and its surrounding. Our results open a door for a type of WP propagation calculations within the NH-QM formalism that until now were impossible.Comment: 20 pages, 5 Postscript figures. To be Published in Physical Review

    Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS

    Get PDF
    The task of combining cryptographic keys, some of which may be maliciously formed, into one key, which is (pseudo)random is a central task in cryptographic systems. For example, it is a crucial component in the widely used TLS and Signal protocols. From an analytical standpoint, current security proofs model such key combiners as dual-PRFs -- a function which is a PRF when keyed by either of its two inputs -- guaranteeing pseudo-randomness if one of the keys is compromised or even maliciously chosen by an adversary. However, in practice, protocols mostly use HKDF as a key combiner, despite the fact that HKDF was never proven to be a dual-PRF. Security proofs for these protocols usually work around this issue either by simply assuming HKDF to be a dual-PRF anyway, or by assuming ideal models (e.g. modelling underlying hash functions as random oracles). We identify several deployed protocols and upcoming standards where this is the case. Unfortunately, such heuristic approaches to security tend not to withstand the test of time, often leading to deployed systems that eventually become completely insecure. In this work, we narrow the gap between theory and practice for key combiners. In particular, we give a construction of a dual-PRF that can be used as a drop-in replacement for current heuristic key combiners in a range of protocols. Our construction follows a theoretical construction by Bellare and Lysyanskaya, and is based on concrete hardness assumptions, phrased in the spirit of one-wayness. Therefore, our construction provides security unless extremely strong attacks against the underlying cryptographic hash function are discovered. Moreover, since these assumptions are considered post-quantum secure, our construction can safely be used in new hybrid protocols. From a practical perspective, our dual-PRF construction is highly efficient, adding only a few microseconds in computation time compared to currently used (heuristic) approaches. We believe that our approach exemplifies a perfect middle-ground for practically efficient constructions that are supported by realistic hardness assumptions

    Analysis of Software Patches Using Numerical Abstract Interpretation

    Get PDF
    International audienceWe present a static analysis for software patches. Given two syntactically close versions of a program, our analysis can infer a semantic difference, and prove that both programs compute the same outputs when run on the same inputs. Our method is based on abstract interpretation, and parametric in the choice of an abstract domain. We focus on numeric properties only. Our method is able to deal with unbounded executions of infinite-state programs, reading from infinite input streams. Yet, it is limited to comparing terminating executions, ignoring non terminating ones.We first present a novel concrete collecting semantics, expressing the behaviors of both programs at the same time. Then, we propose an abstraction of infinite input streams able to prove that programs that read from the same stream compute equal output values. We then show how to leverage classic numeric abstract domains, such as polyhedra or octagons, to build an effective static analysis. We also introduce a novel numeric domain to bound differences between the values of the variables in the two programs, which has linear cost, and the right amount of relationality to express useful properties of software patches.We implemented a prototype and experimented on a few small examples from the literature. Our prototype operates on a toy language, and assumes a joint syntactic representation of two versions of a program given, which distinguishes between common and distinctive parts

    Whole Genome Sequencing Shows a Low Proportion of Tuberculosis Disease Is Attributable to Known Close Contacts in Rural Malawi.

    Get PDF
    BACKGROUND: The proportion of tuberculosis attributable to transmission from close contacts is not well known. Comparison of the genome of strains from index patients and prior contacts allows transmission to be confirmed or excluded. METHODS: In Karonga District, Malawi, all tuberculosis patients are asked about prior contact with others with tuberculosis. All available strains from culture-positive patients were sequenced. Up to 10 single nucleotide polymorphisms between index patients and their prior contacts were allowed for confirmation, and ≥ 100 for exclusion. The population attributable fraction was estimated from the proportion of confirmed transmissions and the proportion of patients with contacts. RESULTS: From 1997-2010 there were 1907 new culture-confirmed tuberculosis patients, of whom 32% reported at least one family contact and an additional 11% had at least one other contact; 60% of contacts had smear-positive disease. Among case-contact pairs with sequences available, transmission was confirmed from 38% (62/163) smear-positive prior contacts and 0/17 smear-negative prior contacts. Confirmed transmission was more common in those related to the prior contact (42.4%, 56/132) than in non-relatives (19.4%, 6/31, p = 0.02), and in those with more intense contact, to younger index cases, and in more recent years. The proportion of tuberculosis attributable to known contacts was estimated to be 9.4% overall. CONCLUSIONS: In this population known contacts only explained a small proportion of tuberculosis cases. Even those with a prior family contact with smear positive tuberculosis were more likely to have acquired their infection elsewhere

    Online and social networking interventions for the treatment of depression in young people: a systematic review

    Get PDF
    BACKGROUND: Major depression accounts for the greatest burden of all diseases globally. The peak onset of depression occurs between adolescence and young adulthood, and for many individuals, depression displays a relapse-remitting and increasingly severe course. Given this, the development of cost-effective, acceptable, and population-focused interventions for depression is critical. A number of online interventions (both prevention and acute phase) have been tested in young people with promising results. As these interventions differ in content, clinician input, and modality, it is important to identify key features (or unhelpful functions) associated with treatment outcomes. OBJECTIVE: A systematic review of the research literature was undertaken. The review was designed to focus on two aspects of online intervention: (1) standard approaches evaluating online intervention content in randomized controlled designs (Section 1), and (2) second-generation online interventions and services using social networking (eg, social networking sites and online support groups) in any type of research design (Section 2). METHODS: Two specific literature searches were undertaken. There was no date range specified. The Section 1 search, which focused on randomized controlled trials, included only young people (12-25 years) and yielded 101 study abstracts, of which 15 met the review inclusion criteria. The Section 2 search, which included all study design types and was not restricted in terms of age, yielded 358 abstracts, of which 22 studies met the inclusion criteria. Information about the studies and their findings were extracted and tabulated for review. RESULTS: The 15 studies identified in Section 1 described 10 trials testing eight different online interventions, all of which were based on a cognitive behavioral framework. All but one of the eight identified studies reported positive results; however, only five of the 15 studies used blinded interviewer administered outcomes with most trials using self-report data. Studies varied significantly in presentation of intervention content, treatment dose, and dropout. Only two studies included moderator or clinician input. Results for Section 2 were less consistent. None of the Section 2 studies reported controlled or randomized designs. With the exception of four studies, all included participants were younger than 25 years of age. Eight of the 16 social networking studies reported positive results for depression-related outcomes. The remaining studies were either mixed or negative. Findings for online support groups tended to be more positive; however, noteworthy risks were identified. CONCLUSIONS: Online interventions with a broad cognitive behavioral focus appear to be promising in reducing depression symptomology in young people. Further research is required into the effectiveness of online interventions delivering cognitive behavioral subcomponents, such as problem-solving therapy. Evidence for the use of social networking is less compelling, although limited by a lack of well-designed studies and social networking interventions. A range of future social networking therapeutic opportunities are highlighted
    corecore