52 research outputs found

    Cue usage in volleyball : a time course comparison of elite, intermediate and novice female players

    Get PDF
    This study compared visual search strategies in adult female volleyball players of three levels. Video clips of the attack of the opponent team were presented on a large screen and participants reacted to the final pass before the spike. Reaction time, response accuracy and eye movement patterns were measured. Elite players had the highest response accuracy (97.50 ± 3.5%) compared to the intermediate (91.50 ± 4.7%) and novice players (83.50 ± 17.6%; p<0.05). Novices had a remarkably high range of reaction time but no significant differences were found in comparison to the reaction time of elite and intermediate players. In general, the three groups showed similar gaze behaviour with the apparent use of visual pivots at moments of reception and final pass. This confirms the holistic model of image perception for volleyball and suggests that expert players extract more information from parafoveal regions

    The Belgian Electronic Identity Card: a Verification Case Study

    Get PDF
    In the field of annotation-based source code level program verification for Java-like languages, separation-logic based verifiers offer a promising alternative to classic JML based verifiers such as ESC/Java2, the Mobius tool or Spec#. Researchers have demonstrated the advantages of separation logic based verification by showing that it is feasible to verify very challenging (though very small) sample code, such as design patterns, or highly concurrent code. However, there is little experience in using this new breed of verifiers on real code. In this paper we report on our experience of verifying several thousands of lines of Java Card code using VeriFast, one of the state-of-the-art separation logic based verifiers. We quantify annotation overhead, verification performance, and impact on code quality (number of bugs found). Finally, our experiments suggest a number of potential improvements to the VeriFast tool

    Cycling around a curve : the effect of cycling speed on steering and gaze behavior

    Get PDF
    Although it is generally accepted that visual information guides steering, it is still unclear whether a curvature matching strategy or a 'look where you are going' strategy is used while steering through a curved road. The current experiment investigated to what extent the existing models for curve driving also apply to cycling around a curve, and tested the influence of cycling speed on steering and gaze behavior. Twenty-five participants were asked to cycle through a semicircular lane three consecutive times at three different speeds while staying in the center of the lane. The observed steering behavior suggests that an anticipatory steering strategy was used at curve entrance and a compensatory strategy was used to steer through the actual bend of the curve. A shift of gaze from the center to the inside edge of the lane indicates that at low cycling speed, the 'look where you are going' strategy was preferred, while at higher cycling speeds participants seemed to prefer the curvature matching strategy. Authors suggest that visual information from both steering strategies contributes to the steering system and can be used in a flexible way. Based on a familiarization effect, it can be assumed that steering is not only guided by vision but that a short-term learning component should also be taken into account

    ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel

    Get PDF
    Abstract. We propose a theoretical framework for a network covert channel based on enumerative combinatorics. It offers protocol independence and avoids detection by using a mimicry defense. Using a network monitoring phase, traffic is analyzed to detect which application-layer protocols are allowed through the firewalls. Using these results, a covert channel is built based on permutations of benign network objects, such as FTP commands and HTTP requests to different web servers. Any protocol that offers reliability guarantees can be plugged into the framework. This includes any protocol that is built on top of the TCP protocol. The framework closely mimics the behavioral statistics of the legitimate traffic, making the covert channel very hard to detect
    • …
    corecore