14,784 research outputs found
A review of the Helophorus frater-praenanus group of species, with description of a new species and additional faunal records of Helophorus Fabricius from China and Bhutan (Coleoptera: Helophoridae)
The six species of the East Palaearctic Helophorus frater-praenanus group (Coleoptera: Helophoridae) are reviewed and a new species, H. aquila sp.n. is described from China (Qinghai). Habitus,
head and pronotum and aedeagophores are figured for all the species and a key for their identification
is given. Four further species which could be confused with the H. frater-praenanus group are
discussed and illustrated. These are H. croaticus KUWERT, 1886, H. pumilio ERICHSON, 1837, H.
pitcheri ANGUS, 1970 and H. shatrovskyi ANGUS, 1985. Additional faunal records of Helophorus
FABRICIUS species from the Tibetan Plateau and other areas of China are given. Helophorus
tuberculatus GYLLENHAL, 1808 is recorded from Bhutan for the first time©Wiener Coleopterologenverein (WCV). The attached paper is the published pdf. https://www.zobodat.at/pdf/KOR_84_2014_0209-0219.pd
DeltaPhish: Detecting Phishing Webpages in Compromised Websites
The large-scale deployment of modern phishing attacks relies on the automatic
exploitation of vulnerable websites in the wild, to maximize profit while
hindering attack traceability, detection and blacklisting. To the best of our
knowledge, this is the first work that specifically leverages this adversarial
behavior for detection purposes. We show that phishing webpages can be
accurately detected by highlighting HTML code and visual differences with
respect to other (legitimate) pages hosted within a compromised website. Our
system, named DeltaPhish, can be installed as part of a web application
firewall, to detect the presence of anomalous content on a website after
compromise, and eventually prevent access to it. DeltaPhish is also robust
against adversarial attempts in which the HTML code of the phishing page is
carefully manipulated to evade detection. We empirically evaluate it on more
than 5,500 webpages collected in the wild from compromised websites, showing
that it is capable of detecting more than 99% of phishing webpages, while only
misclassifying less than 1% of legitimate pages. We further show that the
detection rate remains higher than 70% even under very sophisticated attacks
carefully designed to evade our system.Comment: Preprint version of the work accepted at ESORICS 201
Cellular modelling of Alström syndrome in human primary dermal fibroblasts and derived cells
RIGHTS : This article is licensed under the BioMed Central licence at http://www.biomedcentral.com/about/license which is similar to the 'Creative Commons Attribution Licence'. In brief you may : copy, distribute, and display the work; make derivative works; or make commercial use of the work - under the following conditions: the original author must be given credit; for any reuse or distribution, it must be made clear to others what the license terms of this work are
Sub-Planckian black holes and the Generalized Uncertainty Principle
The Black Hole Uncertainty Principle correspondence suggests that there could
exist black holes with mass beneath the Planck scale but radius of order the
Compton scale rather than Schwarzschild scale. We present a modified, self-dual
Schwarzschild-like metric that reproduces desirable aspects of a variety of
disparate models in the sub-Planckian limit, while remaining Schwarzschild in
the large mass limit. The self-dual nature of this solution under naturally implies a Generalized Uncertainty Principle
with the linear form . We also
demonstrate a natural dimensional reduction feature, in that the gravitational
radius and thermodynamics of sub-Planckian objects resemble that of -D
gravity. The temperature of sub-Planckian black holes scales as rather than
but the evaporation of those smaller than g is suppressed by
the cosmic background radiation. This suggests that relics of this mass could
provide the dark matter.Comment: 12 pages, 9 figures, version published in J. High En. Phy
Bribeproof mechanisms for two-values domains
Schummer (Journal of Economic Theory 2000) introduced the concept of
bribeproof mechanism which, in a context where monetary transfer between agents
is possible, requires that manipulations through bribes are ruled out.
Unfortunately, in many domains, the only bribeproof mechanisms are the trivial
ones which return a fixed outcome.
This work presents one of the few constructions of non-trivial bribeproof
mechanisms for these quasi-linear environments. Though the suggested
construction applies to rather restricted domains, the results obtained are
tight: For several natural problems, the method yields the only possible
bribeproof mechanism and no such mechanism is possible on more general domains.Comment: Extended abstract accepted to SAGT 2016. This ArXiv version corrects
typos in the proofs of Theorem 7 and Claims 28-29 of prior ArXiv versio
Hybrid copula mixed models for combining case-control and cohort studies in meta-analysis of diagnostic tests
Copula mixed models for trivariate (or bivariate) meta-analysis of diagnostic test accuracy studies accounting (or not) for disease prevalence have been proposed in the biostatistics literature to synthesize information. However, many systematic reviews often include case-control and cohort studies, so one can either focus on the bivariate meta-analysis of the case-control studies or the trivariate meta-analysis of the cohort studies, as only the latter contains information on disease prevalence. In order to remedy this situation of wasting data we propose a hybrid copula mixed model via a combination of the bivariate and trivariate copula mixed model for the data from the case-control studies and cohort studies, respectively. Hence, this hybrid model can account for study design and also due to its generality can deal with dependence in the joint tails. We apply the proposed hybrid copula mixed model to a review of the performance of contemporary diagnostic imaging modalities for detecting metastases in patients with melanoma
Measurement of the Branching Fraction of J/psi --> pi+ pi- pi0
Using 58 million J/psi and 14 million psi' decays obtained by the BESII
experiment, the branching fraction of J/psi --> pi+ pi- pi0 is determined. The
result is (2.10+/-0.12)X10^{-2}, which is significantly higher than previous
measurements.Comment: 9 pages, 8 figures, RevTex
Search for K_S K_L in psi'' decays
K_S K_L from psi'' decays is searched for using the psi'' data collected by
BESII at BEPC, the upper limit of the branching fraction is determined to be
B(psi''--> K_S K_L) < 2.1\times 10^{-4} at 90% C. L. The measurement is
compared with the prediction of the S- and D-wave mixing model of the
charmonia, based on the measurements of the branching fractions of J/psi-->K_S
K_L and psi'-->K_S K_L.Comment: 5 pages, 1 figur
First observation of psi(2S)-->K_S K_L
The decay psi(2S)-->K_S K_L is observed for the first time using psi(2S) data
collected with the Beijing Spectrometer (BESII) at the Beijing Electron
Positron Collider (BEPC); the branching ratio is determined to be
B(psi(2S)-->K_S K_L) = (5.24\pm 0.47 \pm 0.48)\times 10^{-5}. Compared with
J/psi-->K_S K_L, the psi(2S) branching ratio is enhanced relative to the
prediction of the perturbative QCD ``12%'' rule. The result, together with the
branching ratios of psi(2S) decays to other pseudoscalar meson pairs
(\pi^+\pi^- and K^+K^-), is used to investigate the relative phase between the
three-gluon and the one-photon annihilation amplitudes of psi(2S) decays.Comment: 5 pages, 4 figures, 2 tables, submitted to Phys. Rev. Let
- …