Learn More
Characterizing and mapping the relationship between neuronal reorganization and functional recovery are essential to the understanding of cerebral plasticity and the dynamic processes which occur following brain damage. The neuronal mechanisms underlying linguistic recovery following left hemisphere (LH) lesions are still unknown. Using functional magnetic(More)
Mitigation of security risk is an important task in enterprise network security management. However it is presently a skill acquired by individual experience, more an art than a science. The biggest challenge in the problem is a quantitative model that objectively measures the likelihood a breach can be accomplished. This paper presents a sound and(More)
A three-dimensional unstructured mesh discretization of the rotational from of the incompressible Navier–Stokes is presented. The method uses novel and highly efficient algorithms for interpolating the velocity vector and constructing the convention term. The resulting discretization is shown to conserve mass, kinetic energy, and vorticity to machine(More)
Quantifying security risk is an important and yet difficult task in enterprise network security management. While metrics exist for individual software vulnerabilities, there is currently no standard way of aggregating such metrics. We present a model that can be used to aggregate vulnerability metrics in an enterprise network, producing quantitative(More)
Given the high costs of software testing and fixing bugs after release, early detection of bugs using static analysis can result in significant savings. However, despite their many benefits, recent availability of many such tools, and evidence of a positive return-on-investment, static-analysis tools are not used widely because of various usability and(More)
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this(More)
BACKGROUND Interactions of the Th2 cytokine IL-33 with its receptor ST2 lead to amplified Type 2 immune responses. As Type 2 immune responses are known to mediate protection against helminth infections we hypothesized that the lack of ST2 would lead to an increased susceptibility to filarial infections. METHODOLOGY/PRINCIPAL FINDING ST2 deficient and(More)