Eric A. Fischer

Learn More
Within a population of simultaneous hermaphrodites, individuals may vary in both their current reproductive investment (biomass invested in gonads) and in how they allocate that investment between male and female function. In the chalk bass, Serranus tortugarum, estimates of both reproductive allocation and reproductive success as a male and a female can be(More)
In July 2003, computer scientists from Johns Hopkins and Rice Universities released a security analysis of software purportedly from a direct recording electronic (DRE) touchscreen voting machine of a major voting-system vendor. The study drew public attention to a long-simmering controversy about whether current DREs are vulnerable to tampering that could(More)
Most voting systems used in U.S. elections rely on computers in some way. The most computerized is the direct recording electronic voting machine, or DRE. In this system, votes are recorded directly onto computer memory devices. While DREs have been in use since the early 1990s, questions about their security and reliability were previously a relatively(More)
An ELISA method is presented which is based on covalent binding of detergent-solubilized membrane proteins to surface-modified polystyrene plates (Chemobond plates). These plates carried 0.52-0.65 nmol of aldehyde groups per well (150 microliters) and allowed coupling of protein by Schiff base formation either at high pH and subsequent reduction with NaBH4(More)
Cloud computing is a new name for an old concept: the delivery of computing services from a remote location, analogous to the way electricity, water, and other utilities are provided to most customers. Cloud computing services are delivered through a network, usually the Internet. Some cloud services are adaptations of familiar applications, such as e-mail(More)
For more than a decade, various experts have expressed increasing concerns about cybersecurity, in light of the growing frequency, impact, and sophistication of attacks on information systems in the United States and abroad. Consensus has also been building that the current legislative framework for cybersecurity might need to be revised. The complex(More)
The federal role in cybersecurity has been a topic of discussion and debate for over a decade. Despite significant legislative efforts in the 112 th Congress on bills designed to improve the cybersecurity of U.S. critical infrastructure (CI), no legislation on that issue was enacted in that Congress. In an effort to address the issue in the absence of(More)