James Wernicke

Learn More
—Authentication using centralized methods is a primary trust mechanism within most large-scale, enterprise computer networks. This paper proposes using graphs to represent user authentication activity within the network. Using this mechanism over a real enterprise network dataset, we find that non-privileged users and users with system administration(More)
We present an 800-year δ 18 O chronology from the eastern part of the Tibetan Plateau (TP). The chronology dates back to AD 1193 and was sampled in AD 1996 from living Juniperus tibetica trees. This first long-term tree-ring-based δ 18 O chronology for eastern Tibet provides a reliable archive for hydroclimatic reconstructions. Highly significant(More)
The orientations in the tangential plane, i.e., parallel to the pial surface, of dendrites and axons in several functionally different areas of the rat neocortex were investigated. Using a large data base of over 30,000 measurements and the t-test and chi 2 test for significance, we found an overall preference of both dendrites and axons for the(More)
  • 1