Learn More
Many modern applications are built by combining independently developed packages and services that are distributed over many machines with complex inter-dependencies. The assembly, installation, and management of such applications is hard, and usually performed either manually or by writing customized scripts. We present Engage, a system for configuring,(More)
Dysfunctions in prefrontal cortical networks are thought to underlie working memory (WM) impairments consistently observed in both subjects with bipolar disorder and schizophrenia. It remains unclear, however, whether patterns of WM-related hemodynamic responses are similar in bipolar and schizophrenia subjects compared to controls. We used fMRI to(More)
OBJECTIVE Although several lines of evidence implicate gray matter abnormalities in the prefrontal cortex and anterior cingulate cortex in patients with bipolar disorder, findings have been largely inconsistent across studies. Differences in patients' medication status or mood state or the application of traditional volumetric methods that are insensitive(More)
The <i>event-driven</i> programming style is pervasive as an efficient method for interacting with the environment. Unfortunately, the event-driven style severely complicates program maintenance and understanding, as it requires each logical flow of control to be fragmented across multiple independent <i>callbacks</i>. We propose <i>tasks</i> as a new(More)
Dataflow analyses sacrifice path-sensitivity for efficiency and lead to false positives when used for verification. Predicate refinement based model checking methods are path-sensitive but must perform many expensive iterations to find all the relevant facts about a program, not all of which are naturally expressed and analyzed using predicates. We show how(More)
Role-based access control (RBAC) is a common paradigm to ensure that users have sufficient rights to perform various system operations. In many cases though, traditional RBAC does not easily express application-level security requirements. For instance, in a medical records system it is difficult to express that doctors should only update the records of(More)
Many concurrent systems are required to maintain certain safety and liveness properties. One emerging method of achieving confidence in such systems is to statically verify them using <i>model checking.</i> In this approach an abstract, finite-state model of the system is constructed; then an automatic check is made to ensure that the requirements are(More)
We study the access control integration problem for web services. Organizations frequently use many services , each with its own access control policies, that must interoperate while maintaining secure access to information. The integration problem is to take the set of such services and to find a globally consistent access control policy that ensures no(More)
Proton magnetic resonance spectroscopy ((1)HMRS) is an in vivo brain imaging method that can be used to investigate psychotropic drug mechanism of action. This study evaluated baseline (1)HMRS spectra of bipolar depressed patients and whether the level of cerebral metabolites changed after an open trial of lamotrigine, an anti-glutamatergic mood stabilizer.(More)