Learn More
Many modern applications are built by combining independently developed packages and services that are distributed over many machines with complex inter-dependencies. The assembly, installation, and management of such applications is hard, and usually performed either manually or by writing customized scripts. We present Engage, a system for configuring,(More)
Dysfunctions in prefrontal cortical networks are thought to underlie working memory (WM) impairments consistently observed in both subjects with bipolar disorder and schizophrenia. It remains unclear, however, whether patterns of WM-related hemodynamic responses are similar in bipolar and schizophrenia subjects compared to controls. We used fMRI to(More)
OBJECTIVE Although several lines of evidence implicate gray matter abnormalities in the prefrontal cortex and anterior cingulate cortex in patients with bipolar disorder, findings have been largely inconsistent across studies. Differences in patients' medication status or mood state or the application of traditional volumetric methods that are insensitive(More)
Functional neuroimaging studies have implicated the involvement of the amygdala and ventrolateral prefrontal cortex (vlPFC) in the pathophysiology of bipolar disorder. Hyperactivity in the amygdala and hypoactivity in the vlPFC have been reported in manic bipolar patients scanned during the performance of an affective faces task. Whether this pattern of(More)
The <i>event-driven</i> programming style is pervasive as an efficient method for interacting with the environment. Unfortunately, the event-driven style severely complicates program maintenance and understanding, as it requires each logical flow of control to be fragmented across multiple independent <i>callbacks</i>. We propose <i>tasks</i> as a new(More)
OBJECTIVES The inferior frontal cortical-striatal network plays an integral role in response inhibition in normal populations. While inferior frontal cortex (IFC) impairment has been reported in mania, this study explored whether this dysfunction persists in euthymia. METHODS Functional magnetic resonance imaging (fMRI) activation was evaluated in 32(More)
Dataflow analyses sacrifice path-sensitivity for efficiency and lead to false positives when used for verification. Predicate refinement based model checking methods are path-sensitive but must perform many expensive iterations to find all the relevant facts about a program, not all of which are naturally expressed and analyzed using predicates. We show how(More)
Role-based access control (RBAC) is a common paradigm to ensure that users have sufficient rights to perform various system operations. In many cases though, traditional RBAC does not easily express application-level security requirements. For instance, in a medical records system it is difficult to express that doctors should only update the records of(More)
Many concurrent systems are required to maintain certain safety and liveness properties. One emerging method of achieving confidence in such systems is to statically verify them using <i>model checking.</i> In this approach an abstract, finite-state model of the system is constructed; then an automatic check is made to ensure that the requirements are(More)