Joshua Baron

Learn More
Sleep disorders are common in adult dialysis patients, with a prevalence of 60%–80%. To date, sleep disturbances have not been assessed in the pediatric dialysis population. Therefore, the objective of this study is to describe the prevalence of sleep disturbance symptoms in a pediatric dialysis population. We conducted a telephone- or clinic-based(More)
In this paper we consider the problem of secure pattern matching that allows singlecharacter wildcards and substring matching in the malicious (stand-alone) setting. Our protocol, called 5PM, is executed between two parties: Server, holding a text of length n, and Client, holding a pattern of length m to be matched against the text, where our notion of(More)
Alzheimer's disease (AD) is often accompanied by impaired object recognition, thereby reducing the ability to recognize common objects and familiar faces. Impaired recognition may stem from decreased efficacy in integrating visual information. Studies of perceptual abnormalities in AD indicate an impairment in organizing elements of the visual scene,(More)
Proactive secret sharing (PSS) schemes are designed for settings where long-term confidentiality of secrets has to be guaranteed, specifically, when all participating parties may eventually be corrupted. PSS schemes periodically refresh secrets and reset corrupted parties to an uncorrupted state; in PSS the corruption threshold t is replaced with a(More)
In this paper we consider the problem of secure pattern matching that allows singlecharacter wildcards and substring matching in the malicious (stand-alone) setting. Our protocol, called 5PM, is executed between two parties: Server, holding a text of length n, and Client, holding a pattern of length m to be matched against the text, where our notion of(More)
The purpose of this study was to characterize the epileptogenicity of tubers and surrounding cortex in patients with tuberous sclerosis complex (TSC). Three pediatric patients with TSC and intractable epilepsy underwent surgical resection of tubers associated with epileptogenic foci. In all patients, presurgical imaging revealed a prominent tuber that(More)
In PODC 1991 Ostrovsky and Yung [35] introduced the proactive security model, where corruptions spread throughout the network, analogous to the spread of a virus or a worm. PODC 2006 distinguished lecture by Danny Dolev, that also appears in the PODC06 proceedings, lists the above work as one of PODC's "Century Papers at the First Quarter-Century Milestone"(More)
The number field sieve is a relatively new method to factor large integers. Its most notable success is the factorization of the ninth Fermat number. It is significantly faster than all known existing integer factoring algorithms. We examine the theoretical underpinnings of the sieve; after understanding how it works, we state the algorithm. We look mostly(More)