Learn More
— Call graphs depict the static, caller-callee relation between " functions " in a program. With most source/target languages supporting functions as the primitive unit of composition , call graphs naturally form the fundamental control flow representation available to understand/develop software. They are also the substrate on which various interprocedural(More)
Wireless LAN (WLAN) market consists of IEEE 802.11 MAC standard conformant devices (e.g., access points (APs), client adapters) from multiple vendors. Certain third party certifications such as those specified by the Wi-Fi alliance have been widely used by vendors to ensure basic conformance to the 802.11 standard, thus leading to the expectation that the(More)
This paper presents the design and implementation of a host-based driver (a " volume manager ") for a 3-tier RAID storage system, currently with 3 tiers: a small RAID1 tier and larger RAID5 and compressed RAID5 (cRAID5) tiers. Based on access patterns (" temperature "), the driver automatically migrates frequently ac-cessed data to RAID1 while demoting not(More)
There is significant interest in the NMDA receptor antagonist ketamine due to its efficacy in treating depressive disorders and its induction of psychotic-like symptoms that make it a useful tool for modeling psychosis. The present study extends the successful development of an apparatus and methodology to conduct pharmacological MRI studies in awake rhesus(More)
Protocols for secure archival storage are becoming increasingly important as the use of digital storage for sensitive documents is gaining wider practice. Wong et al.[8] combined verifiable secret sharing with proactive secret sharing without reconstruction and proposed a verifiable secret redistribution protocol for long term storage. However, their(More)
The ever-increasing volume of archival data that needs to be reliably retained for long periods of time and the decreasing costs of disk storage, memory, and processing have motivated the design of low-cost, high-efficiency disk-based storage systems. However, <i>managed</i> disk storage is still expensive. To further lower the cost, redundancy can be(More)