Matthew Stillerman

Learn More
The first step in defending against an information warfare attack is discovering that the attack has occurred or is in progress. Intrusion detection is the field that attempts to discover attacks (whether from external hackers or internal misuse), preferably while they are still under way [7]. Most work in intrusion detection has focused on the network or(More)
We describe a static analysis method on Java bytecode to determine class initialization dependencies. This method can be used for eager class loading and initialization. It catches many initialization circularities that are missed by the standard lazy implementation. Except for contrived examples, the computed initialization order gives the same results as(More)
Clindamycin palmitate and potassium phenoxymethyl penicillin were evaluated in 103 children with upper respiratory illnesses and pharyngeal group A streptococci, from November 1970 to July 1971. The children were assigned randomly by weight to one of the antibiotic regimens given orally for 10 days. Clindamycin palmitate and potassium phenoxymethyl(More)
The purpose of the study was to compare the efficacy of cefaclor with that of penicillin V potassium (penicillin) in patients with Group A streptococcal pharyngitis. One hundred four children with pharyngitis and serologically confirmed Group A streptococci were randomly treated with cefaclor or penicillin using a mean dosage of 20 mg/kg/day for 10 days.(More)