Learn More
This paper describes a method of inferring logical relationships between network prefixes within an Autonomous System (AS) using only passive monitoring of BGP messages. By clustering these prefixes based upon similarities between their update times, we create a hierarchy linking the prefixes within the larger AS. We can frequently identify groups of(More)
Critically injured patients are at risk for hypothermia. This study determined the efficacy of three hypothermia prevention strategies: the ChillBuster warming blanket, ChillBuster with a reflective blanket, and two wool blankets. A quasi-experimental design was used to compare changes in core temperature. Following resuscitation from hypovolemic shock, 20(More)
In recent years, we have seen the emergence of numerous types of so-called "overlay" networks in the internet. There are many diverse examples of such overlay networks including the content-delivery-caching networks, implemented by companies like Akamai, the peer-to-peer file sharing networks associated with applications such as BitTorrent, the(More)
This paper empirically examines patents for financial formulas and methods, whose patentability was recently confirmed in the litigation between State Street Bank and Trust and Signature Financial Group. The number of such filings and awards has been accelerating. Patent filings by academics have been very infrequent, which appears to be a consequence of a(More)
In this paper, the integral groundwater investigation method is used for the quantification of PCE and TCE mass flow rates at an industrialized urban area in Linz, Austria. In this approach, pumping wells positioned along control planes perpendicular to the groundwater flow direction are operated for a time period on the order of days and sampled for(More)
Over the past several years, we have seen the emergence of numerous types of so-called "overlay" networks in the Internet. There are many diverse examples of such overlay networks including the content-delivery-caching networks, implemented by companies like Akamai, the peer-to-peer file sharing networks associated with applications such as BitTorrent, the(More)