Learn More
Event-Related Potentials (ERPs) are a basic, non-invasive method of neurophysiological investigation. They can be used to assess aspects of human cognitive information processing. They also can be used in experiments on higher mammals. The most important and the most studied component of the ERP record is the P3 wave. It consists of two parts, P3a and P3b.(More)
  • Dyanne Sheldon, Tom Hruby, Patricia Johnson, Kim Harper, Andy Mcmillan, Teri Granger +9 others
  • 2005
Final Funding for this project was funded in part through a grant from the United States Environmental Protection Agency (EPA Region 10 and EPA Headquarters Grant #'s CD-970018-01 and CD-970585-01, Ralph Rogers, grant officer). The views herein are those of the authors and do not necessarily reflect the views of EPA. If you have special accommodation needs(More)
  • Teri Granger, Tom Hruby, Andy Mcmillan, Douglas Peters, Jane Rubey, Dyanne Sheldon +9 others
  • 2005
Final Funding for this project was funded in part through a grant from the United States Environmental Protection Agency (EPA Region 10 and EPA Headquarters Grant #'s CD-970018-01 and CD-970585-01, Joan Cabreza, grant officer). The views herein are those of the authors and do not necessarily reflect the views of EPA. If you have special accommodation needs(More)
Programming specialized network processors (NPU) is inherently difficult. Unlike mainstream processors where architectural features such as out-of-order execution and caches hide most of the complexities of efficient program execution, programmers of NPUs face a 'bare-metal' view of the architecture. They have to deal with a multithreaded environment with a(More)
Breaking up the OS in many small components is attractive from a dependability point of view. If one of the components crashes or needs an update, we can replace it on the fly without taking down the system. The question is how to achieve this without sacrificing performance and without wasting resources unnecessarily. In this paper, we show that(More)
Current intrusion detection systems have a narrow scope. They target flow aggregates, reconstructed TCP streams, individual packets or application-level data fields, but no existing solution is capable of handling all of the above. Moreover, most systems that perform payload inspection on entire TCP streams are unable to handle gigabit link rates. We argue(More)
—For many years, multiserver 1 operating systems have been demonstrating, by their design, high dependability and reliability. However, the design has inherent performance implications which were not easy to overcome. Until now the context switching and kernel involvement in the message passing was the performance bottleneck for such systems to get broader(More)
In many workloads, most write operations performed on a file system modify only a small number of blocks. The log-structured file system was designed for such a workload, additionally with the aim of fast crash recovery and system snapshots. Surprisingly, although implemented for Berkeley Sprite and BSD systems, there was no complete implementation for the(More)
Eleven similarity measures were used to assess the impacts of clam digging on the infauna of one intertidal mud-flat. When the similarity matrices were clustered using a divisive polythetic algorithm two different conclusions were possible from the dendograms produced. Dendograms generated by 3 coefficients indicated digging had an impact on areas dug more(More)
Until recently, microkernel-based multiserver systems could not match the performance of monolithic designs due to their architectural choices which prefer high reliability over high performance. With the advent of multicore processors, heterogeneous and over-provisioned architectures, it is possible to employ multiple cores to run individual components of(More)