Learn More
OceanStore is a utility infrastructure designed to span the globe and provide continuous access to persistent information. Since this infrastructure is comprised of untrusted servers, data is protected through redundancy and cryptographic techniques. To improve performance, data is allowed to be cached anywhere, anytime. Additionally, monitoring of usage(More)
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective tools for executing spam campaigns and spreading malware. Intuitively, a user is more likely to respond to a message from a Facebook friend than from a stranger, thus making(More)
Jasmonates (JAs) mediate plant responses to insect attack, wounding, pathogen infection, stress, and UV damage and regulate plant fertility, anthocyanin accumulation, trichome formation, and many other plant developmental processes. Arabidopsis thaliana Jasmonate ZIM-domain (JAZ) proteins, substrates of the CORONATINE INSENSITIVE1 (COI1)-based SCF(COI1)(More)
Zero-day polymorphic worms pose a serious threat to the security of Internet infrastructures. Given their rapid propagation, it is crucial to detect them at edge networks and automatically generate signatures in the early stages of infection. Most existing approaches for automatic signature generation need host information and are thus not applicable for(More)
CRISPR/Cas9 genome targeting systems have been applied to a variety of species. However, most CRISPR/Cas9 systems reported for plants can only modify one or a few target sites. Here, we report a robust CRISPR/Cas9 vector system, utilizing a plant codon optimized Cas9 gene, for convenient and high-efficiency multiplex genome editing in monocot and dicot(More)
We present an experimental study of three school choice mechanisms. The Boston mechanism is influential in practice, while the two alternative mechanisms, the Gale-Shapley and Top Trading Cycles mechanisms , have superior theoretical properties in terms of incentives and efficiency. Consistent with theory, this study indicates a high preference manipulation(More)
This is the rst systematic experimental study of the comparative performance of two incentive compatible mechanisms for public goods provision: the Basic Quadratic mechanism by Groves and Ledyard and the Paired-Diierence mechanism by W alker. Our experiments demonstrate that the performance of the Basic Quadratic mechanism under a high punishment parameter(More)
Traffic anomalies such as failures and attacks are commonplace in today's network, and identifying them rapidly and accurately is critical for large network operators. The detection typically treats the traffic as a collection of flows that need to be examined for significant changes in traffic pattern (eg, volume, number of connections). However, as link(More)
".. . professional investment may be likened to those newspaper competitions in which the competitors have to pick out the six prettiest faces from a hundred photographs, the prize being awarded to the competitor whose choice most nearly corresponds to the average preferences of the competitors as a whole; so that each competitor has to pick, not those(More)
Identity is a central concept in the social sciences. In this study, we present a laboratory experiment that measures the effects of induced group identity on participant social preferences. We find that when participants are matched with an ingroup member (as opposed to an outgroup member) they show a 47% increase in charity concerns when they have a(More)