Learn More
—Maximum-flow algorithms are used to find spam sites, build content voting system, discover communities, etc., on graphs from the Internet. Such graphs are now so large that they have outgrown conventional memory-resident algorithms. In this paper, we show how to effectively parallelize a max-flow algorithm based on the Ford-Fulkerson method on a cluster(More)
The effects of interleukin-1beta (IL-1beta) and interleukin-6 (IL-6) perfused locally into the anterior hypothalamus (AHY) on serotonin (5-hydroxytryptamine, 5-HT) release were investigated in the same region using in vivo microdialysis in conscious, freely moving F344 rats. IL-1beta (1 ng/rat) or IL-6 (50 ng/rat) injected directly into the AHY elicited a(More)
Dynamically linked libraries are commonly used in software programs to facilitate code reuse. Once a library is linked into a software program, a bug in the library can lead to compromise of the whole program. Moreover, the library may also contain malicious code. Existing solutions for software component isolation assume simple interactions between a(More)
Lethal toxin (LT) is a critical virulence factor of Bacillus anthracis, the etiological agent of anthrax, whose pulmonary form is fatal in the absence of treatment. Inflammatory response is a key process of host defense against invading pathogens. We report here that intranasal instillation of a B. anthracis strain bearing inactive LT stimulates cytokine(More)
The aim of this study was to evaluate the presence of type-II secretory phospholipase A2 (sPLA2-IIA) in alveolar space and its possible role in the destruction of surfactant in three rat models of acute lung injury. Alveolar instillation of either lipopolysaccaride or live Pseudomonas aeruginosa resulted in a significant increase in lung oedema and in a(More)
—The principle of least privilege requires that software components should be granted only necessary privileges, so that compromising one component does not lead to compromising others. However, writing privilege separated software is difficult and as a result, a large number of software is monolithic, i.e., it runs as a whole without separation. Manually(More)
The problem of malware is greatly reduced if we can ensure that only software from trusted providers is executed. In this paper, we have built a prototype system on Windows which performs authentication of all binaries in Windows to ensure that only trusted software is executed and from the correct path. Binaries on Windows are made more complex because(More)