3 resultados para Time-memory attacks

em Duke University


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Foundational cellular immunology research of the 1960s and 1970s, together with the advent of monoclonal antibodies and flow cytometry, provided the knowledge base and the technological capability that enabled the elucidation of the role of CD4 T cells in HIV infection. Research identifying the sources and magnitude of variation in CD4 measurements, standardized reagents and protocols, and the development of clinical flow cytometers all contributed to the feasibility of widespread CD4 testing. Cohort studies and clinical trials provided the context for establishing the utility of CD4 for prognosis in HIV-infected persons, initial assessment of in vivo antiretroviral drug activity, and as a surrogate marker for clinical outcome in antiretroviral therapeutic trials. Even with sensitive HIV viral load measurement, CD4 cell counting is still utilized in determining antiretroviral therapy eligibility and time to initiate therapy. New point of care technologies are helping both to lower the cost of CD4 testing and enable its use in HIV test and treat programs around the world.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

People are always at risk of making errors when they attempt to retrieve information from memory. An important question is how to create the optimal learning conditions so that, over time, the correct information is learned and the number of mistakes declines. Feedback is a powerful tool, both for reinforcing new learning and correcting memory errors. In 5 experiments, I sought to understand the best procedures for administering feedback during learning. First, I evaluated the popular recommendation that feedback is most effective when given immediately, and I showed that this recommendation does not always hold when correcting errors made with educational materials in the classroom. Second, I asked whether immediate feedback is more effective in a particular case—when correcting false memories, or strongly-held errors that may be difficult to notice even when the learner is confronted with the feedback message. Third, I examined whether varying levels of learner motivation might help to explain cross-experimental variability in feedback timing effects: Are unmotivated learners less likely to benefit from corrective feedback, especially when it is administered at a delay? Overall, the results revealed that there is no best “one-size-fits-all” recommendation for administering feedback; the optimal procedure depends on various characteristics of learners and their errors. As a package, the data are consistent with the spacing hypothesis of feedback timing, although this theoretical account does not successfully explain all of the data in the larger literature.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Encryption and integrity trees guard against phys- ical attacks, but harm performance. Prior academic work has speculated around the latency of integrity verification, but has done so in an insecure manner. No industrial implementations of secure processors have included speculation. This work presents PoisonIvy, a mechanism which speculatively uses data before its integrity has been verified while preserving security and closing address-based side-channels. PoisonIvy reduces per- formance overheads from 40% to 20% for memory intensive workloads and down to 1.8%, on average.