9 resultados para student preference

em Universitätsbibliothek Kassel, Universität Kassel, Germany


Relevância:

20.00% 20.00%

Publicador:

Resumo:

With this document, we provide a compilation of in-depth discussions on some of the most current security issues in distributed systems. The six contributions have been collected and presented at the 1st Kassel Student Workshop on Security in Distributed Systems (KaSWoSDS’08). We are pleased to present a collection of papers not only shedding light on the theoretical aspects of their topics, but also being accompanied with elaborate practical examples. In Chapter 1, Stephan Opfer discusses Viruses, one of the oldest threats to system security. For years there has been an arms race between virus producers and anti-virus software providers, with no end in sight. Stefan Triller demonstrates how malicious code can be injected in a target process using a buffer overflow in Chapter 2. Websites usually store their data and user information in data bases. Like buffer overflows, the possibilities of performing SQL injection attacks targeting such data bases are left open by unwary programmers. Stephan Scheuermann gives us a deeper insight into the mechanisms behind such attacks in Chapter 3. Cross-site scripting (XSS) is a method to insert malicious code into websites viewed by other users. Michael Blumenstein explains this issue in Chapter 4. Code can be injected in other websites via XSS attacks in order to spy out data of internet users, spoofing subsumes all methods that directly involve taking on a false identity. In Chapter 5, Till Amma shows us different ways how this can be done and how it is prevented. Last but not least, cryptographic methods are used to encode confidential data in a way that even if it got in the wrong hands, the culprits cannot decode it. Over the centuries, many different ciphers have been developed, applied, and finally broken. Ilhan Glogic sketches this history in Chapter 6.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the elite domain of interactive sports, athletes who demonstrate a left preference (e.g., holding a weapon with the left hand in fencing or boxing in a ‘southpaw’ stance) seem overrepresented. Such excess indicates a performance advantage and was also interpreted as evidence in favour of frequency-dependent selection mechanisms to explain the maintenance of left-handedness in humans. To test for an overrepresentation, the incidence of athletes’ lateral preferences is typically compared with an expected ratio of left- to right-handedness in the normal population. However, the normal population reference values did not always relate to the sport-specific tasks of interest, which may limit the validity of reports of an excess of ‘left-oriented’ athletes. Here we sought to determine lateral preferences for various sport-specific tasks (e.g., baseball batting, boxing) in the normal population and to examine the relationship between these preferences and handedness. To this end, we asked 903 participants to indicate their lateral preferences for sport-specific and common tasks using a paper-based questionnaire. Lateral preferences varied considerably across the different sport tasks and we found high variation in the relationship between those preferences and handedness. In contrast to unimanual tasks (e.g., fencing or throwing), for bimanually controlled actions such as baseball batting, shooting in ice hockey or boxing the incidence of left preferences was considerably higher than expected from the proportion of left-handedness in the normal population and the relationship with handedness was relatively low. We conclude that (i) task-specific reference values are mandatory for reliably testing for an excess of athletes with a left preference, (ii) the term ‘handedness’ should be more cautiously used within the context of sport-related laterality research and (iii) observation of lateral preferences in sports may be of limited suitability for the verification of evolutionary theories of handedness.