877 resultados para Replay Attack
Resumo:
A desktop tool for replay and analysis of gaze-enhanced multiparty virtual collaborative sessions is described. We linked three CAVE (TM)-like environments, creating a multiparty collaborative virtual space where avatars are animated with 3D gaze as well as head and hand motions in real time. Log files are recorded for subsequent playback and analysis Using the proposed software tool. During replaying the user can rotate the viewpoint and navigate in the simulated 3D scene. The playback mechanism relies on multiple distributed log files captured at every site. This structure enables an observer to experience latencies of movement and information transfer for every site as this is important fir conversation analysis. Playback uses an event-replay algorithm, modified to allow fast traversal of the scene by selective rendering of nodes, and to simulate fast random access. The tool's is analysis module can show each participant's 3D gaze points and areas where gaze has been concentrated.
Resumo:
Costs of resistance are widely assumed to be important in the evolution of parasite and pathogen defence in animals, but they have been demonstrated experimentally on very few occasions. Endoparasitoids are insects whose larvae develop inside the bodies of other insects where they defend themselves from attack by their hosts' immune systems (especially cellular encapsulation). Working with Drosophila melanogaster and its endoparasitoid Leptopilina boulardi, we selected for increased resistance in four replicate populations of flies. The percentage of flies surviving attack increased from about 0.5% to between 40% and 50% in five generations, revealing substantial additive genetic variation in resistance in the field population from which our culture was established. In comparison with four control lines, flies from selected lines suffered from lower larval survival under conditions of moderate to severe intraspecific competition.
Resumo:
1. The evolution of host resistance to parasitoid attack will be constrained by two factors: the costs of the ability to defend against attack, and the costs of surviving actual attack. These factors have been investigated using Drosophila melanogaster and its parasitoids as a model system. The costs of defensive ability are expressed as a trade-off with larval competitive ability, whereas the costs of actual defence are exhibited in terms of reduced adult fecundity and size. 2. The costs of actual defence may be ameliorated by the host-choice decisions made by Pachycrepoideus vindemiae, a pupal parasitoid. If larvae that have successfully encapsulated a parasitoid develop into poorer quality hosts, then these may be rejected by ovipositing pupal parasitoids. 3. Pupae developing from larvae that have encapsulated the parasitoid Asobara tabida are smaller and have relatively thinner puparia. Thinner puparia are likely to be associated with a reduction in mechanical strength and possibly with a decrease in desiccation tolerance. 4. Pachycrepoideus vindemiae that develop in capsule-bearing pupae are smaller than those that emerge from previously unattacked hosts. This supports the prediction that ovipositing female P. vindemiae should avoid attacking capsule-bearing hosts. However, in choice experiments with 1-day-old pupae, P. vindemiae females oviposited preferentially in hosts containing a capsule, whereas there was no preference found with 4-day-old hosts. This appears to be a maladaptive host choice decision, as the female pupal parasitoids are preferentially attacking hosts that will result in a reduction of their own fitness. 5. The increased likelihood of attack by a pupal parasitoid is another cost of actual defence against larval parasitoid attack.
Resumo:
The ability to resist or avoid natural enemy attack is a critically important insect life history trait, yet little is understood of how these traits may be affected by temperature. This study investigated how different genotypes of the pea aphid Acyrthosiphon pisum Harris, a pest of leguminous crops, varied in resistance to three different natural enemies (a fungal pathogen, two species of parasitoid wasp and a coccinellid beetle), and whether expression of resistance was influenced by temperature. Substantial clonal variation in resistance to the three natural enemies was found. Temperature influenced the number of aphids succumbing to the fungal pathogen Erynia neoaphidis Remaudiere & Hermebert, with resistance increasing at higher temperatures (18 vs. 28degreesC). A temperature difference of 5degreesC (18 vs. 23degreesC) did not affect the ability of A. pisum to resist attack by the parasitoids Aphidius ervi Haliday and A. eadyi Stary Gonzalez & Hall. Escape behaviour from foraging coccinellid beetles (Hippodamia convergens Guerin-Meneville) was not directly influenced by aphid clone or temperature (16 vs. 21degreesC). However, there were significant interactions between clone and temperature (while most clones did not respond to temperature, one was less likely to escape at 16degreesC), and between aphid clone and ladybird presence (some clones showed greater changes in escape behaviour in response to the presence of foraging coccinellids than others). Therefore, while larger temperature differences may alter interactions between Acyrthosiphon pisum and an entomopathogen, there is little evidence to suggest that smaller changes in temperature will alter pea aphid-natural enemy interactions.
Resumo:
We present a continuous time target zone model of speculative attacks. Contrary to most of the literature that considers the certainty case, i.e., agents know for sure the Central Bank behavior in the future, we build uncertainty into the madel in two different ways. First, we consider the case in whicb the leveI of reserves at which the central bank lets the regime collapse is uncertain. Alternatively, we ana1ize the case in which, with some probability, the government may cbange its policy reducing the initially positive trend in domestic credito In both cases, contrary to the case of a fixed exchange rate regime, speculators face a cost of launching a tentative attack that may not succeed. Such cost induces a delay and may even prevent its occurrence. At the time of the tentative attack, the exchange rate moves either discretely up, if the attack succeeds, or down, if it fails. The remlts are consistent with the fact that, typically, an attack involves substantial profits and losses for the speculators. In particular, if agents believed that the government will control fiscal imbalances in the future, or alternatively, if they believe the trend in domestic credit to be temporary, the attack is postponed even in the presence of a signal of an imminent collapse. Finally, we aIso show that the timing of a speculative attack increases with the width of the target zone.
Resumo:
An important challenge in the crime literature is to isolate causal effects of police on crime. Following a terrorist attack on the main Jewish center in the city of Buenos Aires, Argentina, in July 1994, all Jewish institutions (including schools, synagogues, and clubs) were given 24-hour police protection. Thus, this hideous event induced a geographical allocation of police forces that can be presumed to be exogenous in a crime regression. Using data on the location of car thefts before and after the terrorist attack, we find a large deterrent effect of observable police presence on crime. The effect is local, with little or no appreciable impact outside the narrow area in which the police are deployed.
Resumo:
The authors report a massive attack by Pseudomyrmex ants on a human who touched a Triplaria - novice tree (Triplaris spp). The ants naturally live in these trees and their stings cause intense pain and discrete to moderate local inflammation. The problem is common in sonic Brazilian regions and can be prevented by identifying the trees.
Resumo:
I report some observations of a Chestnut-bellied Euphonia (Euphonia pectoralis) nest in a lowland Atlantic Forest of southeastern Brazil during the early nestling period. During 7.5 hours of observations, the nest was attended 46.3% of the time, 45.6% by the female and 0.7% by the male. Unattended periods lasted 16-38 min. Parents visited the nest most of the time together at 36-59 min intervals. There were 1.06 feeding visits per nestling per hour. The two nestlings in the nest ended up preyed upon by army ants (Labidus praedator, Ecitoninae). The low height of the nest (0.8 m) may have facilitated its detection by the ants.
Resumo:
Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.
Resumo:
A 55-year-old man was attacked by a Brazilian tapir (Tapirus terrestris) after surprising and stabbing the animal in his corn plantation. The victim received deep bites in the thighs, neck, and cervical areas, resulting in severe hemorrhage and death. This is the first report of a tapir incident resulting in death and is of interest because of the severity of the contusions and lacerations caused by the provoked animal.