Institution
University of Colorado Colorado Springs
Education•Colorado Springs, Colorado, United States•
About: University of Colorado Colorado Springs is a education organization based out in Colorado Springs, Colorado, United States. It is known for research contribution in the topics: Population & Poison control. The organization has 6664 authors who have published 10872 publications receiving 323416 citations. The organization is also known as: UCCS & University of Colorado at Colorado Springs.
Topics: Population, Poison control, Thin film, Capacitor, Ferroelectricity
Papers published on a yearly basis
Papers
More filters
••
TL;DR: The practical application of altitude/hypoxic training as used by elite athletes is described and an update on the most recent statement from WADA regarding the use of simulated altitude devices is concluded.
Abstract: At the Olympic level, differences in performance are typically less than 0.5%. This helps explain why many contemporary elite endurance athletes in summer and winter sport incorporate some form of altitude/hypoxic training within their year-round training plan, believing that it will provide the "competitive edge" to succeed at the Olympic level. The purpose of this paper is to describe the practical application of altitude/hypoxic training as used by elite athletes. Within the general framework of the paper, both anecdotal and scientific evidence will be presented relative to the efficacy of several contemporary altitude/hypoxic training models and devices currently used by Olympic-level athletes for the purpose of legally enhancing performance. These include the three primary altitude/hypoxic training models: 1) live high+train high (LH+TH), 2) live high+train low (LH+TL), and 3) live low+train high (LL+TH). The LH+TL model will be examined in detail and will include its various modifications: natural/terrestrial altitude, simulated altitude via nitrogen dilution or oxygen filtration, and hypobaric normoxia via supplemental oxygen. A somewhat opposite approach to LH+TL is the altitude/hypoxic training strategy of LL+TH, and data regarding its efficacy will be presented. Recently, several of these altitude/hypoxic training strategies and devices underwent critical review by the World Anti-Doping Agency (WADA) for the purpose of potentially banning them as illegal performance-enhancing substances/methods. This paper will conclude with an update on the most recent statement from WADA regarding the use of simulated altitude devices.
164 citations
••
TL;DR: Greater awareness of the problems associated with boys who both bully and are victimized is necessary for improved intervention.
Abstract: Objective To determine among male adolescents whether bully-victims would report the poorest psychosocial health, the worst attitudes toward school, more problem behavior (delinquency, weapons possession, and substance use), and more physical injury compared with bullies, victims, and neutral students. We also assessed ethnic differences in bullying category membership. Methods Employing multisample latent variable models, we contrasted 1,312 males in grades 7-12 classified as bullies (n = 299), victims (n = 180), bully-victims (n = 195), and neutral (n = 638) on school attitudes, psychosocial health, problem behaviors, and physical injury. Results Hypotheses were generally confirmed, especially contrasts between bully-victims and neutrals. However, bullies did not have better school attitudes than bully-victims, and victims only marginally reported better psychological health than bully-victims. The boys of mixed ethnicity were more likely to be victims. Conclusions Greater awareness of the problems associated with boys who both bully and are victimized is necessary for improved intervention. Language: en
164 citations
••
TL;DR: This paper introduces an asynchronous parallel PSO algorithm that greatly improves the parallel speedup in cases where a heterogeneous parallel environment is used and/or where the analysis time depends on the design point being analyzed.
Abstract: A parallel Particle Swarm Optimization (PSO) algorithm is presented. Particle swarm optimization is a fairly recent addition to the family of non-gradient based, probabilistic search algorithms that is based on a simplified social model and is closely tied to swarming theory. Although PSO algorithms present several attractive properties to the designer, they are plagued by high computational cost as measured by elapsed time. One approach to reduce the elapsed time is to make use of coarse-grained parallelization to evaluate the design points. Previous parallel PSO algorithms were mostly implemented in a synchronous manner, where all design points within a design iteration are evaluated before the next iteration is started. This approach leads to poor parallel speedup in cases where a heterogeneous parallel environment is used and/or where the analysis time depends on the design point being analyzed. This paper introduces an asynchronous parallel PSO algorithm that greatly improves the parallel e ciency. The asynchronous algorithm is benchmarked on a cluster assembled of Apple Macintosh G5 desktop computers, using the multi-disciplinary optimization of a typical transport aircraft wing as an example.
164 citations
•
13 Nov 1998TL;DR: A content addressable memory (CAM) engine as discussed by the authors is a controller interface between a host signal processor (e.g., a microprocessor) and a plurality of known, commercially available random access memory (RAM) devices.
Abstract: A content addressable memory ('CAM') engine (100) or controller interfaces between a host signal processor (e.g., a microprocessor) and a plurality of known, commercially-available random access memory ('RAM') devices. The CAM engine (100) configures the RAM as content addressable memory, thereby causing the normally location-addressd RAM to function as CAM. The CAM engine (100) thus allows for the benefits of both RAM and CAM devices, such as speed, density, cost and intuitiveness, without their inherent drawbacks. Further, the CAM engine (100) implements various flexible memory storage configurations for the keys and associations stored in RAM. Also, the CAM engine (100) implements certain algorithms that provide for the hashing of data, for table load and unload capabilities, for proximity matching, for dealing with overflow conditions, and for implementing hierarchical search capabilities.
163 citations
••
TL;DR: This survey provides a comparison of port scan methods based on type, mode of detection, mechanism used for detection and other characteristics, and reports on the available data sets and evaluation criteria for port scan detection approaches.
Abstract: Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of Internet protocol addresses to find vulnerable hosts to compromise. However, it is also useful for system administrators and other network defenders to detect port scans as possible preliminaries to more serious attacks. It is a very difficult task to recognize instances of malicious port scanning. In general, a port scan may be an instance of a scan by attackers or an instance of a scan by network defenders. In this survey, we present research and development trends in this area. Our presentation includes a discussion of common port scan attacks. We provide a comparison of port scan methods based on type, mode of detection, mechanism used for detection and other characteristics. This survey also reports on the available data sets and evaluation criteria for port scan detection approaches.
162 citations
Authors
Showing all 6706 results
Name | H-index | Papers | Citations |
---|---|---|---|
Jeff Greenberg | 105 | 542 | 43600 |
James F. Scott | 99 | 714 | 58515 |
Martin Wikelski | 89 | 420 | 25821 |
Neil W. Kowall | 89 | 279 | 34943 |
Ananth Dodabalapur | 85 | 394 | 27246 |
Tom Pyszczynski | 82 | 246 | 30590 |
Patrick S. Kamath | 78 | 466 | 31281 |
Connie M. Weaver | 77 | 473 | 30985 |
Alejandro Lucia | 75 | 680 | 23967 |
Michael J. McKenna | 70 | 356 | 16227 |
Timothy J. Craig | 69 | 458 | 18340 |
Sheldon Solomon | 67 | 150 | 23916 |
Michael H. Stone | 65 | 370 | 16355 |
Christopher J. Gostout | 65 | 334 | 13593 |
Edward T. Ryan | 60 | 303 | 11822 |