scispace - formally typeset
Search or ask a question

Showing papers by "University of North Carolina at Charlotte published in 2001"


Journal ArticleDOI
TL;DR: In this article, the antecedents and consequences of displayed emotion in organizations are investigated and the authors propose that customers "catch" the affect of employees through emotional contagion processes.
Abstract: This study focuses on the antecedents and consequences of displayed emotion in organizations. I propose that customers “catch” the affect of employees through emotional contagion processes. Results...

1,194 citations



Journal ArticleDOI
TL;DR: A theoretical construct linking elements of uncertainty with aspects of agility is proposed, pointing out the two‐edged nature of the requisite capabilities.
Abstract: Firms operating in an international environment face a host of uncertainties that make it difficult to meet deadlines reliably. To be reliable in an uncertain and changing environment, firms must be able to quickly respond to changes. The ability to do this in a useful time frame is called agility. Unfortunately, measures taken to increase agility often lead to increases in complexity, which works against agility. We propose a theoretical construct linking elements of uncertainty with aspects of agility, pointing out the two‐edged nature of the requisite capabilities. We illustrate our points with examples from five case studies.

537 citations


Journal ArticleDOI
TL;DR: An analytic modeling framework is developed to determine the relative frequency of query floods for various techniques and shows that while multipath routing is significantly better than single path routing, the performance advantage is small beyond a few paths and for long path lengths.
Abstract: Mobile ad hoc networks are characterized by multi-hop wireless links, absence of any cellular infrastructure, and frequent host mobility. Design of efficient routing protocols in such networks is a challenging issue. As class of routing protocols called on-demandprotocols hs recently found attention because of their low routing overhead. The on-demand protocols depend on query floods to discover routes whenever a new route is needed. Such floods take up a substantial portion of network bandwidth. We focus on a particular on-demand protocol, called Dynamic Source Routing, and show how intelligent use of multipath techniques can reduce the frequency of query floods. We develop an analytic modeling framework to determine the relative frequency of query floods for various techniques. Our modeling effort shows that while multipath routing is significantly better than single path routing, the performance advantage is small beyond a few paths and for long paths lengths. It also shows that providing all intermediate nodes in the primary (shortest) route with alternative paths has a significantly better performance than providing only the source with alternate paths. We perform some simulation experiments which validate these findings.

492 citations


Journal ArticleDOI
TL;DR: In this article, the authors measure the economic value of this "realized" volatility approach in the context of investment decisions and show that the value of switching from daily to intradaily returns to estimate the conditional covariance matix can be substantial.
Abstract: Recent work suggests that intradaily returns can be used to construct estimates of daily return volatility that are more precise than those constructed using daily returns. We measure the economic value of this "realized" volatility approach in the context of investment decisions. Our results indicate that the value of switching from daily to intradaily returns to estimate the conditional covariance matix can be substantial. We estimate that a risk-averse investor would be willing to pay 50 to 200 basis points per year to capture the observed gains in portfolio performance. Moreover,these gains are robust to transaction costs, estimation risk regarding expected returns, and the performance measurement horizon.

412 citations


Journal ArticleDOI
TL;DR: In this article, a study using data collected at two points in time, separated by 6 months, suggested that subordinates resisted their supervisors' downward influence tactics with greater frequency when their supervisors were more abusive and that subordinates' personality moderated the effects of abusive supervision.
Abstract: Results of a study using data collected at 2 points in time, separated by 6 months, suggested that subordinates resisted their supervisors' downward influence tactics with greater frequency when their supervisors were more abusive and that subordinates' personality moderated the effects of abusive supervision. The relationship between abusive supervision and subordinates' dysfunctional resistance was stronger among subordinates who were lower in conscientiousness than among subordinates who were higher in conscientiousness, but this effect emerged only for subordinates who were also lower in agreeableness. The relationship between abusive supervision and subordinates' constructive resistance was stronger among subordinates who were higher in conscientiousness than among subordinates who were lower in conscientiousness. The study's implications for theory and research are discussed.

383 citations


Journal ArticleDOI
TL;DR: In this article, the main and interactive effects of distributive justice and procedural justice accounted for significant, unique variance in employees' psychological distress, consistent with predictions derived from a framework that integrates stress and coping theory with justice theory.

316 citations


Journal ArticleDOI
TL;DR: In this paper, the authors present a study of two samples of new venture top management teams from the inc. 500 and find that shared strategic cognition is the outcome of group processes that occur during the development of strategy.
Abstract: This paper presents a study of two samples of new venture top management teams from the inc. 500. The research poses that shared strategic cognition is the outcome of group processes that occur during the development of strategy. Shared cognition in top management teams (TMTs) is the extent to which those mental models about strategy are shared. A theoretical frame is developed that links shared strategic cognition to group process and new venture performance. The results indicate that the group processes leading to the development of shared strategic cognition are more important than the outcome of shared strategic cognition in terms of predicting organizational performance. Copyright © 2001 John Wiley & Sons, Ltd.

306 citations


Journal ArticleDOI
TL;DR: This article investigated the interactive effects of learner characteristic, test anxiety, and the classroom variable, threat of evaluation, on the achievement and motivation of 61 post-secondary students assigned randomly to high or low-evaluative threat conditions.
Abstract: Identification of factors that influence post-secondary student achievement and motivation in the classroom continues to be an important educational objective. The author investigated the interactive effects of learner characteristic, test anxiety, and the classroom variable, threat of evaluation, on the achievement and motivation of 61 postsecondary students assigned randomly to high- or low-evaluative threat conditions. Statistically significant interactions revealed that all the students, particularly the test-anxious students, performed poorly and were less motivated when exposed to highly evaluative classrooms. The findings expand previous research and should be considered by professors when they design and implement higher education courses.

289 citations


Journal ArticleDOI
TL;DR: This work identifies two different architectures for RBAC on the Web, called user-pull and server-pull, and implements each architecture by integrating and extending well-known technologies such as cookies, X.509, SSL, and LDAP, providing compatibility with current web technologies.
Abstract: Current approaches to access control on the Web servers do not scale to enterprise-wide systems because they are mostly based on individual user identities. Hence we were motivated by the need to manage and enforce the strong and efficient RBAC access control technology in large-scale Web environments. To satisfy this requirement, we identify two different architectures for RBAC on the Web, called user-pull and server-pull. To demonstrate feasibility, we implement each architecture by integrating and extending well-known technologies such as cookies, X.509, SSL, and LDAP, providing compatibility with current web technologies. We describe the technologies we use to implement RBAC on the Web in different architectures. Based on our experience, we also compare the tradeoffs of the different approaches.

288 citations


Proceedings ArticleDOI
07 May 2001
TL;DR: This work explores and extends algebraic methods for creating implicit surfaces using linear combinations of radial basis interpolants to form complex models from scattered surface points, and reduces the computational complexity of these methods to the study of the shape properties of large, complex shapes.
Abstract: Describes algebraic methods for creating implicit surfaces using linear combinations of radial basis interpolants to form complex models from scattered surface points. Shapes with arbitrary topology are easily represented without the usual interpolation or aliasing errors arising from discrete sampling. These methods were first applied to implicit surfaces by V.V. Savchenko, et al. (1995) and later developed independently by G. Turk and J.F. O'Brien (1998) as a means of performing shape interpolation. Earlier approaches were limited as a modeling mechanism because of the order of the computational complexity involved. We explore and extend these implicit interpolating methods to make them suitable for systems of large numbers of scattered surface points by using compactly supported radial basis interpolants. The use of compactly supported elements generates a sparse solution space, reducing the computational complexity and making the technique practical for large models. The local nature of compactly supported radial basis functions permits the use of computational techniques and data structures such as k-d trees for spatial subdivision, promoting fast solvers and methods to divide and conquer many of the subproblems associated with these methods. Moreover, the representation of complex models permits the exploration of diverse surface geometry. This reduction in computational complexity enables the application of these methods to the study of the shape properties of large, complex shapes.

Journal ArticleDOI
TL;DR: This article investigated whether students' writing about their mathematical problem solving processes showed evidence of a metacognitive framework and found that students' written descriptions demonstrated engagement of various metACognitive behaviors during orientation, organization, execution, and verification phases of mathematical problem-solving.
Abstract: This study investigated whether students' writing about their mathematical problem solving processes showed evidence of a metacognitive framework. Twenty ninth-grade algebra students provided written descriptions of their problem solving processes as they worked mathematics problems. A qualitative analysis of the data indicated the presence of a metacognitive framework. Students' written descriptions demonstrated engagement of various metacognitive behaviors during orientation, organization, execution, and verification phases of mathematical problem solving. This article provides a description of the more predominant metacognitive behaviors identified through the data analysis. The findings of this study underscore the importance of implementing writing as an integral part of the mathematics curriculum and emphasize the need for additional research on writing in mathematics.

Journal ArticleDOI
01 Feb 2001-Genetics
TL;DR: It is concluded that geometric morphometrics offers a promising new approach to address problems at the interface of evolutionary and developmental genetics, and demonstrates this method for the mouse mandible.
Abstract: This study introduces a new multivariate approach for analyzing the effects of quantitative trait loci (QTL) on shape and demonstrates this method for the mouse mandible. We quantified size and shape with the methods of geometric morphometrics, based on Procrustes superimposition of five morphological landmarks recorded on each mandible. Interval mapping for F(2) mice originating from an intercross of the LG/J and SM/J inbred strains revealed 12 QTL for size, 25 QTL for shape, and 5 QTL for left-right asymmetry. Multivariate ordination of QTL effects by principal component analysis identified two recurrent features of shape variation, which involved the positions of the coronoid and angular processes relative to each other and to the rest of the mandible. These patterns are reminiscent of the knockout phenotypes of a number of genes involved in mandible development, although only a few of these are possible candidates for QTL in our study. The variation of shape effects among the QTL showed no evidence of clustering into distinct groups, as would be expected from theories of morphological integration. Further, for most QTL, additive and dominance effects on shape were markedly different, implying overdominance for specific features of shape. We conclude that geometric morphometrics offers a promising new approach to address problems at the interface of evolutionary and developmental genetics.

Book ChapterDOI
06 Dec 2001
TL;DR: This work defines a new type of digital signature called a 'Content Extraction Signature' (CES), and proposes and analyzes four provably secure CES constructions which satisfy desirable functional and security requirements.
Abstract: Motivated by emerging needs in online interactions, we define a new type of digital signature called a 'Content Extraction Signature' (CES). A CES allows the owner, Bob, of a document signed by Alice, to produce an 'extracted signature' on selected extracted portions of the original document, which can be verified (to originate from Alice) by any third party Cathy, without knowledge of the unextracted (removed) document portions. The new signature therefore achieves verifiable content extraction with minimal multi-party interaction. We specify desirable functional and security requirements from a CES (including an efficiency requirement: a CES should be more efficient in either computation or communication than the simple multiple signature solution). We propose and analyse four provably secure CES constructions which satisfy our requirements, and evaluate their performance characteristics.

Journal ArticleDOI
TL;DR: The role of the geometry and anatomical structure of the mandible, which are key determinants of the patterns of the genetic and phenotypic covariance matrices, in molding the potential for adaptive evolution is demonstrated.
Abstract: We combine the methods of geometric morphometrics and multivariate quantitative genetics to study the patterns of phenotypic and genetic variation of mandible shape in random-bred mice. The data are the positions of 11 landmarks on the mandibles of 1241 mice from a parent-offspring breeding design. We use Procrustes superim- position to extract shape variation and restricted maximum likelihood to estimate the additive genetic and environmental components of variance and covariance. Matrix permutation tests showed that the genetic and phenotypic as well as the genetic and environmental covariance matrices were similar, but not identical. Likewise, principal component analyses revealed correspondence in the patterns of phenotypic and genetic variation. Patterns revealed in these analyses also showed similarities to features previously found in the effects of quantitative trait loci and in the phenotypes generated in gene knockout experiments. We used the multivariate version of the breeders' equation to explore the potential for short-term response to selection on shape. In general, the correlated response is substantial and regularly exceeds the direct response: Selection applied locally to one landmark usually produces a response in other parts of the mandible as well. Moreover, even selection for shifts of the same landmark in different directions can yield dramatically different responses. These results demonstrate the role of the geometry and anatomical structure of the mandible, which are key determinants of the patterns of the genetic and phenotypic covariance matrices, in molding the potential for adaptive evolution.

Journal ArticleDOI
TL;DR: Women who sought information about the sexual side effects of cancer treatment, and who had strong intimate relationships appeared to experience a more successful adjustment in terms of adjustment to living with breast cancer.
Abstract: The literature lacks descriptions of the effect that breast cancer treatments have on sexuality from the perspective of women who have lived through this experience. The purpose of this study was to describe aspects of sexuality that were important to women after breast cancer treatment. Participants in this study were 18 white women with breast cancer between the ages of 35 and 68 years (mean, 50.5 years). Time since diagnosis ranged from 6 months to more than 10 years. Primary surgical treatment for seven women (39%) had been lumpectomy, and for 11 women (61%) mastectomy. Most of the participants also received adjuvant chemotherapy. This qualitative descriptive study used grounded theory methods. Two primary categories (losses and influencing pieces) emerged from the data analysis. The losses category had four components: missing parts, loss of bleeding-becoming old, loss of sexual sensations, and loss of womanhood. The influencing pieces were relationships and information control. The core concept identified was an altered sexual self. Central to the task of adjustment to living with breast cancer was coming to terms with a new sexual self that emerged after treatment. Women who sought information about the sexual side effects of cancer treatment, and who had strong intimate relationships appeared to experience a more successful adjustment.

Journal ArticleDOI
TL;DR: In this article, a new eddy-current testing technique for surface or near-surface defect detection in nonmagnetic metals using giant magnetoresistive (GMR) sensors is introduced.
Abstract: The purpose of this paper is to introduce a new eddy-current testing technique for surface or near-surface defect detection in nonmagnetic metals using giant magnetoresistive (GMR) sensors. It is shown that GMR-based eddy-current probes are able to accurately detect short surface-breaking cracks in conductive materials. The self-rectifying property of the GMR sensor used in this study leads to a simplified signal conditioning circuit, which can be fully integrated on a silicon chip with the GMR sensor. The ability to manufacture probes having small dimensions and high sensitivity (220 mV/mT) to low magnetic fields over a broad frequency range (from dc up to 1 MHz) enhances the spatial resolution of such an eddy-current testing probe. Experimental results obtained by scanning two different probes over a slotted aluminum specimen are presented. General performance characteristics are demonstrated by measurements of surface and subsurface defects of different sizes and geometries. Dependence of the sensor output on orientation, liftoff distance, and excitation intensity is also investigated.

Journal ArticleDOI
TL;DR: Techniques developed to model and estimate task specific uncertainty for coordinate measuring systems, primarily coordinate measuring machines using contacting probes are surveyed.

Journal ArticleDOI
TL;DR: Examination of the role of the dormant-like viable but nonculturable (VBNC) condition in the etiology of bacterial infection provided evidence that the VBNC state may be involved in explaining the persistent nature of some infections.
Abstract: The role of the dormant-like viable but nonculturable (VBNC) condition in the etiology of bacterial infection was examined using a plant system. The plant-pathogenic bacterium Ralstonia solanacearum was first shown to enter into the VBNC state both in response to cupric sulfate when in a saline solution and when placed in autoclaved soil. To determine if the VBNC condition is related to pathogenesis, the physiological status of bacteria recovered from different regions of inoculated tomato plants was determined at different stages of infection. The fraction of in planta bacteria that were VBNC increased during infection and became greater than 99% by the late stage of disease. The possibility that soil-dwelling VBNC bacteria may resuscitate and infect plants was also examined. When tomato seeds were germinated in sterile soil that contained VBNC but no detectable culturable forms of R. solanacearum cells, resuscitation was observed to occur in soil adjacent to plant roots; these resuscitated bacteria were able to infect plants. This is the first report of R. solanacearum entering the VBNC state and of resuscitation of any VBNC plant-pathogenic bacteria and provides evidence that the VBNC state may be involved in explaining the persistent nature of some infections.

Journal ArticleDOI
TL;DR: In this article, three advances toward the rapid identification of the tool point frequency response and corresponding stable cutting parameters are described: 1) stable speeds determination using noncontact periodic impulsive excitation of tool point (produced by spindle rotation and a stationary magnet) in conjunction with once-per-revolution sampling, 2) Receptance Coupling Substructure Analysis for the analytic prediction of the Tool Point response, and 3) once per-revolution sample of the audio signal during cutting to determine stability behavior.

Journal Article
TL;DR: Recommendations are presented for the development of culturally appropriate health education/promotion programs in order to help college students meet Healthy People 2010 objectives.
Abstract: A questionnaire was used to assess nutritional intake, weight status, and dietary practices among 630 US college students Body mass index (BMI) was calculated using self-reported heights and weights, and nutritional status was assessed via 24-hour recall Sixty-four percent of the students had acceptable BMI levels (between 19 and 25); 16% of African-American females and 15% of African-American males had BMIs indicating obesity (30 or above) Approximately 18% of the students consumed 5 servings per day of fruits and vegetables, 7% consumed 6 or more grain products, and 53% consumed 2 or more dairy products Twenty-seven percent reported never/rarely eating fast foods Recommendations are presented for the development of culturally appropriate health education/promotion programs in order to help college students meet Healthy People 2010 objectives

Proceedings ArticleDOI
01 May 2001
TL;DR: A role- based delegation model called RDM2000 (role-based delegation model 2000) is presented, which is an extension of RBDM0 by supporting hierarchical roles and multi-step delegation and a rule-based language for specifying and enforcing the policies based on RDM 2000 is introduced.
Abstract: In current role-based systems, security officers handle assignments of users to roles However, fully depending on this functionality may increase management efforts in a distributed environment because of the continuous involvement from security officers The emerging technology of role-based delegation provides a means for implementing RBAC in a distributed environment with empowerment of individual users The basic idea behind a role-based delegation is that users themselves may delegate role authorities to other users to carry out some functions on behalf of the former This paper presents a role-based delegation model called RDM2000 (role-based delegation model 2000), which is an extension of RBDM0 by supporting hierarchical roles and multi-step delegation The paper explores different approaches for delegation and revocation Also, a rule-based language for specifying and enforcing the policies based on RDM2000 is introduced

Journal ArticleDOI
TL;DR: In this article, the authors present a built-in self-test (BIST) approach able to diagnose all single and practically all multiple faulty programmable logic blocks (PLBs) in field programmable gate arrays (FPGAs) with maximum diagnostic resolution.
Abstract: We present a built-in self-test (BIST) approach able to detect and accurately diagnose all single and practically all multiple faulty programmable logic blocks (PLBs) in field programmable gate arrays (FPGAs) with maximum diagnostic resolution. Unlike conventional BIST, FPGA BIST does not involve any area overhead or performance degradation. We also identify and solve the problem of testing configuration multiplexers that was either ignored or incorrectly solved in most previous work. We introduce the first diagnosis method for multiple faulty PLBs; for any faulty PLB, we also identify its internal faulty modules or modes of operation. Our accurate diagnosis provides the basis for both failure analysis used for yield improvement and for any repair strategy used for fault-tolerance in reconfigurable systems. We present experimental results showing detection and identification of faulty PLBs in actual defective FPGAs. Our BIST architecture is easily scalable.

Journal ArticleDOI
TL;DR: In this article, the authors provide a thorough analytical review of the major transitions associated with psychopathy's historical development and demonstrate where and how the nomenclature, meaning, degree of social condemnation, and prognosis for this mental disorder have changed.
Abstract: This article is the first in a two-part series on psychopathy. Psychopathy is an elusive and perplexing psychological construct. Problems posed by this mental disorder are linked to changing historical interpretations impacting the current clinical community’s general understanding of it, especially in relation to Antisocial Personality Disorder (ASPD). Accordingly, the researchers provide a thorough analytical review of the major transitions associated with psychopathy’s historical development. This assessment demonstrates where and how the nomenclature, meaning, degree of social condemnation, and prognosis for this mental disorder have changed. Ultimately, this article clarifies much of the uncertainty surrounding this misunderstood psychological construct.

Journal ArticleDOI
01 Dec 2001-Pain
TL;DR: Both treatment and control groups showed a significant decline in pain and disability across time and an increased ability to withstand pressure on trigger points, which may partly explain the absence of a treatment effect specific to BTXA.
Abstract: A clinical study tested the therapeutic efficacy of Botulinum toxin A (BTXA) when injected into symptomatic neck muscles after one injection session. Patients with chronic neck pain were randomly assigned to receive either a high dose of an active treatment or an injection of the same volume of normal saline. Patients were compared for 4 months using a comprehensive set of outcome measures that included the Neck Pain and Disability Scale (Spine 24 (1999) 1290) and pressure algometry (Arch Phys Med Rehabil 67 (1986) 406; Pain 30 (1987) 115; Clin J Pain 2 (1987) 207). Analyses were consistent in showing significant benefits from the injection session; however, the effects were not specific to the group treated with BTXA. Both treatment and control groups showed a significant decline in pain and disability across time and an increased ability to withstand pressure on trigger points. The heavy incidence of adverse events in the treatment group may partly explain the absence of a treatment effect specific to BTXA. The results show that a single dose treatment without physical therapy is not effective for chronic neck pain.

Journal ArticleDOI
TL;DR: A divide-and-merge approach is introduced for automatic generation of high-level, discrete contact state space, represented as contact state graphs, between two contacting polyhedral solids from their geometric models.
Abstract: A divide-and-merge approach is introduced for automatic generation of high-level, discrete contact state space, represented as contact state graphs, between two contacting polyhedral solids from their geometric models. Based on the fact that a contact state graph is the union of the subgraphs called a goal-contact relaxation (GCR) graph, the approach consists of algorithms (1) to generate a complete GCR graph automatically given the most constrained contact state in the GCR graph and (2) to merge GCR graphs automatically. The algorithms arplemented for cases in which the most constrained contact state in a GCR graph consists of up to three principal contacts. The ability to capture and represent contact state information effectively and efficiently is essential for robotic operations involving compliant motions, for simulation of contact motions, and for haptic interactions.

Journal ArticleDOI
TL;DR: Results suggest that (1) the SUSAN edge detector performs best and (2) the ranking of various edge detectors is different from that found in other evaluations.

Journal ArticleDOI
TL;DR: There is a strong genetic contribution to aerobic capacity in mice, and two measures of heritability in the broad sense, intraclass correlation, and the coefficient of genetic determination were both significant.
Abstract: LIGHTFOOT, T. J., M. J. TURNER, K. A. DEBATE, and S. R. KLEEBERGER. Interstrain variation in murine aerobic capacity. Med. Sci. Sports Exerc., Vol. 33, No. 12, 2001, pp. 2053–2057.PurposeThe contribution of genetic factors to aerobic capacity is unknown. The purpose of this study was to measure maxi

Journal ArticleDOI
TL;DR: In this article, the effectiveness of the CEO's letter to shareholders has been investigated in terms of credibility, efficacy, commitment, and responsibility, and the first-order constructs appear to be statistically coaligned by a second-order construct of CLE.
Abstract: Many organizations are devoting enormous amounts of financial and human resources to improve corporate communications. Among the many forms of communication produced by firms, the Chief Executive Officer’s (CEO) letter to shareholders is perhaps the most strategic in conveying the well-being and future direction of the enterprise. These letters have become even more visible with the advent of World Wide Web and its use as a primary forum for communicating the CEO’s message. Surprisingly, there has been little research into dimensions that characterize the effectiveness of the CEO’s letter and how this communication may benefit the overall enterprise in terms of improved financial position. Utilizing both theoretic and practical perspectives as well as the web-based letters of prominent organizations, this study frames CEO’s letter effectiveness (CLE) along dimensions of credibility, efficacy, commitment, and responsibility. These first-order constructs appear to be statistically coaligned by a second-order construct of CLE. In turn, CLE is shown to be directly associated with favourable financial performance in terms of share price and trading activity. This study provides a useful framework for assessing strategic communication through the CEO’s letter and for operationalizing a key dependent variable in future studies related to strategic corporate communications through digital media.

Journal ArticleDOI
TL;DR: Experiments demonstrate that actin microfilaments, microtubules, receptor-mediated endocytosis, and protein tyrosine kinases play important roles in the uptake of S. aureus by non-phagocytic cells and induces the release of cytokines that have the potential to exacerbate disease and induce apoptosis.
Abstract: Staphylococcus aureus is the primary etiological agent of several human diseases. S. aureus has classically been considered an extracellular pathogen; however, recent evidence indicates that S. aureus invades and persists in non-professional phagocytes. Experiments demonstrate that actin microfilaments, microtubules, receptor-mediated endocytosis, and protein tyrosine kinases play important roles in the uptake of S. aureus. Fibronectin-binding proteins and beta-integrins are implicated as critical cell surface molecules associated with internalization of S. aureus by non-phagocytic cells. Following invasion of eukaryotic cells, S. aureus induces the release of cytokines that have the potential to exacerbate disease and induce apoptosis. Finally, S. aureus has the ability to persist inside host cells as small colony variants, a phenotype associated with persistent and recurrent infections.