scispace - formally typeset
Search or ask a question
Institution

University of Wisconsin-Madison

EducationMadison, Wisconsin, United States
About: University of Wisconsin-Madison is a education organization based out in Madison, Wisconsin, United States. It is known for research contribution in the topics: Population & Poison control. The organization has 108707 authors who have published 237594 publications receiving 11883575 citations.
Topics: Population, Poison control, Gene, Health care, Galaxy


Papers
More filters
Book ChapterDOI
TL;DR: A review of the empirical results and theoretical underpinnings of studies of fear arousing communications can be found in this paper, where the authors present an overview of the key components of fear communication experiments and introduce two major theoretical paradigms that can be used to interpret the findings.
Abstract: Publisher Summary This chapter reviews the empirical results and theoretical underpinnings of studies of fear arousing communications. It focuses on the interrelationship of emotional and instrumental behavior. The chapter presents an overview of the key components of fear communication experiments and introduces the two major theoretical paradigms that can be used to interpret the findings. The first and historically most important of the paradigms is the fear drive model, a variant of the classic drive reduction model used in many animal learning studies. It assumes that the emotional response of fear functions as a drive that mediates belief change and behavior change. The second paradigm was suggested by the experimental data. This model assumes that the communication produces both persuasion and fear; fear does not cause persuasion. The chapter reviews the evidence regarding interactions between the level of fear elicited by the communication and other factors such as personality variables and recommendation effectiveness. It reveals that the outcomes are often influenced by complex contingencies. But despite the complexity, serious effort has been made to identify empirical regularities and presents a theoretical model to provide conceptual integration.

1,305 citations

Book ChapterDOI
01 Jan 1979
TL;DR: In this article, the authors define robustness as the property of a procedure which renders the answers it gives insensitive to departures, of a kind which occur in practice, from ideal assumptions.
Abstract: Publisher Summary Robustness may be defined as the property of a procedure which renders the answers it gives insensitive to departures, of a kind which occur in practice, from ideal assumptions Since assumptions imply some kind of scientific model, I believe that it is necessary to look at the process of scientific modelling itself to understand the nature of and the need for robust procedures Against such a view it might be urged that some useful robust procedures have been derived empirically without an explicitly stated model However, an empirical procedure implies some unstated model and there is often great virtue in bringing into the open the kind of assumptions that lead to useful methods The need for robust methods seems to be intimately mixed up with the need for simple models This we now discuss

1,304 citations

Proceedings ArticleDOI
12 May 2002
TL;DR: This paper presents an automated technique for generating and analyzing attack graphs, based on symbolic model checking algorithms, letting us construct attack graphs automatically and efficiently.
Abstract: An integral part of modeling the global view of network security is constructing attack graphs. Manual attack graph construction is tedious, error-prone, and impractical for attack graphs larger than a hundred nodes. In this paper we present an automated technique for generating and analyzing attack graphs. We base our technique on symbolic model checking algorithms, letting us construct attack graphs automatically and efficiently. We also describe two analyses to help decide which attacks would be most cost-effective to guard against. We implemented our technique in a tool suite and tested it on a small network example, which includes models of a firewall and an intrusion detection system.

1,302 citations

Journal ArticleDOI
11 Jul 2013-Nature
TL;DR: A systematic analysis of the RNA motifs recognized by RNA-binding proteins, encompassing 205 distinct genes from 24 diverse eukaryotes, provides an unprecedented overview of RNA- binding proteins and their targets, and constitute an invaluable resource for determining post-transcriptional regulatory mechanisms in eukARYotes.
Abstract: RNA-binding proteins are key regulators of gene expression, yet only a small fraction have been functionally characterized. Here we report a systematic analysis of the RNA motifs recognized by RNA-binding proteins, encompassing 205 distinct genes from 24 diverse eukaryotes. The sequence specificities of RNA-binding proteins display deep evolutionary conservation, and the recognition preferences for a large fraction of metazoan RNA-binding proteins can thus be inferred from their RNA-binding domain sequence. The motifs that we identify in vitro correlate well with in vivo RNA-binding data. Moreover, we can associate them with distinct functional roles in diverse types of post-transcriptional regulation, enabling new insights into the functions of RNA-binding proteins both in normal physiology and in human disease. These data provide an unprecedented overview of RNA-binding proteins and their targets, and constitute an invaluable resource for determining post-transcriptional regulatory mechanisms in eukaryotes.

1,299 citations

Journal ArticleDOI
01 Sep 2006
TL;DR: These data, based on prospective studies of adults, show that all types of IVDs pose a risk of IVD-related BSI and can be used for benchmarking rates of infection caused by the various types of intravascular devices in use at the present time.
Abstract: OBJECTIVE: To better understand the absolute and relative risks of bloodstream infection (BSI) associated with the various types of intravascular devices (IVDs), we analyzed 200 published studies of adults in which every device in the study population was prospectively evaluated for evidence of associated infection and microbiologically based criteria were used to define IVD-related BSI. METHODS: English-language reports of prospective studies of adults published between January 1, 1966, and July 1, 2005, were identified by MEDLINE search using the following general search strategy: bacteremia [Medical Subject Heading, MeSH] OR septicemia [MeSH] OR bloodstream infection AND the specific type of intravascular device (eg, central venous port). Mean rates of IVDrelated BSI were calculated from pooled data for each type of device and expressed as BSIs per 100 IVDs (%) and per 1000 IVD days. RESULTS: Point incidence rates of IVD-related BSI were lowest with peripheral intravenous catheters (0.1%, 0.5 per 1000 IVDdays) and midline catheters (0.4%, 0.2 per 1000 catheter-days). Far higher rates were seen with short-term noncuffed and nonmedicated central venous catheters (CVCs) (4.4%, 2.7 per 1000 catheter-days). Arterial catheters used for hemodynamic monitoring (0.8%, 1.7 per 1000 catheter-days) and peripherally inserted central catheters used in hospitalized patients (2.4%, 2.1 per 1000 catheter-days) posed risks approaching those seen with short-term conventional CVCs used in the intensive care unit. Surgically implanted long-term central venous devices—cuffed and tunneled catheters (22.5%, 1.6 per 1000 IVD-days) and central venous ports (3.6%, 0.1 per 1000 IVD-days)—appear to have high rates of infection when risk is expressed as BSIs per 100 IVDs but actually pose much lower risk when rates are expressed per 1000 IVD-days. The use of cuffed and tunneled dual lumen CVCs rather than noncuffed, nontunneled catheters for temporary hemodialysis and novel preventive technologies, such as CVCs with anti-infective surfaces, was associated with considerably lower rates of catheter-related BSI. CONCLUSIONS: Expressing risk of IVD-related BSI per 1000 IVDdays rather than BSIs per 100 IVDs allows for more meaningful estimates of risk. These data, based on prospective studies in which every IVD in the study cohort was analyzed for evidence of infection by microbiologically based criteria, show that all types of IVDs pose a risk of IVD-related BSI and can be used for benchmarking rates of infection caused by the various types of IVDs in use at the present time. Since almost all the national effort and progress to date to reduce the risk of IVD-related infection have focused on short-term noncuffed CVCs used in intensive care units, infection control programs must now strive to consistently apply essential control measures and preventive technologies with all types of IVDs.

1,299 citations


Authors

Showing all 109671 results

NameH-indexPapersCitations
Eric S. Lander301826525976
Ronald C. Kessler2741332328983
Gordon H. Guyatt2311620228631
Yi Chen2174342293080
David Miller2032573204840
Robert M. Califf1961561167961
Ronald Klein1941305149140
Joan Massagué189408149951
Jens K. Nørskov184706146151
Terrie E. Moffitt182594150609
H. S. Chen1792401178529
Ramachandran S. Vasan1721100138108
Masayuki Yamamoto1711576123028
Avshalom Caspi170524113583
Jiawei Han1681233143427
Network Information
Related Institutions (5)
University of Washington
305.5K papers, 17.7M citations

96% related

University of Pennsylvania
257.6K papers, 14.1M citations

96% related

University of California, San Diego
204.5K papers, 12.3M citations

95% related

University of Michigan
342.3K papers, 17.6M citations

95% related

Stanford University
320.3K papers, 21.8M citations

95% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023333
20221,390
202110,148
20209,483
20199,278
20188,546