skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: A filter-based system mimicking the particle deposition and penetration in human respiratory system for secondhand smoke generation and characterization
Award ID(s):
2034198
PAR ID:
10335353
Author(s) / Creator(s):
; ; ; ; ;
Date Published:
Journal Name:
Inhalation Toxicology
Volume:
34
Issue:
7-8
ISSN:
0895-8378
Page Range / eLocation ID:
189 to 199
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    Abstract—System call checking is extensively used to protect the operating system kernel from user attacks. However, existing solutions such as Seccomp execute lengthy rule-based checking programs against system calls and their arguments, leading to substantial execution overhead. To minimize checking overhead, this paper proposes Draco, a new architecture that caches system call IDs and argument values after they have been checked and validated. System calls are first looked-up in a special cache and, on a hit, skip all checks. We present both a software and a hardware implementation of Draco. The latter introduces a System Call Lookaside Buffer (SLB) to keep recently-validated system calls, and a System Call Target Buffer to preload the SLB in advance. In our evaluation, we find that the average execution time of macro and micro benchmarks with conventional Seccomp checking is 1.14_ and 1.25_ higher, respectively, than on an insecure baseline that performs no security checks. With our software Draco, the average execution time reduces to 1.10_ and 1.18_ higher, respectively, than on the insecure baseline. With our hardware Draco, the execution time is within 1% of the insecure baseline. 
    more » « less
  2. This paper describes an ATP system, named JGXYZ, for some gap and glut logics. JGXYZ is based on an equi-provable translation to FOL, followed by use of an existing ATP system for FOL. A key feature of JGXYZ is that the translation to FOL is data-driven, in the sense that it requires only the addition of a new logic’s truth tables for the unary and binary connectives in order to produce an ATP system for the logic. Experimental results from JGXYZ illustrate the di erences between the logics and translated problems, both technically and in terms of a quasi-real-world use case. 
    more » « less
  3. This paper analyses design protocols of professional engineers and engineering students using the FBS schema, testing two hypotheses related to the use of system 1 and system 2 thinking. These two modes of thinking are characterised as: one that is fast and intuitive (system 1), and one that is slow and tedious (system 2). Their relevance for design thinking has already been shown conceptually. This paper provides empirical support for the existence of system 1 design thinking and system 2 design thinking. 
    more » « less
  4. This paper analyses design protocols of professional engineers and engineering students using the FBS schema, testing two hypotheses related to the use of system 1 and system 2 thinking. These two modes of thinking are characterised as: one that is fast and intuitive (system 1), and one that is slow and tedious (system 2). Their relevance for design thinking has already been shown conceptually. This paper provides empirical support for the existence of system 1 design thinking and system 2 design thinking. 
    more » « less