231 resultados para collections access


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Using Media-Access-Control (MAC) address for data collection and tracking is a capable and cost effective approach as the traditional ways such as surveys and video surveillance have numerous drawbacks and limitations. Positioning cell-phones by Global System for Mobile communication was considered an attack on people's privacy. MAC addresses just keep a unique log of a WiFi or Bluetooth enabled device for connecting to another device that has not potential privacy infringements. This paper presents the use of MAC address data collection approach for analysis of spatio-temporal dynamics of human in terms of shared space utilization. This paper firstly discuses the critical challenges and key benefits of MAC address data as a tracking technology for monitoring human movement. Here, proximity-based MAC address tracking is postulated as an effective methodology for analysing the complex spatio-temporal dynamics of human movements at shared zones such as lounge and office areas. A case study of university staff lounge area is described in detail and results indicates a significant added value of the methodology for human movement tracking. By analysis of MAC address data in the study area, clear statistics such as staff’s utilisation frequency, utilisation peak periods, and staff time spent is obtained. The analyses also reveal staff’s socialising profiles in terms of group and solo gathering. The paper is concluded with a discussion on why MAC address tracking offers significant advantages for tracking human behaviour in terms of shared space utilisation with respect to other and more prominent technologies, and outlines some of its remaining deficiencies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where each participant’s share can be used several times which reduces the number of interactions between the dealer and the group members. In addition some secrets may require a higher security level than others involving the need for different threshold values. Recently Chan and Chang designed such a scheme but their construction only allows a single secret to be shared per threshold value. In this article we combine the previous two approaches to design a multiple time verifiable multi-secret sharing scheme where several secrets can be shared for each threshold value. Since the running time is an important factor for practical applications, we will provide a complexity comparison of our combined approach with respect to the previous schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Automated process discovery techniques aim at extracting process models from information system logs. Existing techniques in this space are effective when applied to relatively small or regular logs, but generate spaghetti-like and sometimes inaccurate models when confronted to logs with high variability. In previous work, trace clustering has been applied in an attempt to reduce the size and complexity of automatically discovered process models. The idea is to split the log into clusters and to discover one model per cluster. This leads to a collection of process models – each one representing a variant of the business process – as opposed to an all-encompassing model. Still, models produced in this way may exhibit unacceptably high complexity and low fitness. In this setting, this paper presents a two-way divide-and-conquer process discovery technique, wherein the discovered process models are split on the one hand by variants and on the other hand hierarchically using subprocess extraction. Splitting is performed in a controlled manner in order to achieve user-defined complexity or fitness thresholds. Experiments on real-life logs show that the technique produces collections of models substantially smaller than those extracted by applying existing trace clustering techniques, while allowing the user to control the fitness of the resulting models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This Article is about legal scholarly publication in a time of plenitude. It is an attempt to explain why the most pressing questions in legal scholarly publishing are about how we ensure access to an infinity of content. It explains why standard assumptions about resource scarcity in publication are wrong in general, and how the changes in the modality of publication affect legal scholarship. It talks about the economics of open access to legal material, and how this connects to a future where there is infinite content. And because student-edited law reviews fit this future better than their commercially-produced, peer-refereed cousins, this Article is, in part, a defense of the crazy-beautiful institution that is the American law review.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Frameworks such as activity theory, distributed cognition and structuration theory, amongst others, have shown that detailed study of contextual settings where users work (or live) can help the design of interactive systems. However, these frameworks do not adequately focus on accounting for the materiality (and embodiment) of the contextual settings. Within the IST-EU funded AMIDA project (Augmented Multiparty Interaction with Distance Access) we are looking into supporting meeting practices with distance access. Meetings are inherently embodied in everyday work life and that material artefacts associated with meeting practices play a critical role in their formation. Our eventual goal is to develop a deeper understanding of the dynamic and embodied nature of meeting practices and designing technologies to support these. In this paper we introduce the notion of "artefact ecologies" as a conceptual base for understanding embodied meeting practices with distance access. Artefact ecologies refer to a system consisting of different digital and physical artefacts, people, their work practices and values and lays emphasis on the role artefacts play in embodiment, work coordination and supporting remote awareness. In the end we layout our plans for designing technologies for supporting embodied meeting practices within the AMIDA project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In policy terms, community media are known as the “third sector” of the media. The description reflects the historical expectation that community media can fulfill a need not met by the commercial and public service broadcasters. A defining element of this “need” has been the means to production for nonprofessionals, particularly groups not represented in the mainstream media. The historical construction of community media reveals production to be a guiding principle; both a means and an end in itself. This chapter examines the various rationales underpinning community media production, including empowerment, media diversity, and the independent producer movement. Using case studies from youth media, the chapter critiques producer-centric models of community media. In the contemporary media environment, production alone cannot meet the social needs that community media were established to address. Instead, I propose a rationale that combines both production and consumption ethics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis investigates the use of building information models for access control and security applications in critical infrastructures and complex building environments. It examines current problems in security management for physical and logical access control and proposes novel solutions that exploit the detailed information available in building information models. The project was carried out as part of the Airports of the Future Project and the research was modelled based on real-world problems identified in collaboration with our industry partners in the project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article seeks to understand why, despite over three decades of claiming women's reproductive health as a human right, we have seen little progress in reducing their health inequalities and poor health outcomes. I argue that one reason for this lack of progress may be due to a failure to clearly articulate the responsibilities of key actors, crucially states, in ensuring that women have access to, and provision of, services required to realize their reproductive rights. What is needed, this article suggests, is a framework that can translate decades of rights language into action and specifically identify the provisions required to address women's health.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Scramjet-based launch systems offer considerable promise for safe, reliable and economical access to space. A general Scramjets introduction is first provided, followed by the specifics of Australian Scramjet Research and the recent progress in inlet-injection radical-farming scramjets as part of the SCRAMSPACE program. Through both flight and ground tests, leveraging Australias world leadership in scramjet R&D, the SCRAMSPACE project is designed to answer key scientific and technological questions and build an industry-ready talent pool for a future Australian space industry. An extensive descriptions of all phases of the development of the SCRAMSPACE I scramjet-powered free-flight experiment are described in these lecture notes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The provision of visual support to individuals with an autism spectrum disorder (ASD) is widely recommended. We explored one mechanism underlying the use of visual supports: efficiency of language processing. Two groups of children, one with and one without an ASD, participated. The groups had comparable oral and written language skills and nonverbal cognitive abilities. In two semantic priming experiments, prime modality and prime–target relatedness were manipulated. Response time and accuracy of lexical decisions on the spoken word targets were measured. In the first uni-modal experiment, both groups demonstrated significant priming effects. In the second experiment which was cross-modal, no effect for relatedness or group was found. This result is considered in the light of the attentional capacity required for access to the lexicon via written stimuli within the developing semantic system. These preliminary findings are also considered with respect to the use of visual support for children with ASD.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Building information models have created a paradigm shift in how buildings are built and managed by providing a dynamic repository for building data that is useful in many new operational scenarios. This change has also created an opportunity to use building information models as an integral part of security operations and especially as a tool to facilitate fine-grained access control to building spaces in smart buildings and critical infrastructure environments. In this paper, we identify the requirements for a security policy model for such an access control system and discuss why the existing policy models are not suitable for this application. We propose a new policy language extension to XACML, with BIM specific data types and functions based on the IFC specification, which we call BIM-XACML.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Building information models are increasingly being utilised for facility management of large facilities such as critical infrastructures. In such environments, it is valuable to utilise the vast amount of data contained within the building information models to improve access control administration. The use of building information models in access control scenarios can provide 3D visualisation of buildings as well as many other advantages such as automation of essential tasks including path finding, consistency detection, and accessibility verification. However, there is no mathematical model for building information models that can be used to describe and compute these functions. In this paper, we show how graph theory can be utilised as a representation language of building information models and the proposed security related functions. This graph-theoretic representation allows for mathematically representing building information models and performing computations using these functions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The 20% ethanol intermittent-access (IAE) two-bottle-choice drinking procedure has been shown to produce high voluntary ethanol consumption in a number of rat strains. For this study, we applied this procedure to male Fischer (F344) rats, a strain previously reported to exhibit low levels of ethanol consumption. We also subjected these animals to a two-week ethanoldeprivation- period to see if they would exhibit an alcohol deprivation effect (ADE) signified by a transient increase in alcohol consumption following deprivation. Our data show a separation between high and low consuming animals within this strain, with high-consumers exhibiting an escalation in consumption. In contrast, Fischer rats did not show a significant separation between high and low consumers or any significant escalation in consumption, using the 20% ethanol continuous-access two-bottle-choice drinking protocol. Following the two-week deprivation period, animals in the high (but not the low) IAE group exhibited the transient increase in ethanol consumption and preference typically associated with an ADE. Together, the data suggest that the intermittent access protocol is a useful protocol for increasing ethanol consumption.