124 resultados para Fine-grained
Resumo:
The Analytical Electron Microscope (AEM), with which secondary X-ray emission from a thin (<150nm), electron-transparent material is measured, has rapidly become a versatile instrument for qualitative and quantitative elemental analyses of many materials, including minerals. With due regard for sources of error in experimental procedures, it is possible to obtain high spatial resolution (~20nm diameter) and precise elemental analyses (~3% to 5% relative) from many silicate minerals. In addition, by utilizing the orientational dependence of X-ray emission for certain multi-substituted crystal structures, site occupancies for individual elements within a unit cell can be determined though with lower spatial resolution. The relative ease with which many of these compositional data may be obtained depends in part on the nature of the sample, but, in general, is comparable to other solid state analytical techniques such as X-ray diffraction and electron microprobe analysis. However, the improvement in spatial resolution obtained with the AEM (up to two orders of magnitude in analysis diameter) significantly enhances interpretation of fine-grained assemblages in many terrestrial or extraterrestrial rocks.
Resumo:
In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.
Resumo:
Private data stored on smartphones is a precious target for malware attacks. A constantly changing environment, e.g. switching network connections, can cause unpredictable threats, and require an adaptive approach to access control. Context-based access control is using dynamic environmental information, including it into access decisions. We propose an "ecosystem-in-an-ecosystem" which acts as a secure container for trusted software aiming at enterprise scenarios where users are allowed to use private devices. We have implemented a proof-of-concept prototype for an access control framework that processes changes to low-level sensors and semantically enriches them, adapting access control policies to the current context. This allows the user or the administrator to maintain fine-grained control over resource usage by compliant applications. Hence, resources local to the trusted container remain under control of the enterprise policy. Our results show that context-based access control can be done on smartphones without major performance impact.
Resumo:
The study adopts a multi-dimensional construct of self-esteem to examine the relationship between self-perception and psychological adjustment in order to identify specific dimensions that discriminate between disturbed and non-disturbed groups. The disturbed group (n = 33) is derived from a clinical sample and are matched with a non-disturbed group (n = 33) of adolescents. Results indicate that dimensional self-concept scores are significantly lower for clinical subjects while there are no significant differences between groups on the mathematics, honesty, and physical ability dimensions. These findings provide a more fine grained understanding of the relationship between self-esteem and psychological adjustment and emphasize the need to examine self-esteem in terms of its particular dimensions.
Resumo:
Fine-grained matrices in carbonaceous chondrites and small, micron-sized inclusions in achondrites can be characterized effectively using high resolution transmission electron microscopy (HRTEM).
Resumo:
Many software applications extend their functionality by dynamically loading executable components into their allocated address space. Such components, exemplified by browser plugins and other software add-ons, not only enable reusability, but also promote programming simplicity, as they reside in the same address space as their host application, supporting easy sharing of complex data structures and pointers. However, such components are also often of unknown provenance and quality and may be riddled with accidental bugs or, in some cases, deliberately malicious code. Statistics show that such component failures account for a high percentage of software crashes and vulnerabilities. Enabling isolation of such fine-grained components is therefore necessary to increase the stability, security and resilience of computer programs. This thesis addresses this issue by showing how host applications can create isolation domains for individual components, while preserving the benefits of a single address space, via a new architecture for software isolation called LibVM. Towards this end, we define a specification which outlines the functional requirements for LibVM, identify the conditions under which these functional requirements can be met, define an abstract Application Programming Interface (API) that encompasses the general problem of isolating shared libraries, thus separating policy from mechanism, and prove its practicality with two concrete implementations based on hardware virtualization and system call interpositioning, respectively. The results demonstrate that hardware isolation minimises the difficulties encountered with software based approaches, while also reducing the size of the trusted computing base, thus increasing confidence in the solution’s correctness. This thesis concludes that, not only is it feasible to create such isolation domains for individual components, but that it should also be a fundamental operating system supported abstraction, which would lead to more stable and secure applications.
Resumo:
This chapter focuses on learning and assessment as social and cultural practices situated within national and international policy contexts of educational change. Classroom assessment was researched using a conceptualization of knowing in action, or the ‘generative dance’. Fine-grained analyses of interactivity between students, and between teacher and student/s, and their patterns of participation in assessment and learning were conducted. The findings offer original insights into how learners draw on explicit and tacit forms of knowing in order to successfully participate in learning. Assessment is re-imagined as a dynamic space in which teachers learn about their students as they learn with their students, and where all students can be empowered to find success.
Resumo:
This paper introduces a parallel implementation of an agent-based model applied to electricity distribution grids. A fine-grained shared memory parallel implementation is presented, detailing the way the agents are grouped and executed on a multi-threaded machine, as well as the way the model is built (in a composable manner) which is an aid to the parallelisation. Current results show a medium level speedup of 2.6, but improvements are expected by incor-porating newer distributed or parallel ABM schedulers into this implementa-tion. While domain-specific, this parallel algorithm can be applied to similarly structured ABMs (directed acyclic graphs).
Resumo:
The sintering and densification of Y2BaCuO5 (Y-211) pellets made from powders with different characteristics have been investigated in the temperature range 1000-1140°C. A pellet made from powder containing Ba-rich secondary phases shows very early liquid-assisted sintering and densification and clear evidence of exaggerated grain growth. The melting of BaCuO2 and YBa2Cu3O7-δ (Y-123) secondary phases increases the rate of densification of Y-211 pellets made from other powders at temperatures above 1025-1030°C. All the liquid produced by the melting of the latter phases recrystallizes as intergranular layers of Y-123. These intergranular layers account for the darker appearance and for measurable electrical conductivities at room temperature of the pellets sintered at the higher temperatures. The development of exaggerated grain growth within a uniform fine-grained matrix opens the possibility of using controlled secondary recrystallization to obtain large single domains of Y-211, provided that the trapping of porosity can be avoided or minimized. © 1999 Elsevier Science S.A.
Resumo:
This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e., sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings. Labels are carried over the network by tainting network packets. A distributed information flow policy is defined for each group at the host level by labeling information and defining how users and applications can legally access, alter or transfer information towards other trusted or untrusted hosts. As opposed to existing approaches, where information is most often represented by two security levels (low/high, public/private, etc.), our model identifies each piece of information within a distributed system, and defines their legal interaction in a fine-grained manner. Hosts store and exchange security labels in a peer to peer fashion, and there is no central monitor. Our IDS is implemented in the Linux kernel as a Linux Security Module (LSM) and runs standard software on commodity hardware with no required modification. The only trusted code is our modified operating system kernel. We finally present a scenario of intrusion in a web service running on multiple hosts, and show how our distributed IDS is able to report security violations at each host level.
Resumo:
The present invention relates to methods for producing very fine-grained particulate material. In particular, the present invention relates to method for producing oxide materials of very fine-grained particulate material.
Resumo:
This project advances the current understanding of intraurban rail passengers and their travel experiences to help rail industry leaders tailor policy approaches to fit specific, relevant segments of their target population. Using a Q-sorting technique and cluster analysis, preliminary research identified five perspectives occurring in a small sample of rail passengers who varied in their frequency and location of rail travel as well as certain sociodemographic characteristics. Revealed perspectives (named to capture the gist of their content) included "Rail travel is about the destination, not the journey"; "Despite challenges, public transport is still the best option"; "Rail travel is fine"; "Rail travel? So far, so good"; and "Bad taste for rail travel." This paper discusses each of the perspectives in detail and considers them in relation to tailored policy implications. An overarching finding from this study is that improving railway travel access requires attention to physical, psychological, financial, and social facets of accessibility. For example, designing waiting areas to be more socially functional and comfortable has the potential to increase ridership by addressing social forms of access, decreasing perceived wait times, and making time at the station feel like time well spent. Even at this preliminary stage, the Q-sorting technique promises to provide a valuable, holistic, albeit fine-grained, analysis of passenger attitudes and experiences that will assist industry efforts in increasing ridership.
Resumo:
Motivation ?Task analysis for designing modern collaborative work needs a more fine grained approach. Especially in a complex task domain, like collaborative scientific authoring, when there is a single overall goal that can only be accomplished only by collaboration between multiple roles, each requiring its own expertise. We analyzed and re-considered roles, activities, and objects for design for complex collaboration contexts. Our main focus is on a generic approach to design for multiple roles and subtasks in a domain with a shared overall goal, which requires a detailed approach. Collaborative authoring is our current example. This research is incremental: an existing task analysis approach (GTA) is reconsidered by applying it to a case of complex collaboration. Our analysis shows that designing for collaboration indeed requires a refined approach to task modeling: GTA, in future, will need to consider tasks at the lowest level that can be delegated or mandates. These tasks need to be analyzed and redesigned in more in detail, along with the relevant task object.
Resumo:
Building information models have created a paradigm shift in how buildings are built and managed by providing a dynamic repository for building data that is useful in many new operational scenarios. This change has also created an opportunity to use building information models as an integral part of security operations and especially as a tool to facilitate fine-grained access control to building spaces in smart buildings and critical infrastructure environments. In this paper, we identify the requirements for a security policy model for such an access control system and discuss why the existing policy models are not suitable for this application. We propose a new policy language extension to XACML, with BIM specific data types and functions based on the IFC specification, which we call BIM-XACML.
Resumo:
Due to the popularity of security cameras in public places, it is of interest to design an intelligent system that can efficiently detect events automatically. This paper proposes a novel algorithm for multi-person event detection. To ensure greater than real-time performance, features are extracted directly from compressed MPEG video. A novel histogram-based feature descriptor that captures the angles between extracted particle trajectories is proposed, which allows us to capture motion patterns of multi-person events in the video. To alleviate the need for fine-grained annotation, we propose the use of Labelled Latent Dirichlet Allocation, a “weakly supervised” method that allows the use of coarse temporal annotations which are much simpler to obtain. This novel system is able to run at approximately ten times real-time, while preserving state-of-theart detection performance for multi-person events on a 100-hour real-world surveillance dataset (TRECVid SED).