463 resultados para Docker,ARM,Raspberry PI,single board computer,QEMU,Sabayon Linux,Gentoo Linux


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We spent a fare amount of time thinking and debating where to draw the line between what is and what is not single-screen-based interactive media. This really is a tricky category. I would like to use this opportunity to raise certain issues about this very new category introduced this year to ifva. First of all, what do we mean by "interactive" media? If we conceptually or philosophically try to describe it, almost every artifact (not only those who are intended as a piece of art) can be perceived as "interactive" media as soon as one sees/ recognises it and begins interacting with it physically and/or mentally. What about when we limit this to computer related media? This certainly limits the scope, but well, it is becoming increasinly difficult to find art and design that are considered innovative without the use of computer. the term "single-screen" certainly makes it more specific, but as we saw from a range of works submitted to this category, people do come up with various interpretations to it. Some simply submitted work that can be viewed with computer screen, which didn't allow much user participation, while others provided various degrees of user/audience participation. What does "singel-screen-based interactive media" mean?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In truck manufacturing, the exhaust and air inlet pipes are specialized equipment that requires highly skilled, heavy machinery and small batch production methods. This paper describes a project to develop the computer numerically controlled (CNC) pipe bending process for a truck component manufacturer. The company supplies a huge range of heavy duty truck parts to the domestic market and is a significant supplier in Australia. The company has been using traditional methods of machine assisted manual pipe bending techniques. In a drive of continuous improvement, the company has acquired a pre-owned CNC bending machine capable of bending pipes automatically up to 25 bends. However, due to process mismatch, this machine is only used for single bending operation. The researchers studied the bending system and changed the manufacturing process. Using an example exhaust pipe as the benchmark, a significant drop of manufacturing lead time from 70 minutes to 40 minutes for each pipe was demonstrated. There was also a decrease of material cost due to the multiple bends part in one piece without cutting excessive materials for each single bend like it used to be.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In architecture courses, instilling a wider understanding of the industry specific representations practiced in the Building Industry is normally done under the auspices of Technology and Science subjects. Traditionally, building industry professionals communicated their design intentions using industry specific representations. Originally these mainly two dimensional representations such as plans, sections, elevations, schedules, etc. were produced manually, using a drawing board. Currently, this manual process has been digitised in the form of Computer Aided Design and Drafting (CADD) or ubiquitously simply CAD. While CAD has significant productivity and accuracy advantages over the earlier manual method, it still only produces industry specific representations of the design intent. Essentially, CAD is a digital version of the drawing board. The tool used for the production of these representations in industry is still mainly CAD. This is also the approach taken in most traditional university courses and mirrors the reality of the situation in the building industry. A successor to CAD, in the form of Building Information Modelling (BIM), is presently evolving in the Construction Industry. CAD is mostly a technical tool that conforms to existing industry practices. BIM on the other hand is revolutionary both as a technical tool and as an industry practice. Rather than producing representations of design intent, BIM produces an exact Virtual Prototype of any building that in an ideal situation is centrally stored and freely exchanged between the project team. Essentially, BIM builds any building twice: once in the virtual world, where any faults are resolved, and finally, in the real world. There is, however, no established model for learning through the use of this technology in Architecture courses. Queensland University of Technology (QUT), a tertiary institution that maintains close links with industry, recognises the importance of equipping their graduates with skills that are relevant to industry. BIM skills are currently in increasing demand throughout the construction industry through the evolution of construction industry practices. As such, during the second half of 2008, QUT 4th year architectural students were formally introduced for the first time to BIM, as both a technology and as an industry practice. This paper will outline the teaching team’s experiences and methodologies in offering a BIM unit (Architectural Technology and Science IV) at QUT for the first time and provide a description of the learning model. The paper will present the results of a survey on the learners’ perspectives of both BIM and their learning experiences as they learn about and through this technology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sleeper is an 18'00" musical work for live performer and laptop computer which exists as both a live performance work and a recorded work for audio CD. The work has been presented at a range of international performance events and survey exhibitions. These include the 2003 International Computer Music Conference (Singapore) where it was selected for CD publication, Variable Resistance (San Francisco Museum of Modern Art, USA), and i.audio, a survey of experimental sound at the Performance Space, Sydney. The source sound materials are drawn from field recordings made in acoustically resonant spaces in the Australian urban environment, amplified and acoustic instruments, radio signals, and sound synthesis procedures. The processing techniques blur the boundaries between, and exploit, the perceptual ambiguities of de-contextualised and processed sound. The work thus challenges the arbitrary distinctions between sound, noise and music and attempts to reveal the inherent musicality in so-called non-musical materials via digitally re-processed location audio. Thematically the work investigates Paul Virilio’s theory that technology ‘collapses space’ via the relationship of technology to speed. Technically this is explored through the design of a music composition process that draws upon spatially and temporally dispersed sound materials treated using digital audio processing technologies. One of the contributions to knowledge in this work is a demonstration of how disparate materials may be employed within a compositional process to produce music through the establishment of musically meaningful morphological, spectral and pitch relationships. This is achieved through the design of novel digital audio processing networks and a software performance interface. The work explores, tests and extends the music perception theories of ‘reduced listening’ (Schaeffer, 1967) and ‘surrogacy’ (Smalley, 1997), by demonstrating how, through specific audio processing techniques, sounds may shifted away from ‘causal’ listening contexts towards abstract aesthetic listening contexts. In doing so, it demonstrates how various time and frequency domain processing techniques may be used to achieve this shift.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital forensics relates to the investigation of a crime or other suspect behaviour using digital evidence. Previous work has dealt with the forensic reconstruction of computer-based activity on single hosts, but with the additional complexity involved with a distributed environment, a Web services-centric approach is required. A framework for this type of forensic examination needs to allow for the reconstruction of transactions spanning multiple hosts, platforms and applications. A tool implementing such an approach could be used by an investigator to identify scenarios of Web services being misused, exploited, or otherwise compromised. This information could be used to redesign Web services in order to mitigate identified risks. This paper explores the requirements of a framework for performing effective forensic examinations in a Web services environment. This framework will be necessary in order to develop forensic tools and techniques for use in service oriented architectures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Brisbane Water (BW), a commercialised business arm of Brisbane City Council (BCC) entered into an alliance with a number of organisations from the private sector in order to design, construct, commission and undertake upgrades to three existing wastewater treatment plants located at Sandgate, Oxley Creek, and Wacol in Brisbane. The alliance project is called the Brisbane Water Environmental Alliance (BWEA). This report details the efforts of a team of researchers from the School of Management at Queensland University of Technology to investigate this alliance. This is the second report on this project, and is called Stage 2 of the research. At the time that Stage 2 of the research project was conducted, the BWEA project was nearing completion with a further 8 months remaining before project completion. The aim of this report is to explore individuals’ perceptions of the effectiveness and functioning of the BWEA project in the latter stages of the project. The second aim of this report is to analyse the longitudinal findings of this research project by integrating the findings from Stage 1 and Stage 2 of the project. This long-term analysis of the functioning and effectiveness of the alliance is important because at the current time, researchers have little knowledge of the group developmental processes that occur in large-scale alliances over time. Stage 2 of this research project has a number of aims including assessing performance of the BWEA project from the point of view of a range of stakeholders including the alliance board and alliance management team, alliance staff, and key stakeholders from the client organisation (Brisbane Water). Data were collected using semi-structured interviews with 18 individuals including two board members, one external facilitator, and four staff members from the client organisation. Analysis involved coding the interview transcripts in terms of the major issues that were reported by interviewees.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim: To investigate workplace cultures in the acquisition of computer usage skills by mature age workers. Methods: Data were gathered through focus groups conducted at job network centres in the Greater Brisbane metropolitan region. Participants who took part were a mixture of workers and job-seekers. Results: The results suggest that mature age workers can be exposed to inappropriate computer training practices and age-insensitive attitudes towards those with low base computer skills. Conclusions: There is a need for managers to be observant of ageist attitudes in the work place and to develop age-sensitive strategies to help mature age workers learn computer usage skills. Mature age workers also need to develop skills in ways which are practical and meaningful to their work.