6 resultados para Emotion annotation-scheme

em DigitalCommons@University of Nebraska - Lincoln


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dynamic conferencing refers to a scenario wherein any subset of users in a universe of users form a conference for sharing confidential information among themselves. The key distribution (KD) problem in dynamic conferencing is to compute a shared secret key for such a dynamically formed conference. In literature, the KD schemes for dynamic conferencing either are computationally unscalable or require communication among users, which is undesirable. The extended symmetric polynomial based dynamic conferencing scheme (ESPDCS) is one such KD scheme which has a high computational complexity that is universe size dependent. In this paper we present an enhancement to the ESPDCS scheme to develop a KD scheme called universe-independent SPDCS (UI-SPDCS) such that its complexity is independent of the universe size. However, the UI-SPDCS scheme does not scale with the conference size. We propose a relatively scalable KD scheme termed as DH-SPDCS that uses the UI-SPDCS scheme and the tree-based group Diffie- Hellman (TGDH) key exchange protocol. The proposed DH-SPDCS scheme provides a configurable trade-off between computation and communication complexity of the scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Waveband switching (WBS) is an important technique to save switching and transmission cost in wavelength -division multiplexed (WDM) optical networks. A cost-efficient WBS scheme would enable network carriers to increase the network throughput (revenue) while achieving significant cost savings. We identify the critical factors that determine the WBS network throughput and switching cost and propose a novel intermediate waveband switching (IT-WBS) algorithm, called the minimizing-weighted-cost (MWC) algorithm. The MWC algorithm defines a cost for each candidate route of a call. By selecting the route with the smallest weighted cost, MWC balances between minimizing the call blocking probability and minimizing the network switching cost. Our simulations show that MWC outperforms other wavelength/waveband switching algorithms and can enhance the network throughput at a reduced cost.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Key distribution has been extensively studied in the context of sensor networks. However, key revocation has received relatively little attention. Existing key revocation schemes can be divided into two categories: centralized key revocation scheme and distributed key revocation scheme. In this paper, we first summarize the current key revocation schemes for sensor networks. Then, we propose an efficient centralized key revocation scheme, KeyRev, for wireless sensor networks. Unlike most proposed key revocation schemes focusing on removing the compromised keys, we propose to use key updating techniques to obsolesce the keys owned by the compromised sensor nodes and thus remove the nodes from the network. Our analyses show that the KeyRev scheme is secure inspite of not removing the pre-distributed key materials at compromised sensor nodes. Simulation results also indicate that the KeyRev scheme is scalable and performs very well in wireless sensor networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose an efficient scheduling scheme that optimizes advance-reserved lightpath services in reconfigurable WDM networks. A re-optimization approach is devised to reallocate network resources for dynamic service demands while keeping determined schedule unchanged.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ICT revolution has permeated every profession and all areas of human endeavour. Professions such as law, medicine , engineering, and library and information science are adjusting to the ICT environment through re-tooling, retraining, and curriculum revision. The purpose of this study is to explore the impact of ICT on the student industrial work experience scheme (SIWES) of library and information science students. It traces the historical development of the scheme, the ICT development trends in LIS, and the challenges this development brings to SIWES. Strategies to absorb this shock created by ICT are offered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent theoretical writings suggest that the ineffective regulation of negative emotional states may reduce the ability of women to detect and respond effectively to situational and interpersonal factors that increase risk for sexual assault. However, little empirical research has explored this hypothesis. In the present study, it was hypothesized that prior sexual victimization and negative mood state would each independently predict poor risk recognition and less effective defensive actions in response to an analogue sexual assault vignette. Further, these variables were expected to interact to produce particularly impaired risk responses. Finally, that the in vivo emotion regulation strategy of suppression and corresponding cognitive resource usage (operationalized as memory impairment for the vignette) were hypothesized to mediate these associations. Participants were 668 female undergraduate students who were randomly assigned to receive a negative or neutral film mood induction followed by an audiotaped dating interaction during which they were instructed to indicate when the man had “gone too far” and describe an adaptive response to the situation. Approximately 33.5% of the sample reported a single victimization and 10% reported revictimization. Hypotheses were largely unsupported as sexual victimization history, mood condition, and their interaction did not impact risk recognition or adaptive responding. However, in vivo emotional suppression and cognitive resource usage were shown to predict delayed risk recognition only. Findings suggest that contrary to hypotheses, negative mood (as induced here) may not relate to risk recognition and response impairments. However, it may be important for victimization prevention programs that focus on risk perception to address possible underlying issues with emotional suppression and limited cognitive resources to improve risk perception abilities. Limitations and future directions are discussed.