24 resultados para user-driven security adaptation


Relevância:

30.00% 30.00%

Publicador:

Resumo:

High speed downlink packet access (HSDPA) was introduced to UMTS radio access segment to provide higher capacity for new packet switched services. As a result, packet switched sessions with multiple diverse traffic flows such as concurrent voice and data, or video and data being transmitted to the same user are a likely commonplace cellular packet data scenario. In HSDPA, radio access network (RAN) buffer management schemes are essential to support the end-to-end QoS of such sessions. Hence in this paper we present the end-to-end performance study of a proposed RAN buffer management scheme for multi-flow sessions via dynamic system-level HSDPA simulations. The scheme is an enhancement of a time-space priority (TSP) queuing strategy applied to the node B MAC-hs buffer allocated to an end user with concurrent real-time (RT) and non-real-time (NRT) flows during a multi-flow session. The experimental multi- flow scenario is a packet voice call with concurrent TCP-based file download to the same user. Results show that with the proposed enhancements to the TSP-based RAN buffer management, end-to-end QoS performance gains accrue to the NRT flow without compromising RT flow QoS of the same end user session

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Invited talk, representing the Royal Society

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Approximate execution is a viable technique for energy-con\-strained environments, provided that applications have the mechanisms to produce outputs of the highest possible quality within the given energy budget.
We introduce a framework for energy-constrained execution with controlled and graceful quality loss. A simple programming model allows users to express the relative importance of computations for the quality of the end result, as well as minimum quality requirements. The significance-aware runtime system uses an application-specific analytical energy model to identify the degree of concurrency and approximation that maximizes quality while meeting user-specified energy constraints. Evaluation on a dual-socket 8-core server shows that the proposed
framework predicts the optimal configuration with high accuracy, enabling energy-constrained executions that result in significantly higher quality compared to loop perforation, a compiler approximation technique.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Understanding the extent, scale and genetic basis of local adaptation is important for conservation and management. Its relevance in salmonids at microgeographic scales, where dispersal (and hence potential gene flow) can be substantial, has however been questioned. Here we compare the fitness of communally-reared offspring of local and foreign Atlantic salmon Salmo salar from adjacent Irish rivers and reciprocal F1 hybrid crosses between them, in the wild ‘home’ environment of the local population. Experimental groups did not differ in wild smolt output but a catastrophic flood event may have limited our ability to detect freshwater performance differences, which were evident in a previous study. Foreign parr exhibited higher, and hybrids intermediate, emigration rates from the natal stream relative to local parr, consistent with genetically-based behavioural differences. Adult return rates were lower for the foreign compared to the local group. Overall lifetime success of foreigners and hybrids relative to locals was estimated at 31% and 40% (mean of both hybrid groups), respectively. The results imply a genetic basis to fitness differences among populations separated by only 50km, driven largely by variation in smolt to adult return rates. Hence even if supplementary stocking programs obtain broodstock from neighbouring rivers, the risk of extrinsic outbreeding depression may be high.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

X-ray backscatter imaging can be used for a wide range of imaging applications, in particular for industrial inspection and portal security. Currently, the application of this imaging technique to the detection of landmines is limited due to the surrounding sand or soil strongly attenuating the 10s to 100s of keV X-rays required for backscatter imaging. Here, we introduce a new approach involving a 140 MeV short-pulse (< 100 fs) electron beam generated by laser wakefield acceleration to probe the sample, which produces Bremsstrahlung X-rays within the sample enabling greater depths to be imaged. A variety of detector and scintillator configurations are examined, with the best time response seen from an absorptive coated BaF2 scintillator with a bandpass filter to remove the slow scintillation emission components. An X-ray backscatter image of an array of different density and atomic number items is demonstrated. The use of a compact laser wakefield accelerator to generate the electron source, combined with the rapid development of more compact, efficient and higher repetition rate high power laser systems will make this system feasible for applications in the field.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In order to protect user privacy on mobile devices, an event-driven implicit authentication scheme is proposed in this paper. Several methods of utilizing the scheme for recognizing legitimate user behavior are investigated. The investigated methods compute an aggregate score and a threshold in real-time to determine the trust level of the current user using real data derived from user interaction with the device. The proposed scheme is designed to: operate completely in the background, require minimal training period, enable high user recognition rate for implicit authentication, and prompt detection of abnormal activity that can be used to trigger explicitly authenticated access control. In this paper, we investigate threshold computation through standard deviation and EWMA (exponentially weighted moving average) based algorithms. The result of extensive experiments on user data collected over a period of several weeks from an Android phone indicates that our proposed approach is feasible and effective for lightweight real-time implicit authentication on mobile smartphones.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The duration compression effect is a phenomenon in which prior adaptation to a spatially circumscribed dynamic stimulus results in the duration of subsequent subsecond stimuli presented in the adapted region being underestimated. There is disagreement over the frame of reference within which the duration compression phenomenon occurs. One view holds that the effect is driven by retinotopic-tuned mechanisms located at early stages of visual processing, and an alternate position is that the mechanisms are spatiotopic and occur at later stages of visual processing (MT+). We addressed the retinotopic-spatiotopic question by using adapting stimuli – drifting plaids - that are known to activate global-motion mechanisms in area MT. If spatiotopic mechanisms contribute to the duration compression effect, drifting plaid adaptors should be well suited to revealing them. Following adaptation participants were tasked with estimating the duration of a 600ms random dot stimulus, whose direction was identical to the pattern direction of the adapting plaid, presented at either the same retinotopic or the same spatiotopic location as the adaptor. Our results reveal significant duration compression in both conditions, pointing to the involvement of both retinotopic-tuned and spatiotopic-tuned mechanisms in the duration compression effect.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we consider a multiuser downlink wiretap network consisting of one base station (BS) equipped with AA antennas, NB single-antenna legitimate users, and NE single-antenna eavesdroppers over Nakagami-m fading channels. In particular, we introduce a joint secure transmission scheme that adopts transmit antenna selection (TAS) at the BS and explores threshold-based selection diversity (tSD) scheduling over legitimate users to achieve a good secrecy performance while maintaining low implementation complexity. More specifically, in an effort to quantify the secrecy performance of the considered system, two practical scenarios are investigated, i.e., Scenario I: the eavesdropper’s channel state information (CSI) is unavailable at the BS, and Scenario II: the eavesdropper’s CSI is available at the BS. For Scenario I, novel exact closed-form expressions of the secrecy outage probability are derived, which are valid for general networks with an arbitrary number of legitimate users, antenna configurations, number of eavesdroppers, and the switched threshold. For Scenario II, we take into account the ergodic secrecy rate as the principle performance metric, and derive novel closed-form expressions of the exact ergodic secrecy rate. Additionally, we also provide simple and asymptotic expressions for secrecy outage probability and ergodic secrecy rate under two distinct cases, i.e., Case I: the legitimate user is located close to the BS, and Case II: both the legitimate user and eavesdropper are located close to the BS. Our important findings reveal that the secrecy diversity order is AAmA and the slope of secrecy rate is one under Case I, while the secrecy diversity order and the slope of secrecy rate collapse to zero under Case II, where the secrecy performance floor occurs. Finally, when the switched threshold is carefully selected, the considered scheduling scheme outperforms other well known existing schemes in terms of the secrecy performance and complexity tradeoff

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The subtle and complex nature of Northern Ireland's transitional landscape presents acute difficulties for the community policing concept. As the core to the police reforms in the country, its implementation has faltered in the face of institutional inertia within the Police Service of Northern Ireland (PSNI). This has been further exacerbated by a failure of the police to adequately increase the co-production of security through improved engagement and utilization of Northern Ireland's diverse community infrastructures. This paper will assess the delivery of community policing by the PSNI, while exploring their engagement with Northern Ireland's grass-roots community organizations, and specifically those involved with the governance of security at the local level. Thus, through a framework of adaptation, engagement and delivery of community policing by the PSNI within the unique context of Northern Ireland's security ‘otherness’, the paper will explore the key issues to police–community interaction associated with the broader vision of the Independent Commission on Policing (ICP) on community policing.