16 resultados para Malicious nodes
em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast
Resumo:
In wireless networks, the broadcast nature of the propagation medium makes the communication process vulnerable to malicious nodes (e.g. eavesdroppers) which are in the coverage area of the transmission. Thus, security issues play a vital role in wireless systems. Traditionally, information security has been addressed in the upper layers (e.g. the network layer) through the design of cryptographic protocols. Cryptography-based security aims to design a protocol such that it is computationally prohibitive for the eavesdropper to decode the information. The idea behind this approach relies on the limited computational power of the eavesdroppers. However, with advances in emerging hardware technologies, achieving secure communications relying on protocol-based mechanisms alone become insufficient. Owing to this fact, a new paradigm of secure communications has been shifted to implement the security at the physical layer. The key principle behind this strategy is to exploit the spatial-temporal characteristics of the wireless channel to guarantee secure data transmission without the need of cryptographic protocols.
Resumo:
Since the publication of Hobsbawm and Rudé's Captain Swing our understanding of the role(s) of covert protests in Hanoverian rural England has advanced considerably. Whilst we now know much about the dramatic practices of incendiarism and animal maiming and the voices of resistance in seemingly straightforward acquisitive acts, one major gap remains. Despite the fact that almost thirty years have passed since E. P. Thompson brought to our attention that under the notorious ‘Black Act’ the malicious cutting of trees was a capital offence, no subsequent research has been published. This paper seeks to address this major lacuna by systematically analysing the practices and patterns of malicious attacks on plants (‘plant maiming’) in the context of late eighteenth- and early nineteenth-century southern England. It is shown that not only did plant maiming take many different forms, attacking every conceivable type of flora, but also that it was universally understood and practised. In some communities plant maiming was the protestors' weapon of choice. As a social practice it therefore embodied wider community beliefs regarding the defence of plebeian livelihoods and identities.
Resumo:
Regulatory T (Treg) cells limit the onset of effective antitumor immunity, through yet-ill-defined mechanisms. We showed the rejection of established ovalbumin (OVA)-expressing MCA101 tumors required both the adoptive transfer of OVA-specific CD8(+) T cell receptor transgenic T cells (OTI) and the neutralization of Foxp3(+) T cells. In tumor-draining lymph nodes, Foxp3(+) T cell neutralization induced a marked arrest in the migration of OTI T cells, increased numbers of dendritic cells (DCs), and enhanced OTI T cell priming. Using an in vitro cytotoxic assay and two-photon live microscopy after adoptive transfer of DCs, we demonstrated that Foxp3(+) T cells induced the death of DCs in tumor-draining lymph nodes, but not in the absence of tumor. DC death correlated with Foxp3(+) T cell-DC contacts, and it was tumor-antigen and perforin dependent. We conclude that Foxp3(+) T cell-dependent DC death in tumor-draining lymph nodes limits the onset of CD8(+) T cell responses.
Resumo:
In this study, we investigated whether (a) carcinoembryonic antigen (CEA), cytokeratin-20 (CK-20) and guanylyl cyclase C (GCC) are clinically useful markers for the molecular detection of submicroscopic metastases in colorectal cancer (CRC) and (b) whether overexpression of CEA, CK-20 and GCC can be reliably detected in formalin-fixed, paraffin-embedded tissues as well as frozen lymph nodes. We studied 175 frozen lymph nodes and 158 formalin-fixed, paraffin-embedded lymph nodes from 28 cases of CRC. CEA or CK-20 or GCC-specific polymerase chain reaction (PCR) was carried out on mRNA transcripts extracted from the nodal tissues. Ten out of I I Dukes' B CRC cases had detectable CEA and CK-20 while 6 out of 11 Dukes' B CRC cases had detectable GCC. In general, the difference of re-staged cases when comparing frozen and paraffin-embedded samples was marked; the only statistically significant correlation between frozen and paraffin tissue was for the CEA marker. Our results indicated a high incidence (>50%) of detecting micrometastases in histologically-negative lymph nodes at the molecular level. (C) 2003 Elsevier Science Ltd. All rights reserved.
Resumo:
To optimize the performance of wireless networks, one needs to consider the impact of key factors such as interference from hidden nodes, the capture effect, the network density and network conditions (saturated versus non-saturated). In this research, our goal is to quantify the impact of these factors and to propose effective mechanisms and algorithms for throughput guarantees in multi-hop wireless networks. For this purpose, we have developed a model that takes into account all these key factors, based on which an admission control algorithm and an end-to-end available bandwidth estimation algorithm are proposed. Given the necessary network information and traffic demands as inputs, these algorithms are able to provide predictive control via an iterative approach. Evaluations using analytical comparison with simulations as well as existing research show that the proposed model and algorithms are accurate and effective.
Resumo:
EU non-discrimination law has seen a proliferation of discrimination grounds from 2000. Dis-crimination on grounds of gender (in the field of equal pay) and on grounds of nationality (generally within the scope of application of EU law) were the only prohibited forms of discrimination in EU law, until the Treaty of Amsterdam empowered the Community to legislate in order to combat discrimination on grounds of sex, racial or ethnic origin, religion or belief, disability, age or sexual orientation (Article 13 EC). Proliferation of non-discrimination grounds is also characteristic for international and national non-discrimination law. As such, proliferation of grounds results in an increase in potential cases of “multiple discrimination” and the danger of diluting the demands of equality law by ever more multiplication of grounds. The hierarchy of equality, which has been so widely criticised in EU law, is a signifier of the latter danger.
This chapter proposes to structure the confusing field of non-discrimination grounds by organising them around nodes of discrimination fields. It will first reflect different ways of establishing hierarchies between grounds. This will be followed by a recount of different (narrow and wide) reading of grounds. A comprehensive reading of the grounds gender, ‘race’ and disability as establishing overlapping fields of discrimination grounds will be mapped out, with some examples for practical uses.
Resumo:
Critical nodes—or “middlemen”—have an essential place in both social and economic networks when considering the flow of information and trade. This paper extends the concept of critical nodes to directed networks and in doing so identify strong and weak middlemen.
Node contestability is introduced as a form of competition in networks; a duality between uncontested intermediaries and middlemen is established. The brokerage power of middlemen is formally expressed and a general algorithm is constructed to measure the brokerage power of each node from the networks adjacency matrix. Augmentations of the brokerage power measure are discussed to encapsulate relevant centrality measures. Furthermore, we extend these notions and provide measures of the competitiveness of a network.
We use these concepts to identify and measure middlemen in two empirical socio-economic networks, the elite marriage network of Renaissance Florence and Krackhardt’s advice net- work.