145 resultados para privacy-preserving


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Least squares polynomial splines are an effective tool for data fitting, but they may fail to preserve essential properties of the underlying function, such as monotonicity or convexity. The shape restrictions are translated into linear inequality conditions on spline coefficients. The basis functions are selected in such a way that these conditions take a simple form, and the problem becomes non-negative least squares problem, for which effecitive and robust methods of solution exist. Multidimensional monotone approximation is achieved by using tensor-product splines with the appropriate restrictions. Additional inter polation conditions can also be introduced. The conversion formulas to traditional B-spline representation are provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The narrow alleys and the small neighbourhood squares are the most recognisable urban configuration forms that highlight the fabrics of Old Cairo. Parts of Old Cairo are currently going through major conservation projects. The extent of the success of some of these projects in preserving the identity of the Cairene context is currently under scrutiny and has created a debate among local residents, professionals, and politicians. Preliminary investigation has been conducted to assess the rehabilitation strategy of the selected case of el-Darb el-Asfar in relation to its context. Daylight is an essential contextual ingredient that characterises particular places from its counterparts. The rehabilitation project, using new finishing materials, has led to changes in daylight levels and reflections in the space and hence modify the visual perception and the identity of the place itself. This paper aims to assess the impact of the proposed intervention on the visual perception and the identity of the selected built heritage. Daylight variables in open spaces, a combination of sunlight, skylight and the reflected light from the facades and the ground, are identified. Using TOWNSCOPE, daylight's components are calculated pre and after the implementation of the project. The performance of reflected component is traced by simulating the impact of the original and recently used materials. The paper concludes by suggesting a set of measures to achieve an appropriate daylight performance to achieve a sustainable development in the area and maintain the identity of the old city.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we consider an information system (IS) to be a set of technologies together with a set of rules about those technologies. An IS is considered to be prone to a privacy incident if it does not fully protect the private information of a user or if a dishonest user can take advantage of the privacy protection offered by the IS. This work identifies the potential privacy incidents that may occur in an IS, and proposes a framework, the MAPI Framework (Manage or Avoid Privacy Incidents), which designs IS to manage or avoid privacy incidents. The MAPI Framework can also be used for evaluating IS by identifying the missing or inappropriate technologies which may lead to privacy incidents.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent times Australian courts have demonstrated a willingness to fashion a right to personal privacy at common law. The Australian Law Reform Commission has noted this impOt1ant development and said it was likely to continue in the absence of legislative action in the area. The aim of this article is to outline a theoretical framework to underpin and inform the development of this emerging right - howsoever framed - and the extent to which it is possible for the law to provide meaningful privacy protection to public officials under the Constitution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The vision of volunteer computing is to provide large scale computational infrastructure by using dynamic collections of donated desktop computers. There have been many works that highlighted the significant benefits of volunteer computing but little on the security and privacy threats associated with its exploitation. However, volunteer computing is vulnerable to a variety of attacks and presents numerous significant security threats to the stakeholders. This paper presents security and privacy threat taxonomy along with the security features developed to cope with such threats.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In an era when games at the elite level are sports entertainment businesses many of the elite performers in different industries have evolved into celebrities: they exist as images, icons and brands whose every thought, action, change of style or partner is commodified and consumed. This article reports on one aspect of a research project that was funded by the Australian Football League (AFL) to explore the emergence and evolution of a `professional identity' for AFL footballers. Drawing on Foucault's later work on the care of the Self we focus on the ways in which player identities are governed by coaches, club officials, and the AFL Commission/Executive; and the manner in which players conduct themselves in ways that can be characterized as professional — or not. The article explores the roles of Player Development Managers (PDMs) in emerging processes of risk and player management that can be seen as intrusive in players' lives. The research we report on produced evidence of tensions between the paternalistic, profiling and reporting elements of various risk management practices at the Club level — in an environment where what it means to be a professional footballer is taking on new forms.