22 resultados para Secret Sharing Schemes

em Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho"


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Markovian algorithms for estimating the global maximum or minimum of real valued functions defined on some domain Omega subset of R-d are presented. Conditions on the search schemes that preserve the asymptotic distribution are derived. Global and local search schemes satisfying these conditions are analysed and shown to yield sharper confidence intervals when compared to the i.i.d. case.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective. To compare clinical response to initial empiric treatment with oxacillin plus ceftriaxone and amoxicillin plus clavulanic acid in hospitalized children diagnosed with very severe community-acquired pneumonia (CAP).Methods. A prospective randomized clinical study was conducted among children 2 months to 5 years old with a diagnosis of very severe CAP in the pediatric ward of São Paulo State University Hospital in Botucatu, São Paulo, Brazil, from April 2007 to May 2008. Patients were randomly divided into two groups by type of treatment: an oxacillin/ceftriaxone group (OCG, n = 48) and an amoxicillin/clavulanic acid group (ACG, n = 56). Analyzed outcomes were: time to clinical improvement (fever and tachypnea), time on oxygen therapy, length of stay in hospital, need to widen antimicrobial spectrum, and complications (including pleural effusion).Results. The two groups did not differ statistically for age, sex, symptom duration before admission, or previous antibiotic treatment. Time to improve tachypnea was less among ACG patients than OCG patients (4.8 +/- 2.2 versus 5.8 +/- 2.4 days respectively; P = 0.028), as was length of hospital stay (11.0 +/- 6.2 versus 14.4 +/- 4.5 days respectively; P = 0.002). There were no statistically significant differences between the two groups for fever improvement time, time on oxygen therapy, need to widen antimicrobial spectrum, or frequency of pleural effusion.Conclusions. Both treatment plans are effective in treating very severe CAP in 2-monthto 5-year-old hospitalized children. The only analyzed outcome that favored amoxicillin/clavulanic acid treatment was time required to improve tachypnea.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The conventional power flow method is considered to be inadequate to obtain the maximum loading point because of the singularity of Jacobian matrix. Continuation methods are efficient tools for solving this kind of problem since different parameterization schemes can be used to avoid such ill-conditioning problems. This paper presents the details of new schemes for the parameterization step of the continuation power flow method. The new parameterization options are based on physical parameters, namely, the total power losses (real and reactive), the power at the slack bus (real or reactive), the reactive power at generation buses, and transmission line power losses (real and reactive). The simulation results obtained with the new approach for the IEEE test systems (14, 30, 57, and 118 buses) are presented and discussed in the companion paper. The results show that the characteristics of the conventional method are not only preserved but also improved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

New parameterization schemes have been proposed by the authors in Part I of this paper. In this part these new options for the parameterization of power flow equations are tested, namely, the total power losses (real and reactive), the power at the slack bus (real or reactive), the reactive power at generation buses, and the transmission line power losses (real and reactive). These different parameterization schemes can be used to obtain the maximum loading point without ill-conditioning problems, once the singularity of Jacobian matrix is avoided. The results obtained with the new approach for the IEEE test systems (14, 30, 57, and 118 buses) show that the characteristics of the conventional method are not only preserved but also improved. In addition, it is shown that the proposed method and the conventional one can be switched during the tracing of PV curves to determine, with few iterations, all points of the PV curve. Several tests were also carried out to compare the performance of the proposed parameterization schemes for the continuation power flow method with the use of both the secant and tangent predictors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite the abundant availability,of protocols and application for peer-to-peer file sharing, several drawbacks are still present in the field. Among most notable drawbacks is the lack of a simple and interoperable way to share information among independent peer-to-peer networks. Another drawback is the requirement that the shared content can be accessed only by a limited number of compatible applications, making impossible their access to others applications and system. In this work we present a new approach for peer-to-peer data indexing, focused on organization and retrieval of metadata which describes the shared content. This approach results in a common and interoperable infrastructure, which provides a transparent access to data shared on multiple data sharing networks via a simple API. The proposed approach is evaluated using a case study, implemented as a cross-platform extension to Mozilla Fir fox browser; and demonstrates the advantages of such interoperability over conventional distributed data access strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper focuses on Virtual Reality (VR) as a very powerful technology that can be applied to the libraries, aiming at contributing to the activities of accessing, disseminating, and sharing information. The paper presents the VR concept and describes some libraries in virtual reality under utilization in different countries. In the final considerations, it is pointed out the use of virtual reality to develop libraries as collaborative virtual environments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite the abundant availability of protocols and application for peer-to-peer file sharing, several drawbacks are still present in the field. Among most notable drawbacks is the lack of a simple and interoperable way to share information among independent peer-to-peer networks. Another drawback is the requirement that the shared content can be accessed only by a limited number of compatible applications, making impossible their access to others applications and system. In this work we present a new approach for peer-to-peer data indexing, focused on organization and retrieval of metadata which describes the shared content. This approach results in a common and interoperable infrastructure, which provides a transparent access to data shared on multiple data sharing networks via a simple API. The proposed approach is evaluated using a case study, implemented as a cross-platform extension to Mozilla Firefox browser, and demonstrates the advantages of such interoperability over conventional distributed data access strategies. © 2009 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vehicular networks ensure that the information received from any vehicle is promptly and correctly propagated to nearby vehicles, to prevent accidents. A crucial point is how to trust the information transmitted, when the neighboring vehicles are rapidly changing and moving in and out of range. Current trust management schemes for vehicular networks establish trust by voting on the decision received by several nodes, which might not be required for practical scenarios. It might just be enough to check the validity of incoming information. Due to the ephemeral nature of vehicular networks, reputation schemes for mobile ad hoc networks (MANETs) cannot be applied to vehicular ad hoc networks (VANET). We point out several limitations of trust management schemes for VANET. In particular, we identify the problem of information cascading and oversampling, which commonly arise in social networks. Oversampling is a situation in which a node observing two or more nodes, takes into consideration both their opinions equally without knowing that they might have influenced each other in decision making. We show that simple voting for decision making, leads to oversampling and gives incorrect results. We propose an algorithm to overcome this problem in VANET. This is the first paper which discusses the concept of cascading effect and oversampling effects to ad hoc networks. © 2011 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Detecting misbehavior (such as transmissions of false information) in vehicular ad hoc networks (VANETs) is a very important problem with wide range of implications, including safety related and congestion avoidance applications. We discuss several limitations of existing misbehavior detection schemes (MDS) designed for VANETs. Most MDS are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners, e.g. for gaining access to a particular lane. It is therefore more important to detect false information than to identify misbehaving nodes. We introduce the concept of data-centric misbehavior detection and propose algorithms which detect false alert messages and misbehaving nodes by observing their actions after sending out the alert messages. With the data-centric MDS, each node can decide whether an information received is correct or false. The decision is based on the consistency of recent messages and new alerts with reported and estimated vehicle positions. No voting or majority decisions is needed, making our MDS resilient to Sybil attacks. After misbehavior is detected, we do not revoke all the secret credentials of misbehaving nodes, as done in most schemes. Instead, we impose fines on misbehaving nodes (administered by the certification authority), discouraging them to act selfishly. This reduces the computation and communication costs involved in revoking all the secret credentials of misbehaving nodes. © 2011 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Jacobian singularities of differential operators in curvilinear coordinates occur when the Jacobian determinant of the curvilinear-to-Cartesian mapping vanishes, thus leading to unbounded coefficients in partial differential equations. Within a finite-difference scheme, we treat the singularity at the pole of polar coordinates by setting up complementary equations. Such equations are obtained by either integral or smoothness conditions. They are assessed by application to analytically solvable steady-state heat-conduction problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: The purpose of this paper is to identify factors that facilitate tacit knowledge sharing in unstructured work environments, such as those found in automated production lines. Design/methodology/approach: The study is based on a qualitative approach, and it draws data from a four-month field study at a blown-molded glass factory. Data collection techniques included interviews, informal conversations and on-site observations, and data were interpreted using content analysis. Findings: The results indicated that sharing of tacit knowledge is facilitated by an engaging environment. An engaging environment is supported by shared language and knowledge, which are developed through intense communication and a strong sense of collegiality and a social climate that is dominated by openness and trust. Other factors that contribute to the creation of an engaging environment include managerial efforts to provide appropriate work conditions and to communicate company goals, and HRM practices such as the provision of formal training, on-the-job training and incentives. Practical implications: This paper clarifies the scope of managerial actions that impact knowledge creation and sharing among blue-collar workers. Originality/value: Despite the acknowledgement of the importance of blue-collar workers' knowledge, both the knowledge management and operations management literatures have devoted limited attention to it. Studies related to knowledge management in unstructured working environments are also not abundant. © Emerald Group Publishing Limited.