936 resultados para Distributed Denial-of-Service


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Writers on military matters from the 14th century until the late 18th century either regretted the decadence of their times compared with Antiquity, or they saw no great change in military affairs since Antiquity. Few saw a revolutionary change ushered in by gunpowder, although this number increased since the great "querelle" about the Ancients and the Moderns under Louis XIV. In the early 19th century, the balance tipped, and few would have denied that technology had profoundly changed warfare. All this is a far cry, however, from any contemporary perception of a "Military Revolution" in the 16th and 17th centuries.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Human ICT implants, such as RFID implants, cochlear implants, cardiac pacemakers, Deep Brain Stimulation, bionic limbs connected to the nervous system, and networked cognitive prostheses, are becoming increasingly complex. With ever-growing data processing functionalities in these implants, privacy and security become vital concerns. Electronic attacks on human ICT implants can cause significant harm, both to implant subjects and to their environment. This paper explores the vulnerabilities which human implants pose to crime victimisation in light of recent technological developments, and analyses how the law can deal with emerging challenges of what may well become the next generation of cybercrime: attacks targeted at technology implanted in the human body. After a state-of-the-art description of relevant types of human implants and a discussion how these implants challenge existing perceptions of the human body, we describe how various modes of attacks, such as sniffing, hacking, data interference, and denial of service, can be committed against implants. Subsequently, we analyse how these attacks can be assessed under current substantive and procedural criminal law, drawing on examples from UK and Dutch law. The possibilities and limitations of cybercrime provisions (eg, unlawful access, system interference) and bodily integrity provisions (eg, battery, assault, causing bodily harm) to deal with human-implant attacks are analysed. Based on this assessment, the paper concludes that attacks on human implants are not only a new generation in the evolution of cybercrime, but also raise fundamental questions on how criminal law conceives of attacks. Traditional distinctions between physical and non-physical modes of attack, between human bodies and things, between exterior and interior of the body need to be re-interpreted in light of developments in human implants. As the human body and technology become increasingly intertwined, cybercrime legislation and body-integrity crime legislation will also become intertwined, posing a new puzzle that legislators and practitioners will sooner or later have to solve.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Users’ requirements change drives an information system evolution. Consequently, such evolution affects those atomic services which provide functional operations from one state of their composition to another state of composition. A challenging issue associated with such evolution of the state of service composition is to ensure a resultant service composition remaining rational. This paper presents a method of Service Composition Atomic-Operation Set (SCAOS). SCAOS defines 2 classes of atomic operations and 13 kinds of basic service compositions to aid a state change process by using Workflow Net. The workflow net has algorithmic capabilities to compose the required services with rationality and maintain any changes to the services in a different composition also rational. This method can improve the adaptability to the ever changing business requirements of information systems in the dynamic environment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose – This paper aims to address the gaps in service recovery strategy assessment. An effective service recovery strategy that prevents customer defection after a service failure is a powerful managerial instrument. The literature to date does not present a comprehensive assessment of service recovery strategy. It also lacks a clear picture of the service recovery actions at managers’ disposal in case of failure and the effectiveness of individual strategies on customer outcomes. Design/methodology/approach – Based on service recovery theory, this paper proposes a formative index of service recovery strategy and empirically validates this measure using partial least-squares path modelling with survey data from 437 complainants in the telecommunications industry in Egypt. Findings – The CURE scale (CUstomer REcovery scale) presents evidence of reliability as well as convergent, discriminant and nomological validity. Findings also reveal that problem-solving, speed of response, effort, facilitation and apology are the actions that have an impact on the customer’s satisfaction with service recovery. Practical implications – This new formative index is of potential value in investigating links between strategy and customer evaluations of service by helping managers identify which actions contribute most to changes in the overall service recovery strategy as well as satisfaction with service recovery. Ultimately, the CURE scale facilitates the long-term planning of effective complaint management. Originality/value – This is the first study in the service marketing literature to propose a comprehensive assessment of service recovery strategy and clearly identify the service recovery actions that contribute most to changes in the overall service recovery strategy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Mobile Network Optimization (MNO) technologies have advanced at a tremendous pace in recent years. And the Dynamic Network Optimization (DNO) concept emerged years ago, aimed to continuously optimize the network in response to variations in network traffic and conditions. Yet, DNO development is still at its infancy, mainly hindered by a significant bottleneck of the lengthy optimization runtime. This paper identifies parallelism in greedy MNO algorithms and presents an advanced distributed parallel solution. The solution is designed, implemented and applied to real-life projects whose results yield a significant, highly scalable and nearly linear speedup up to 6.9 and 14.5 on distributed 8-core and 16-core systems respectively. Meanwhile, optimization outputs exhibit self-consistency and high precision compared to their sequential counterpart. This is a milestone in realizing the DNO. Further, the techniques may be applied to similar greedy optimization algorithm based applications.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It has been years since the introduction of the Dynamic Network Optimization (DNO) concept, yet the DNO development is still at its infant stage, largely due to a lack of breakthrough in minimizing the lengthy optimization runtime. Our previous work, a distributed parallel solution, has achieved a significant speed gain. To cater for the increased optimization complexity pressed by the uptake of smartphones and tablets, however, this paper examines the potential areas for further improvement and presents a novel asynchronous distributed parallel design that minimizes the inter-process communications. The new approach is implemented and applied to real-life projects whose results demonstrate an augmented acceleration of 7.5 times on a 16-core distributed system compared to 6.1 of our previous solution. Moreover, there is no degradation in the optimization outcome. This is a solid sprint towards the realization of DNO.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Five new species of Paepalanthus section Diphyomene are described and illustrated: P. brevis, P. flexuosus, P. longiciliatus, P. macer, and P. stellatus. Paepalanthus brevis, similar to P. decussus, is easily distinguished by its short reproductive axis, and pilose and mucronate leaves. Paepalanthus flexuosus, morphologically related to P. urbanianus, possesses a distinctive short and tortuous reproductive axis. Paepalanthus longiciliatus, morphologically similar to P. weddellianus, possesses long trichomes on the margins of the reproductive axis bracts, considered a diagnostic feature. Paepalanthus macer shares similarities with P. amoenus, differing by its sulfurous capitula and adpressed reproductive axis bracts. Paepalanthus stellatus also has affinity with P. decussus, but possesses unique, membranaceous, reproductive-axis bracts and a punctual inner-capitulum arrangement of pistillate flowers. Four of the described species are narrowly distributed in the state of Goias, whereas P. brevis is endemic to Distrito Federal. All are considered critically endangered. Detailed comparisons of these species are presented in tables. Comments on phenology, distribution, habitat and etymology, along with an identification key, are provided.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Imprisonments and fines are the standard sanctions employed by most western countries in punishing offenders.  Where neither of these penalties is appropriate, the courts normally have a variety of indeterminate sanctions at their disposal.  However the general effectiveness of these sanctions is questionable.  This paper argues that the criminal justice system has been too slow and unimaginative in developing efficient and effective methods of punishing offenders.  There are ways of inflicting pain on offenders that do not encroach on their liberty or affect their material wealth.  It is suggested that new sentencing options should include the annulment or suspension of an offenders academic qualifications and the making of orders preventing an offender from working or being enrolled in an educational or vocational pursuit.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the recent Australian decision in Cubillo and Gunner v The Commonwealth ( ‘Cubillo 3’ ), the Full Court of the Federal Court dismissed an appeal by the Aboriginal claimants seeking damages for, inter alia, their removal from their families and detention at certain Aboriginal institutions. The removal and detention of the plaintiffs was held to be lawful in the earlier determination of O’Loughlin J because it was, inter alia, believed to be in the [then] child’s best interests and, as the plaintiffs bore the onus of proof, they had failed to show that they were taken without the consent of their parents/guardians. This decision was based upon the factual finding that ‘at the relevant times, there was no general policy in force in the Northern Territory supporting the indiscriminate removal and detention of part-Aboriginal children, irrespective of the personal circumstances of each child’. The Full Court did not comment on O’Loughlin J’s assertion that the policy of removing part-Aboriginal children, as asserted by the plaintiffs, could not be maintained. Moreover, the Full Court in fact joined O’Loughlin J in trying to distance their findings from the broader issue of the legal rights of members of the Stolen Generation, emphasising that they were only concerned with the particular circumstances of the two plaintiffs/appellants. This case comment is not aimed at evaluating the specific legal issues raised by the plaintiffs’ claims in this case or reviewing the history of the Stolen Generation, but rather seeks to examine O’Loughlin J’s comment as to the absence of a policy of indiscriminate removal and detention of part-Aboriginal children in a bid to determine the parameters intended by the court. It will be seen that, at its broadest, the statement is quite inflammatory and may be seen as a denial of the Stolen Generation. It will be submitted that this was not intended by the court. At its narrowest, the statement is merely an assertion that the particular plaintiffs failed to prove their cases. It will be submitted that, whilst this clearly was the view of the court, O’Loughlin J’s statement does have broader implications which, it will be contended, are not warranted.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Inequalities in health and wellbeing within low socioeconomic (SES)  environments are well documented. Factors inherent to the health care system itself, such as inaccessible, inflexible or inappropriate seroiceprovision, contribute to the poorer health status ofresidents oflow SES areas. This paper explores the issues ofseroice provision in low SES areas, documenting the perceptions of seroice providers about the seroice needs of residents, in order to understand the systemic factors that negatively impact on health and wellbeing. A total of54 health and welfare seroice providers from two adjacent low SES suburbs within regional Victoria were interoiewed using qualitative research methods. Keyfindings indicate that successful navigation of health care seroices by residents within these low SES environments is being impeded by issues ofaccess, a lack ofappropriate early interoention options or measures, and general resident disempowerment. Central to the improvement of seroice provision is the need for seroices to become economically, geographically and culturally accessible. In particular, the importance of community involvement in health planning and health promoting seroices must be reflected in the ethos ofseroice provision.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We define personalisation as the set of capabilities that enables a user or an organisation to customise their working environment to suit their specific needs, preferences and circumstances. In the context of service discovery on the Grid, the demand for personalisation comes from individual users, who want their preferences to be taken into account during the search and selection of suitable services. These preferences can express, for example, the reliability of a service, quality of results, functionality, and so on. In this paper, we identify the problems related to personalising service discovery and present our solution: a personalised service registry or View. We describe scenarios in which personsalised service discovery would be useful and describe how our technology achieves them.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Research consistently demonstrates the strategic benefits of providing quality in service delivery (Tse and Wilton 1988; Anderson and Zeithaml 1984). However, to deliver a quality service, it is first necessary to determine the level of quality expectations that consumers have for a particular service industry. This paper examines whether quality expectations vary across services based on their degree of total intangibility. A controlled, repeated measures design is utilised, whereby subjects are each asked to evaluate three services that vary in their degree of intangibility. Contrary to past findings, results indicate that consumer expectations for service quality do not vary with the level of intangibility of the service.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a conceptual model and propositions outlining how, in a service recovery encounter, service guarantees (unconditional and specific) operate in conjunction with other organisational recovery variables (guarantee facilitation and service provider concern), to influence customers’ justice perceptions and subsequent satisfaction evaluations.