952 resultados para Security computing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Newsletter for Information Technology Department

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Newsletter for Information Technology Department

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Newsletter for Information Technology Department

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Newsletter for Information Technology Department

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Supplemental security income program

Relevância:

20.00% 20.00%

Publicador:

Resumo:

SUPPLEMENTAL SECURITY INCOME PROGRAM

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A-1A Supplemental Security Income Program, January 2005

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A-1A SUPPLEMENTAL SECURITY INCOME PROGRAM

Relevância:

20.00% 20.00%

Publicador:

Resumo:

SUPPLEMENTAL SECURITY INCOME PROGRAM

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A-1A Supplemental Security Income Program, July 2005

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The alignment between competences, teaching-learning methodologies and assessment is a key element of the European Higher Education Area. This paper presents the efforts carried out by six Telematics, Computer Science and Electronic Engineering Education teachers towards achieving this alignment in their subjects. In a joint work with pedagogues, a set of recommended actions were identified. A selection of these actions were applied and evaluated in the six subjects. The cross-analysis of the results indicate that the actions allow students to better understand the methodologies and assessment planned for the subjects, facilitate (self-) regulation and increase students’ involvement in the subjects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increasing volume of data describing humandisease processes and the growing complexity of understanding, managing, and sharing such data presents a huge challenge for clinicians and medical researchers. This paper presents the@neurIST system, which provides an infrastructure for biomedical research while aiding clinical care, by bringing together heterogeneous data and complex processing and computing services. Although @neurIST targets the investigation and treatment of cerebral aneurysms, the system’s architecture is generic enough that it could be adapted to the treatment of other diseases.Innovations in @neurIST include confining the patient data pertaining to aneurysms inside a single environment that offers cliniciansthe tools to analyze and interpret patient data and make use of knowledge-based guidance in planning their treatment. Medicalresearchers gain access to a critical mass of aneurysm related data due to the system’s ability to federate distributed informationsources. A semantically mediated grid infrastructure ensures that both clinicians and researchers are able to seamlessly access andwork on data that is distributed across multiple sites in a secure way in addition to providing computing resources on demand forperforming computationally intensive simulations for treatment planning and research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a distributed key distribution scheme, a set of servers helps a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some servers and some users has no information about the key of a noncorrupted group. In this work, we formalize the security analysis of one such scheme which was not considered in the original proposal. We prove the scheme is secure in the random oracle model, assuming that the Decisional Diffie-Hellman (DDH) problem is hard to solve. We also detail a possible modification of that scheme and the one in which allows us to prove the security of the schemes without assuming that a specific hash function behaves as a random oracle. As usual, this improvement in the security of the schemes is at the cost of an efficiency loss.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

SUPPLEMENTAL SECURITY INCOME PROGRAM, August 2005

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Classical planning has been notably successful in synthesizing finite plans to achieve states where propositional goals hold. In the last few years, classical planning has also been extended to incorporate temporally extended goals, expressed in temporal logics such as LTL, to impose restrictions on the state sequences generated by finite plans. In this work, we take the next step and consider the computation of infinite plans for achieving arbitrary LTL goals. We show that infinite plans can also be obtained efficiently by calling a classical planner once over a classical planning encoding that represents and extends the composition of the planningdomain and the B¨uchi automaton representingthe goal. This compilation scheme has been implemented and a number of experiments are reported.