999 resultados para Internet filtering


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Australian Federal Government is concerned about the impact of the Internet on Australian society and has been considering ways to protect the Australian public against the "darker" elements of the Internet. The Federal Government has proposed a new model whereby Internet Service Provider's (ISP's) level the filtering of overseas hosted Internet material classified as Refused Classification (RC) under the National Classification Scheme. This paper will describe the historical development of this strategy and will analyse the outcome of the public consultation of the proposed Australian Federal Government proposals.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Internet of Things (IoT) is the next industrial revolution: we will interact naturally with real and virtual devices as a key part of our daily life. This technology shift is expected to be greater than the Web and Mobile combined. As extremely different technologies are needed to build connected devices, the Internet of Things field is a junction between electronics, telecommunications and software engineering. Internet of Things application development happens in silos, often using proprietary and closed communication protocols. There is the common belief that only if we can solve the interoperability problem we can have a real Internet of Things. After a deep analysis of the IoT protocols, we identified a set of primitives for IoT applications. We argue that each IoT protocol can be expressed in term of those primitives, thus solving the interoperability problem at the application protocol level. Moreover, the primitives are network and transport independent and make no assumption in that regard. This dissertation presents our implementation of an IoT platform: the Ponte project. Privacy issues follows the rise of the Internet of Things: it is clear that the IoT must ensure resilience to attacks, data authentication, access control and client privacy. We argue that it is not possible to solve the privacy issue without solving the interoperability problem: enforcing privacy rules implies the need to limit and filter the data delivery process. However, filtering data require knowledge of how the format and the semantics of the data: after an analysis of the possible data formats and representations for the IoT, we identify JSON-LD and the Semantic Web as the best solution for IoT applications. Then, this dissertation present our approach to increase the throughput of filtering semantic data by a factor of ten.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While there are reports of developing sexual relationships on the Internet (I) among MSM, there are few reports that have examined the process of developing sexual relationships on the I and comparing to that in real life (IRL). This study examines the process to provide insight into how MSM make decisions about courtship, engages in negotiations for sex, and choose sexual partners and examines the comparative sexual risks taken between I vs. IRL negotiation. This self-selected convenience sample at a national level (n=1001) of MSM recruited through the I, systematically explored the different steps, the process of courtship in a flow chart of I and IRL dating to portray the process of filtering, courtship and/or negotiation for sex. Risk behaviors in both environments are presented along with interactions that create predictable sequences or "scripts". These sequences constitute 'filtering' and 'sexual positioning'. Differences between I & IRL suggest discussion of HIV/STD status to have consistent differences for all variables except 'unprotected sex' meaning no condom use. There was more communication on the I in regards to self revealing information or variables relating to reducing risks which enable 'filtering' (including serosorting). Data indicate more steps in the I process, providing more complex, multiple steps to filter and position with regard not only to HIV/STD risk but also to negotiate position for complementary sexual interest. The study established a pattern of MSM's courtships or negotiation for sex and a pattern of acquisition, and more I negotiation. Data suggest negotiation opportunities which could lend to intervention to advise people how to negotiate safely. ^ Previous studies have reviewed MSM and drug use. This is a study to review the process of drug use associated with sexual behavior regarding the Internet (I) and in real life (IRL) using a self-selected, convenience sample of MSM (n=1001) recruited nation-wide through the Internet. Data on MSM and drugs illustrate the Internet being used as a tool to filter for drug use among MSM. MSM's drug use in both environments highlights the use of sexual performance drugs with an IRL pursuit of intimacy or negotiation for sex. IRL encounters were more likely to involve drug use (both recreational and sexual performance-enhancing) than Internet encounters. This may be due to more IRL meetings occurring at bars, clubs or parties where drug use is a norm. Compared with IRL, the Internet may provide a venue for persons who do not want to use drugs to select partners with similar attitudes. This suggests that filtering may be occurring as part of the internet negotiation. Data indicated that IRL persons get drunk/high before having sex in past 60 days significantly more often than Internet participants. Age did not alter the pattern of results. Thus drug filtering is really not recreational drug filtering or selecting for PNP, but appears to be situationally-based. Thus, it should perhaps be seen as another form of filtering to select drug-free partners, rather than using the Internet to specifically recruit and interact with other recreational drug users. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Collaborative filtering recommender systems contribute to alleviating the problem of information overload that exists on the Internet as a result of the mass use of Web 2.0 applications. The use of an adequate similarity measure becomes a determining factor in the quality of the prediction and recommendation results of the recommender system, as well as in its performance. In this paper, we present a memory-based collaborative filtering similarity measure that provides extremely high-quality and balanced results; these results are complemented with a low processing time (high performance), similar to the one required to execute traditional similarity metrics. The experiments have been carried out on the MovieLens and Netflix databases, using a representative set of information retrieval quality measures.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Transportation Department, Office of University Research, Washington, D.C.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thesis (M. S.)--University of Illinois at Urbana-Champaign.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

"*This work was supported in part by the U.S. Atomic Energy Commission under Contract No. AT911-1)-1018."

Relevância:

30.00% 30.00%

Publicador:

Resumo:

cover-title

Relevância:

30.00% 30.00%

Publicador:

Resumo:

"Cornell Aeronautical Laboratory internal research."

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Includes bibliography.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The paper describes two new transport layer (TCP) options and an expanded transport layer queuing strategy that facilitate three functions that are fundamental to the dispatching-based clustered service. A transport layer option has been developed to facilitate. the use of client wait time data within the service request processing of the cluster. A second transport layer option has been developed to facilitate the redirection of service requests by the cluster dispatcher to the cluster processing member. An expanded transport layer service request queuing strategy facilitates the trust based filtering of incoming service requests so that a graceful degradation of service delivery may be achieved during periods of overload - most dramatically evidenced by distributed denial of service attacks against the clustered service. We describe how these new options and queues have been implemented and successfully tested within the transport layer of the Linux kernel.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

O trabalho desenvolvido analisa a Comunicação Social no contexto da internet e delineia novas metodologias de estudo para a área na filtragem de significados no âmbito científico dos fluxos de informação das redes sociais, mídias de notícias ou qualquer outro dispositivo que permita armazenamento e acesso a informação estruturada e não estruturada. No intento de uma reflexão sobre os caminhos, que estes fluxos de informação se desenvolvem e principalmente no volume produzido, o projeto dimensiona os campos de significados que tal relação se configura nas teorias e práticas de pesquisa. O objetivo geral deste trabalho é contextualizar a área da Comunicação Social dentro de uma realidade mutável e dinâmica que é o ambiente da internet e fazer paralelos perante as aplicações já sucedidas por outras áreas. Com o método de estudo de caso foram analisados três casos sob duas chaves conceituais a Web Sphere Analysis e a Web Science refletindo os sistemas de informação contrapostos no quesito discursivo e estrutural. Assim se busca observar qual ganho a Comunicação Social tem no modo de visualizar seus objetos de estudo no ambiente das internet por essas perspectivas. O resultado da pesquisa mostra que é um desafio para o pesquisador da Comunicação Social buscar novas aprendizagens, mas a retroalimentação de informação no ambiente colaborativo que a internet apresenta é um caminho fértil para pesquisa, pois a modelagem de dados ganha corpus analítico quando o conjunto de ferramentas promovido e impulsionado pela tecnologia permite isolar conteúdos e possibilita aprofundamento dos significados e suas relações.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this thesis was to develop an efficient routing protocol which would provide mobility support to the mobile devices roaming within a network. The routing protocol need to be compatible with the existing internet architecture. The routing protocol proposed here is based on the Mobile IP routing protocol and could solve some of the problems existing in current Mobile IP implementation e.g. ingress filtering problem. By implementing an efficient timeout mechanism and introducing Paging mechanism to the wireless network, the protocol minimizes the number of control messages sent over the network. The implementation of the system is primarily done on three components: 1) Mobile devices that need to gain access to the network, 2) Router which would be providing roaming support to the mobile devices and 3) Database server providing basic authentication services on the system. As a result, an efficient IP routing protocol is developed which would provide seamless mobility to the mobile devices on the network.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Existe una cantidad enorme de información en Internet acerca de incontables temas, y cada día esta información se expande más y más. En teoría, los programas informáticos podrían beneficiarse de esta gran cantidad de información disponible para establecer nuevas conexiones entre conceptos, pero esta información a menudo aparece en formatos no estructurados como texto en lenguaje natural. Por esta razón, es muy importante conseguir obtener automáticamente información de fuentes de diferentes tipos, procesarla, filtrarla y enriquecerla, para lograr maximizar el conocimiento que podemos obtener de Internet. Este proyecto consta de dos partes diferentes. En la primera se explora el filtrado de información. La entrada del sistema consiste en una serie de tripletas proporcionadas por la Universidad de Coimbra (ellos obtuvieron las tripletas mediante un proceso de extracción de información a partir de texto en lenguaje natural). Sin embargo, debido a la complejidad de la tarea de extracción, algunas de las tripletas son de dudosa calidad y necesitan pasar por un proceso de filtrado. Dadas estas tripletas acerca de un tema concreto, la entrada será estudiada para averiguar qué información es relevante al tema y qué información debe ser descartada. Para ello, la entrada será comparada con una fuente de conocimiento online. En la segunda parte de este proyecto, se explora el enriquecimiento de información. Se emplean diferentes fuentes de texto online escritas en lenguaje natural (en inglés) y se extrae información de ellas que pueda ser relevante al tema especificado. Algunas de estas fuentes de conocimiento están escritas en inglés común, y otras están escritas en inglés simple, un subconjunto controlado del lenguaje que consta de vocabulario reducido y estructuras sintácticas más simples. Se estudia cómo esto afecta a la calidad de las tripletas extraídas, y si la información obtenida de fuentes escritas en inglés simple es de una calidad superior a aquella extraída de fuentes en inglés común.