990 resultados para Soudek, Ernest
Resumo:
The Davoser Hochschulkurse took place for the first time in 1928. Mainly university teachers from Germany, France, Switzerland (perhaps elsewhere) offered lectures to students recovering from tuberculosis at the health resort in the Swiss mountains. The lecturers were accommodated at the Grand Hotel Curhaus, where the lectures also took place.
Resumo:
The Davoser Hochschulkurse took place for the first time in 1928. Mainly university teachers from Germany, France, Switzerland (perhaps elsewhere) offered lectures to students recovering from tuberculosis at the health resort in the Swiss mountains. The lecturers were accommodated at the Grand Hotel Curhaus, where the lectures also took place.
Resumo:
Digital Image
Resumo:
Digital Image
Resumo:
Signed by photographer lower right
Resumo:
Handwritten dedication: To Ernest A. Koellcken? cordial souvenir Pablo Casals 1967
Resumo:
1 portrait; 2 photographs of Nachum Glatzer indoors; 2 photographs of Nachum Glatzer outdoors skiing with an unidentified girl and boy
Resumo:
Handwritten names (illegible) on verso
Resumo:
Photocopy of family history (70p), includes photocopies of original documents.
Resumo:
The bulk of the correspondence was sent 1939-1941 from Anna Deutsch and then 1945/46 from Irene Lichtblau-Reger, both in Vienna, Austria, to Adele and Margarete Wagner, who lived with the Kokisch family (Ernest, Gertrud and Ron) in New York.
Resumo:
The Distributed Network Protocol v3.0 (DNP3) is one of the most widely used protocols to control national infrastructure. The move from point-to-point serial connections to Ethernet-based network architectures, allowing for large and complex critical infrastructure networks. However, networks and con- figurations change, thus auditing tools are needed to aid in critical infrastructure network discovery. In this paper we present a series of intrusive techniques used for reconnaissance on DNP3 critical infrastructure. Our algorithms will discover DNP3 outstation slaves along with their DNP3 addresses, their corresponding master, and class object configurations. To validate our presented DNP3 reconnaissance algorithms and demonstrate it’s practicality, we present an implementation of a software tool using a DNP3 plug-in for Scapy. Our implementation validates the utility of our DNP3 reconnaissance technique. Our presented techniques will be useful for penetration testing, vulnerability assessments and DNP3 network discovery.
Resumo:
Generating discriminative input features is a key requirement for achieving highly accurate classifiers. The process of generating features from raw data is known as feature engineering and it can take significant manual effort. In this paper we propose automated feature engineering to derive a suite of additional features from a given set of basic features with the aim of both improving classifier accuracy through discriminative features, and to assist data scientists through automation. Our implementation is specific to HTTP computer network traffic. To measure the effectiveness of our proposal, we compare the performance of a supervised machine learning classifier built with automated feature engineering versus one using human-guided features. The classifier addresses a problem in computer network security, namely the detection of HTTP tunnels. We use Bro to process network traffic into base features and then apply automated feature engineering to calculate a larger set of derived features. The derived features are calculated without favour to any base feature and include entropy, length and N-grams for all string features, and counts and averages over time for all numeric features. Feature selection is then used to find the most relevant subset of these features. Testing showed that both classifiers achieved a detection rate above 99.93% at a false positive rate below 0.01%. For our datasets, we conclude that automated feature engineering can provide the advantages of increasing classifier development speed and reducing development technical difficulties through the removal of manual feature engineering. These are achieved while also maintaining classification accuracy.
Resumo:
Detection and prevention of global network satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill three gaps in the literature: first, to assess in detail the exact nature of threat scenarios posed by spoofing against the most commonly cited targets; second, to investigate the many practical impediments, often underplayed, to carrying out GNSS spoofing attacks in the field; and third, to survey and assess the effectiveness of a wide range of proposed defences against GNSS spoofing. Our conclusion lists promising areas of future research.
Resumo:
A Delay Tolerant Network (DTN) is a dynamic, fragmented, and ephemeral network formed by a large number of highly mobile nodes. DTNs are ephemeral networks with highly mobile autonomous nodes. This requires distributed and self-organised approaches to trust management. Revocation and replacement of security credentials under adversarial influence by preserving the trust on the entity is still an open problem. Existing methods are mostly limited to detection and removal of malicious nodes. This paper makes use of the mobility property to provide a distributed, self-organising, and scalable revocation and replacement scheme. The proposed scheme effectively utilises the Leverage of Common Friends (LCF) trust system concepts to revoke compromised security credentials, replace them with new ones, whilst preserving the trust on them. The level of achieved entity confidence is thereby preserved. Security and performance of the proposed scheme is evaluated using an experimental data set in comparison with other schemes based around the LCF concept. Our extensive experimental results show that the proposed scheme distributes replacement credentials up to 35% faster and spreads spoofed credentials of strong collaborating adversaries up to 50% slower without causing any significant increase on the communication and storage overheads, when compared to other LCF based schemes.
Resumo:
Det är helt naturligt att konsumenterna sprider marknadsinformation genom att sinsemellan prata om sina konsumtionserfarenheter. Även om man i marknadsföringslitteraturen betonar den konsumentdominerade informella marknadskommunikationens genuina karaktär jämfört med den företagsdominerade formella marknadskommunikationen, så har man rätt dåliga kunskaper om företagets möjligheter att systematiskt utnyttja denna typ av marknadskommunikation. Min analys tyder på att den beteendevetenskapliga och den företagsekonomiska word-of-mouth-forskningen anlägger olika perspektiv som inte möter varandra. Den beteendevetenskapliga word-of-mouth-forskningen har tydligare satt fokus på själva företeelsen informell marknadskommunikation, men perspektivet har inte varit speciellt företagsorienterat. Den företagsekonomiska word-of-mouth-forskningen har i sin tur varit betydligt tydligare fokuserad på möjligheterna att använda informell marknadskommunikation, men däremot har man inte fäst speciellt mycket uppmärksamhet vid själva företeelsen informell marknadskommunikation. Min kontribution till den vetenskapliga diskussionen om företagens möjligheter att systematisera utnyttjandet av informell marknadskommunikation består i att överbrygga denna dualism inom word-of-mouth-forskningen genom att anlägga ett företagsperspektiv på den sociala dynamiken för informell marknadskommunikation. Denna ansats har sin teoretiska förankring hos de s.k. moderna men bortglömda pionjärerna, med vilka jag avser Johan Arndt, Donald Cox och Ernest Dichters kontribution till den företagsorienterade word-of-mouth-forskningen redan i slutet av 1960-talet. Efter det har deras synpunkter och insikter varken förts vidare eller vidareutvecklats, vilket jag betraktar som ett bakslag för den företagsorienterade word-of-mouth-forskningen. Föreliggande studie har bidragit till word-of-mouth-forskningen på tre olika sätt: genom 1) bidrag baserat på litteraturanalys, 2) bidrag baserat på empirianalys och 3) bidrag baserat på begreppsligande av informell marknadskommunikation. Min litteraturanalys framställer word-of-mouth-forskningens uppkomst och utveckling i ny dager. Min empirianalys har genererat empiriska begrepp, dels för att beskriva informell marknadskommunikation som företeelse, dels för att beskriva företagens förfarande för att systematisera utnyttjandet av sådan marknadskommunikation. Den begreppsliga kontributionen accentueras i informell marknadskommunikation som ett samlingsbegrepp för olika typer av interkonsumentkommunikation.