822 resultados para Computer and network security
Resumo:
This paper describes a framework architecture for the automated re-purposing and efficient delivery of multimedia content stored in CMSs. It deploys specifically designed templates as well as adaptation rules based on a hierarchy of profiles to accommodate user, device and network requirements invoked as constraints in the adaptation process. The user profile provides information in accordance with the opt-in principle, while the device and network profiles provide the operational constraints such as for example resolution and bandwidth limitations. The profiles hierarchy ensures that the adaptation privileges the users' preferences. As part of the adaptation, we took into account the support for users' special needs, and therefore adopted a template-based approach that could simplify the adaptation process integrating accessibility-by-design in the template.
Resumo:
Traditionally, applications and tools supporting collaborative computing have been designed only with personal computers in mind and support a limited range of computing and network platforms. These applications are therefore not well equipped to deal with network heterogeneity and, in particular, do not cope well with dynamic network topologies. Progress in this area must be made if we are to fulfil the needs of users and support the diversity, mobility, and portability that are likely to characterise group work in future. This paper describes a groupware platform called Coco that is designed to support collaboration in a heterogeneous network environment. The work demonstrates that progress in the p development of a generic supporting groupware is achievable, even in the context of heterogeneous and dynamic networks. The work demonstrates the progress made in the development of an underlying communications infrastructure, building on peer-to-peer concept and topologies to improve scalability and robustness.
Resumo:
Password Authentication Protocol (PAP) is widely used in the Wireless Fidelity Point-to-Point Protocol to authenticate an identity and password for a peer. This paper uses a new knowledge-based framework to verify the PAP protocol and a fixed version. Flaws are found in both the original and the fixed versions. A new enhanced protocol is provided and the security of it is proved The whole process is implemented in a mechanical reasoning platform, Isabelle. It only takes a few seconds to find flaws in the original and the fixed protocol and to verify that the enhanced version of the PAP protocol is secure.
Resumo:
It is now possible to directly link the human nervous system to a computer and thence onto the Internet. From an electronic and mental viewpoint this means that the Internet becomes an extension of the human nervous system (and vice versa). Such a connection on a regular or mass basis will have far reaching effects for society. In this article the authors discuss their own practical implant self-experimentation, especially insofar as it relates to extending the human nervous system. Trials involving an intercontinental link up are described. As well as technical aspects of the work, social, moral and ethical issues, as perceived by the authors, are weighed against potential technical gains. The authors also look at technical limitations inherent in the co-evolution of Internet implanted individuals as well as the future distribution of intelligence between human and machine.
Resumo:
An approach to the automatic generation of efficient Field Programmable Gate Arrays (FPGAs) circuits for the Regular Expression-based (RegEx) Pattern Matching problems is presented. Using a novel design strategy, as proposed, circuits that are highly area-and-time-efficient can be automatically generated for arbitrary sets of regular expressions. This makes the technique suitable for applications that must handle very large sets of patterns at high speed, such as in the network security and intrusion detection application domains. We have combined several existing techniques to optimise our solution for such domains and proposed the way the whole process of dynamic generation of FPGAs for RegEX pattern matching could be automated efficiently.
Resumo:
The performance benefit when using Grid systems comes from different strategies, among which partitioning the applications into parallel tasks is the most important. However, in most cases the enhancement coming from partitioning is smoothed by the effect of the synchronization overhead, mainly due to the high variability of completion times of the different tasks, which, in turn, is due to the large heterogeneity of Grid nodes. For this reason, it is important to have models which capture the performance of such systems. In this paper we describe a queueing-network-based performance model able to accurately analyze Grid architectures, and we use the model to study a real parallel application executed in a Grid. The proposed model improves the classical modelling techniques and highlights the impact of resource heterogeneity and network latency on the application performance.
Resumo:
As Virtual Reality pushes the boundaries of the human computer interface new ways of interaction are emerging. One such technology is the integration of haptic interfaces (force-feedback devices) into virtual environments. This modality offers an improved sense of immersion to that achieved when relying only on audio and visual modalities. The paper introduces some of the technical obstacles such as latency and network traffic that need to be overcome for maintaining a high degree of immersion during haptic tasks. The paper describes the advantages of integrating haptic feedback into systems, and presents some of the technical issues inherent in a networked haptic virtual environment. A generic control interface has been developed to seamlessly mesh with existing networked VR development libraries.
Resumo:
Computer vision applications generally split their problem into multiple simpler tasks. Likewise research often combines algorithms into systems for evaluation purposes. Frameworks for modular vision provide interfaces and mechanisms for algorithm combination and network transparency. However, these don’t provide interfaces efficiently utilising the slow memory in modern PCs. We investigate quantitatively how system performance varies with different patterns of memory usage by the framework for an example vision system.
Resumo:
Livestock farming is one of the most important sectors in agriculture both economically and socially. In the developing world, livestock is crucial to generating livelihoods and food security for some one billion of the world's poorest people. The demand for livestock products is growing as diets change and the world population increases, mainly in the developing world. Climate change only adds to the challenge facing the world's most disadvantaged people. It impacts on livestock production systems and in turn livestock farming impacts on climate change. This paper reviews the complex interaction between livestock production and climate change and proposes strategies that could be used to help sustain livestock as a key feature of rural livelihoods in the developing world.
Resumo:
The work reported in this paper is motivated towards handling single node failures for parallel summation algorithms in computer clusters. An agent based approach is proposed in which a task to be executed is decomposed to sub-tasks and mapped onto agents that traverse computing nodes. The agents intercommunicate across computing nodes to share information during the event of a predicted node failure. Two single node failure scenarios are considered. The Message Passing Interface is employed for implementing the proposed approach. Quantitative results obtained from experiments reveal that the agent based approach can handle failures more efficiently than traditional failure handling approaches.
Resumo:
Presents a method for model based bilateral control of master-slave arm with time delay between master and slave arms, where the system supports cooperative action between manual and automatic modes. The method realises efficiencies in master-slave arm control with the simplicities of a computer and the flexibility of a skilled human operator.
The British state and the Irish rebellion of 1916: an intelligence failure or an failure of response
Resumo:
The teleological narrative that has dominated the handling of intelligence by the British state in the events that led up to the 1916 Irish Rebellion in Dublin has been characterised as a cocktail of incompetence and mendacity. Using new and existing archive material this article argues that both the cabinet in London and key members of the Irish Executive in Dublin were supplied with accurate and timely intelligence by the Admiralty's signals intelligence unit, the Royal Irish Constabulary and the Dublin Metropolitan Police with respect to this event. Far from being a failure of intelligence here is evidence to show that there occurred a failure of response on behalf of key decision-makers. The warnings that were given by intelligence organisations were filtered through the existing policy preferences and assumptions. As a result of these factors accurate evaluations and sound judgement were not exercised by key officials, such as Sir Matthew Nathan, in Dublin Castle.
Resumo:
Objective To assess the efficacy of an intervention designed to improve the mother-infant relationship and security of infant attachment in a South African peri-urban settlement with marked adverse socioeconomic circumstances. Design Randomised controlled trial. Setting Khayelitsha, a peri-urban settlement in South Africa. Participants 449 pregnant women. Interventions The intervention was delivered from late pregnancy and for six months postpartum. Women were visited in their homes by previously untrained lay community workers who provided support and guidance in parenting. The purpose of the intervention was to promote sensitive and responsive parenting and secure infant attachment to the mother. Women in the control group received no therapeutic input from the research team. Main outcome measures Primary outcomes: quality of mother-infant interactions at six and 12 months postpartum; infant attachment security at 18 months. Secondary outcome: maternal depression at six and 12 months. Results The intervention was associated with significant benefit to the mother-infant relationship. At both six and 12 months, compared with control mothers, mothers in the intervention group were significantly more sensitive (6 months: mean difference=0.77 (SD 0.37), t=2.10, P<0.05, d=0.24; 12 months: mean difference=0.42 (0.18), t=−2.04 , P<0.05, d=0.26) and less intrusive (6 months: mean difference=0.68 (0.36), t=2.28, P<0.05, d=0.26; 12 months: mean difference=−1.76 (0.86), t=2.28 , P<0.05, d=0.24) in their interactions with their infants. The intervention was also associated with a higher rate of secure infant attachments at 18 months (116/156 (74%) v 102/162 (63%); Wald=4.74, odds ratio=1.70, P<0.05). Although the prevalence of maternal depressive disorder was not significantly reduced, the intervention had a benefit in terms of maternal depressed mood at six months (z=2.05, P=0.04) on the Edinburgh postnatal depression scale). Conclusions The intervention, delivered by local lay women, had a significant positive impact on the quality of the mother-infant relationship and on security of infant attachment, factors known to predict favourable child development. If these effects persist, and if they are replicated, this intervention holds considerable promise for use in the developing world.
Resumo:
A collection of pieces on British intelligence including sources (Christopher R. Moran), methodology (Richard Aldrich), media (Philip H.J. Davies), historiography (Calder Walton and Christopher Andrew), South Africa and the Wilson government (Philip Murphy), Pakistan and ISI (Rob Johnson), and UK security policy in the face of radical Islam (Anthony Glees).