828 resultados para Language-based security


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article presents some of the results of a qualitative research project about the influences of the pedagogic strategies used by a mediator (graduate student in applied linguistics) in the supervision process of a Teletandem partner (undergraduate student in languages) on her pedagogical practice. It was done within the project Teletandem Brazil: foreign language for all. Based on the reflective teaching paradigm and collaborative language learning, with special emphasis on tandem learning, we analyzed the contributions of the collaborative relationship established between the graduate student and the student-teacher in her first teaching experience. The results bring about implications for the field of language teacher education in a perspective of education within practice, evidencing the experience of collaborative learning in teletandem as an opportunity for reflective teacher education of pre-service teachers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless LAN technology, despite the numerous advantages it has over competing technologies, has not seen widespread deployment. A primary reason for markets not adopting this technology is its failure to provide adequate security. Data that is sent over wireless links can be compromised with utmost ease. In this project, we propose a distributed agent based intrusion detection and response system for wireless LANs that can detect unauthorized wireless elements like access points, wireless clients that are in promiscuous mode etc. The system reacts to intrusions by either notifying the concerned personnel, in case of rogue access points and promiscuous nodes, or by blocking unauthorized users from accessing the network resources.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless LANs are growing rapidly and security has always been a concern. We have implemented a hybrid system, which will not only detect active attacks like identity theft causing denial of service attacks, but will also detect the usage of access point discovery tools. The system responds in real time by sending out an alert to the network administrator.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The security of the two party Diffie-Hellman key exchange protocol is currently based on the discrete logarithm problem (DLP). However, it can also be built upon the elliptic curve discrete logarithm problem (ECDLP). Most proposed secure group communication schemes employ the DLP-based Diffie-Hellman protocol. This paper proposes the ECDLP-based Diffie-Hellman protocols for secure group communication and evaluates their performance on wireless ad hoc networks. The proposed schemes are compared at the same security level with DLP-based group protocols under different channel conditions. Our experiments and analysis show that the Tree-based Group Elliptic Curve Diffie-Hellman (TGECDH) protocol is the best in overall performance for secure group communication among the four schemes discussed in the paper. Low communication overhead, relatively low computation load and short packets are the main reasons for the good performance of the TGECDH protocol.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Observability measures the support of computer systems to accurately capture, analyze, and present (collectively observe) the internal information about the systems. Observability frameworks play important roles for program understanding, troubleshooting, performance diagnosis, and optimizations. However, traditional solutions are either expensive or coarse-grained, consequently compromising their utility in accommodating today’s increasingly complex software systems. New solutions are emerging for VM-based languages due to the full control language VMs have over program executions. Existing such solutions, nonetheless, still lack flexibility, have high overhead, or provide limited context information for developing powerful dynamic analyses. In this thesis, we present a VM-based infrastructure, called marker tracing framework (MTF), to address the deficiencies in the existing solutions for providing better observability for VM-based languages. MTF serves as a solid foundation for implementing fine-grained low-overhead program instrumentation. Specifically, MTF allows analysis clients to: 1) define custom events with rich semantics ; 2) specify precisely the program locations where the events should trigger; and 3) adaptively enable/disable the instrumentation at runtime. In addition, MTF-based analysis clients are more powerful by having access to all information available to the VM. To demonstrate the utility and effectiveness of MTF, we present two analysis clients: 1) dynamic typestate analysis with adaptive online program analysis (AOPA); and 2) selective probabilistic calling context analysis (SPCC). In addition, we evaluate the runtime performance of MTF and the typestate client with the DaCapo benchmarks. The results show that: 1) MTF has acceptable runtime overhead when tracing moderate numbers of marker events; and 2) AOPA is highly effective in reducing the event frequency for the dynamic typestate analysis; and 3) language VMs can be exploited to offer greater observability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The use of drama with language instruction has long been considered a legitimate practice. A recent survey of the literature shows that English Language Learners (ELLs) may have even more to benefit from the use of drama in the classroom. Studies showed an increase in language and problem-solving ability, as well as student self-efficacy that was transferrable across activities. Following an analysis of the literature is a proposed curriculum based on the findings of the researchers cited. This unit is centered on dramatic activities that make use of all four language domains and includes the examination of plays in writing, on the stage, and as a playwright. In the end, students will be asked to combine all of their skills to put on a completely student-created production. An analysis of the factors surrounding the implementation of such a unit follows the unit itself.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

“It is my contention at this point that when race relations on campuses get better, it is in spite of, not because of, the proliferation of jargon-based rhetoric about diversity.”

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Access control is a key component of security in any computer system. In the last two decades, the research on Role Basead Access Control Models was intense. One of the most important components of a Role Based Model is the Role-Permission Relationship. In this paper, the technique of systematic mapping is used to identify, extract and analyze many approaches applied to establish the Role-Permission Relationship. The main goal of this mapping is pointing directions of significant research in the area of Role Based Access Control Models.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information flows are formed naturally or formally induced in organizational settings, passing from the strategic level to operational level, reflecting, and impacting in the processes that make up the organization, including the decision-making process and therefore the action strategies of organization. The management of organizational environments based on information requires careful attention to various kinds of languages used for communication between sectors and employees of the organization, whose goal is to share, disseminate and socialize the information produced in this environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The ALRED construction is a lightweight strategy for constructing message authentication algorithms from an underlying iterated block cipher. Even though this construction's original analyses show that it is secure against some attacks, the absence of formal security proofs in a strong security model still brings uncertainty on its robustness. In this paper, aiming to give a better understanding of the security level provided by different authentication algorithms based on this design strategy, we formally analyze two ALRED variants-the MARVIN message authentication code and the LETTERSOUP authenticated-encryption scheme,-bounding their security as a function of the attacker's resources and of the underlying cipher's characteristics.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we perform a thorough analysis of a spectral phase-encoded time spreading optical code division multiple access (SPECTS-OCDMA) system based on Walsh-Hadamard (W-H) codes aiming not only at finding optimal code-set selections but also at assessing its loss of security due to crosstalk. We prove that an inadequate choice of codes can make the crosstalk between active users to become large enough so as to cause the data from the user of interest to be detected by other user. The proposed algorithm for code optimization targets code sets that produce minimum bit error rate (BER) among all codes for a specific number of simultaneous users. This methodology allows us to find optimal code sets for any OCDMA system, regardless the code family used and the number of active users. This procedure is crucial for circumventing the unexpected lack of security due to crosstalk. We also show that a SPECTS-OCDMA system based on W-H 32(64) fundamentally limits the number of simultaneous users to 4(8) with no security violation due to crosstalk. More importantly, we prove that only a small fraction of the available code sets is actually immune to crosstalk with acceptable BER (<10(-9)) i.e., approximately 0.5% for W-H 32 with four simultaneous users, and about 1 x 10(-4)% for W-H 64 with eight simultaneous users.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recently, many chaos-based communication systems have been proposed. They can present the many interesting properties of spread spectrum modulations. Besides, they can represent a low-cost increase in security. However, their major drawback is to have a Bit Error Rate (BER) general performance worse than their conventional counterparts. In this paper, we review some innovative techniques that can be used to make chaos-based communication systems attain lower levels of BER in non-ideal environments. In particular, we succinctly describe techniques to counter the effects of finite bandwidth, additive noise and delay in the communication channel. Although much research is necessary for chaos-based communication competing with conventional techniques, the presented results are auspicious. (C) 2011 Elsevier B. V. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study investigated whether there are differences in the Speech-Evoked Auditory Brainstem Response among children with Typical Development (TD), (Central) Auditory Processing Disorder (C) APD, and Language Impairment (LI). The speech-evoked Auditory Brainstem Response was tested in 57 children (ages 6-12). The children were placed into three groups: TD (n = 18), (C)APD (n = 18) and LI (n = 21). Speech-evoked ABR were elicited using the five-formant syllable/da/. Three dimensions were defined for analysis, including timing, harmonics, and pitch. A comparative analysis of the responses between the typical development children and children with (C)APD and LI revealed abnormal encoding of the speech acoustic features that are characteristics of speech perception in children with (C)APD and LI, although the two groups differed in their abnormalities. While the children with (C)APD might had a greater difficulty distinguishing stimuli based on timing cues, the children with LI had the additional difficulty of distinguishing speech harmonics, which are important to the identification of speech sounds. These data suggested that an inefficient representation of crucial components of speech sounds may contribute to the difficulties with language processing found in children with LI. Furthermore, these findings may indicate that the neural processes mediated by the auditory brainstem differ among children with auditory processing and speech-language disorders. (C) 2012 Elsevier B.V. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Three-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang proposed a simple 3PAKE protocol based on elliptic curve cryptography, which is claimed to be secure and to provide superior efficiency when compared with similar-purpose solutions. In this paper, however, we show that the solution is vulnerable to key-compromise impersonation and offline password guessing attacks from system insiders or outsiders, which indicates that the empirical approach used to evaluate the scheme's security is flawed. These results highlight the need of employing provable security approaches when designing and analyzing PAKE schemes. Copyright (c) 2011 John Wiley & Sons, Ltd.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

ABSTRACT: Purpose: To describe a research-based global curriculum in speech-language pathology and audiology that is part of a funded cross-linguistic consortium among 2 U.S. and 2 Brazilian universities. Method: The need for a global curriculum in speechlanguage pathology and audiology is outlined, and different funding sources are identified to support development of a global curriculum. The U.S. Department of Education’s Fund for the Improvement of Post-Secondary Education (FIPSE), in conjunction with the Brazilian Ministry of Education (Fundacao Coordenacao de Aperfeicoamento de Pessoal de Nivel Superior; CAPES), funded the establishment of a shared research curriculum project, “Consortium for Promoting Cross-Linguistic Understanding of Communication Disabilities in Children” for East Tennessee State University and the University of Northern Iowa and 2 Brazilian universities (Universidade Federal de Santa Maria and Universidade de São Paulo-Baurú). Results: The goals and objectives of the research-based global curriculum are summarized, and a description of an Internet-based course, “Different Languages, One World,” is provided Conclusion: Partnerships such as the FIPSE–CAPES consortium provide a foundation for training future generations of globally and research-prepared practitioners in speechlanguage pathology and audiology.