999 resultados para interaction protocol


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper demonstrates that in order to understand and design for interactions in complex work environments, a variety of representational artefacts must be developed and employed. A study was undertaken to explore the design of better interaction technologies to support patient record keeping in a dental surgery. The domain chosen is a challenging real context that exhibits problems that could potentially be solved by ubiquitous computing and multi-modal interaction technologies. Both transient and durable representations were used to develop design understandings. We describe the representations, the kinds of insights developed from the representations and the way that the multiple representations interact and carry forward in the design process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Among the many new opportunities that digital technologies are enabling are an increased capacity for viewers to interact not only with the program content, but with an increasingly wide array of other digital applications. Within this context this project has developed a new interaction device (incorporating gestural platform technology) and user interfaces to facilitate interactive access to digital media in a lounge room setting. This paper provides an overview of an interdisciplinary design process applied by Australasian CRC for Interaction Design (ACID) researchers—in order to develop the device and present in detail its unique features.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The definition and operationalisation of interactional competence in speaking tests that entail co-construction of discourse is an area of language testing requiring further research. This article explores the reactions of four trained raters to paired candidates who oriented to asymmetric patterns of interaction in a discussion task. Through an analysis of candidate discourse combined with rater notes, stimulated verbal recalls, rater discussions and scores awarded for interactional effectiveness, the article examines the extent to which raters compensate or penalise candidates for their role in co-constructing asymmetric interactional patterns. The article argues that key features of the interaction are perceived by the raters as mutual achievements, and it further suggests that the awarding of shared scores for interactional competence is one way of acknowledging the inherently co-constructed nature of interaction in a paired speaking test.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The epilogue pulls together the conceptual and methodological significance of the papers in the special issue exploring childhood and social interaction in everyday life in Sweden, Norway, United States and Australia. In considering the special issue, four domains of childhood are identified and discussed: childhood is a social construct where children learn how to enter into and participate in their social organizations, competency is best understood when communicative practices are examined in situ, children’s talk and interaction show situated culture in action, and childhood consists of shared social orders between children and adults. Emerging analytic interests are proposed, including investigating how children understand locations and place. Finally, the epilogue highlights the core focus of this special issue, which is showing children’s own methods for making sense of their everyday contexts using the interactional and cultural resources they have to hand.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses the ongoing design and use of a digital community noticeboard situated in a suburban hub. The design intention is to engage residents, collect and display local information and communications, and spark discussion. A key contribution is an understanding of Situated Display navigation that aids retrieval from a long-term collection created by and for suburban community, and engaging qualities of this collection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper explores inter-agency working and examines the implications of inter-agency operations for delivering multi-domain service outcomes. Cross-agency collaborative approaches to service delivery are suggested to provide the vehicle for achieving integrated service and policy goals. However, it is argued these need to be crafted ‘fit’ for purpose’ and may not be the requisite approach for all joint purposes. Moreover, some commentators suggest that the optimism about these partnership arrangements and cross-agency actions to resolve complex multi-dimensional problems may be misplaced and propose that further research into the actual rather than desired consequences of these arrangements may find that, at times, partnership working creates negative effects. While collaboration and partnerships are often framed as the way to achieve real breakthroughs in service delivery across agencies, there remain key challenges to interagency working. As more and insistent calls for agencies and other community actors to work together in resolving complex social problems are heeded, the implications of working across organizational boundaries need to be further investigated. This paper investigates cases of inter-agency programmes to understand the dimensions and limitations of inter-agency working. The paper concludes by offering a framework for better inter-agency working that has applicability across all sectors.