968 resultados para anonimato rete privacy deep web onion routing cookie


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Business processes and application functionality are becoming available as internal web services inside enterprise boundaries as well as becoming available as commercial web services from enterprise solution vendors and web services marketplaces. Typically there are multiple web service providers offering services capable of fulfilling a particular functionality, although with different Quality of Service (QoS). Dynamic creation of business processes requires composing an appropriate set of web services that best suit the current need. This paper presents a novel combinatorial auction approach to QoS aware dynamic web services composition. Such an approach would enable not only stand-alone web services but also composite web services to be a part of a business process. The combinatorial auction leads to an integer programming formulation for the web services composition problem. An important feature of the model is the incorporation of service level agreements. We describe a software tool QWESC for QoS-aware web services composition based on the proposed approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research addresses efficient use of the available energy in resource constrained mobile sensor nodes to prevent early depletion of the battery and maximize the packet delivery rate. This research contributes two energy-aware enhancement strategies to improve the network lifetime and delivery probability for energy constrained applications in the delay-tolerant networking environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a solution based on message passing bipartite networks, for deep packet inspection, which addresses both speed and memory issues, which are limiting factors in current solutions. We report on a preliminary implementation and propose a parallel architecture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Biological systems present remarkable adaptation, reliability, and robustness in various environments, even under hostility. Most of them are controlled by the individuals in a distributed and self-organized way. These biological mechanisms provide useful resources for designing the dynamical and adaptive routing schemes of wireless mobile sensor networks, in which the individual nodes should ideally operate without central control. This paper investigates crucial biologically inspired mechanisms and the associated techniques for resolving routing in wireless sensor networks, including Ant-based and genetic approaches. Furthermore, the principal contributions of this paper are as follows. We present a mathematical theory of the biological computations in the context of sensor networks; we further present a generalized routing framework in sensor networks by diffusing different modes of biological computations using Ant-based and genetic approaches; finally, an overview of several emerging research directions are addressed within the new biologically computational framework.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider a dense, ad hoc wireless network confined to a small region, such that direct communication is possible between any pair of nodes. The physical communication model is that a receiver decodes the signal from a single transmitter, while treating all other signals as interference. Data packets are sent between source-destination pairs by multihop relaying. We assume that nodes self-organise into a multihop network such that all hops are of length d meters, where d is a design parameter. There is a contention based multiaccess scheme, and it is assumed that every node always has data to send, either originated from it or a transit packet (saturation assumption). In this scenario, we seek to maximize a measure of the transport capacity of the network (measured in bit-meters per second) over power controls (in a fading environment) and over the hop distance d, subject to an average power constraint. We first argue that for a dense collection of nodes confined to a small region, single cell operation is efficient for single user decoding transceivers. Then, operating the dense ad hoc network (described above) as a single cell, we study the optimal hop length and power control that maximizes the transport capacity for a given network power constraint. More specifically, for a fading channel and for a fixed transmission time strategy (akin to the IEEE 802.11 TXOP), we find that there exists an intrinsic aggregate bit rate (Theta(opt) bits per second, depending on the contention mechanism and the channel fading characteristics) carried by the network, when operating at the optimal hop length and power control. The optimal transport capacity is of the form d(opt)((P) over bar (t)) x Theta(opt) with d(opt) scaling as (P) over bar (1/eta)(t), where (P) over bar (t) is the available time average transmit power and eta is the path loss exponent. Under certain conditions on the fading distribution, we then provide a simple characterisation of the optimal operating point.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dance is a potential asset for peacebuilding, creating opportunities for nonverbal, embodied learning, exploring identity, and relationships. Peace scholars consider identity and relationships to the ‘other’ as key components in transforming conflict. Focusing on a case study in Mindanao, the Philippines, this paper explores the potential of dance in a peacebuilding context through embodied identity and relationships. In Mindanao, deep-seated cultural prejudices contribute to ongoing conflict entwined with identity. The permeable membrane (Cohen, Gutiérrez & Walker, 2011) is the organising framework describing the constant interaction between artists, facilitators, participants, and communities. It expands peace scholar John Paul Lederach’s concept of the moral imagination, requiring the capacity to envisage one’s self within a web of relationships. In this paper multiple methods of qualitative research including personal interviews are used to further the discussion regarding dance’s potential to diversify the nonverbal tools available for peacebuilding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This workshop is jointly organized by EFMI Working Groups Security, Safety and Ethics and Personal Portable Devices in cooperation with IMIA Working Group "Security in Health Information Systems". In contemporary healthcare and personal health management the collection and use of personal health information takes place in different contexts and jurisdictions. Global use of health data is also expanding. The approach taken by different experts, health service providers, data subjects and secondary users in understanding privacy and the privacy expectations others may have is strongly context dependent. To make eHealth, global healthcare, mHealth and personal health management successful and to enable fair secondary use of personal health data, it is necessary to find a practical and functional balance between privacy expectations of stakeholder groups. The workshop will highlight these privacy concerns by presenting different cases and approaches. Workshop participants will analyse stakeholder privacy expectations that take place in different real-life contexts such as portable health devices and personal health records, and develop a mechanism to balance them in such a way that global protection of health data and its meaningful use is realized simultaneously. Based on the results of the workshop, initial requirements for a global healthcare information certification framework will be developed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The lipid A and lipopolysaccharide (LPS) binding and neutralizing activities of a synthetic, polycationic, amphiphilic peptide were studied. The branched peptide, designed as a functional analog of polymyxin B, has a six residue hydrophobic sequence, bearing at its N-terminus a penultimate lysine residue whose alpha- and epsilon-amino groups are coupled to two terminal lysine residues. In fluorescence spectroscopic studies designed to examine relative affinities of binding to the toxin, neutralization of surface charge and fluidization of the acyl domains, the peptide was active, closely resembling the effects of polymyxin B and its nonapeptide derivative; however, the synthetic peptide does not induce phase transitions in LPS aggregates as do polymyxin B and polymyxin B nonapeptide. The peptide was also comparable with polymyxin B in its ability to inhibit LPS-mediated IL-l and IL-6 release from human peripheral blood mononuclear cells. The synthetic compound is devoid of antibacterial activities and did not induce conductance fluxes in LPS-containing asymmetric planar membranes. These results strengthen the premise that basicity and amphiphilicity are necessary and sufficient physical properties that ascribe endotoxin binding and neutralizing activities, and further suggest that antibacterial/membrane perturbant and LPS neutralizing activities are dissociable, which may be of value in designing LPS-sequestering agents of low toxicity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Home education is on the rise in Australia. However, unlike parents who choose mainstream schooling, these parents often lack the support of a wider community to help them on their educational and parenting journey. This support is especially lacking as many people in the wider community find the choice to home education confronting. As such, these parents may feel isolated and alienated in the general population as their choice to home educate is questioned at best, and ridiculed at worst. These parents often find sanctuary online in homeschool groups on Facebook. This chapter explores the ways that Facebook Groups are used by marginalized and disenfranchised families who home educate to meet with others who are likeminded and aligned with their beliefs and philosophies. It is through these groups that parents, in relation to schooling it is especially mothers, are able to ask for advice, to vent, to explore options and find connections that may be lacking in the wider community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A theoretical solution for the gravitational stresses in single span deep beams using Fourier series has been given. Numerical results for different span to depth ratios are given and these have been compared with the photoelastic results given by Saad and Hendry [1], and the finite difference results of Chow et al. [2,3].

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RECONNECT is a Network-on-Chip using a honeycomb topology. In this paper we focus on properties of general rules applicable to a variety of routing algorithms for the NoC which take into account the missing links of the honeycomb topology when compared to a mesh. We also extend the original proposal [5] and show a method to insert and extract data to and from the network. Access Routers at the boundary of the execution fabric establish connections to multiple periphery modules and create a torus to decrease the node distances. Our approach is scalable and ensures homogeneity among the compute elements in the NoC. We synthesized and evaluated the proposed enhancement in terms of power dissipation and area. Our results indicate that the impact of necessary alterations to the fabric is negligible and effects the data transfer between the fabric and the periphery only marginally.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Inter-enterprise collaboration has become essential for the success of enterprises. As competition increasingly takes place between supply chains and networks of enterprises, there is a strategic business need to participate in multiple collaborations simultaneously. Collaborations based on an open market of autonomous actors set special requirements for computing facilities supporting the setup and management of these business networks of enterprises. Currently, the safeguards against privacy threats in collaborations crossing organizational borders are both insufficient and incompatible to the open market. A broader understanding is needed of the architecture of defense structures, and privacy threats must be detected not only on the level of a private person or enterprise, but on the community and ecosystem levels as well. Control measures must be automated wherever possible in order to keep the cost and effort of collaboration management reasonable. This article contributes to the understanding of the modern inter-enterprise collaboration environment and privacy threats in it, and presents the automated control measures required to ensure that actors in inter-enterprise collaborations behave correctly to preserve privacy.