928 resultados para ad rem argument


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a reliable and ubiquitous group key distribution scheme that is suitable for ad hoc networks. The scheme has self-initialisation and self-securing features. The former feature allows a cooperation of an arbitrary number of nodes to initialise the system, and it also allows node admission to be performed in a decentralised fashion. The latter feature allows a group member to determine the group key remotely while maintaining the system security. We also consider a decentralised solution of establishing secure point-to-point communication. The solution allows a new node to establish a secure channel with every existing node if it has pre-existing secure channels with a threshold number of the existing nodes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article uses the example of the mediatisation of Season 2 of the Australian documentary-cum-reality TV series Go Back to Where You Came From, and the associated #GoBackSBS Twitter feed, to investigate how public opinions are shaped, reshaped and expressed in new hybrid media ecologies. We explore how social media tools like Twitter can support the efforts of a TV production; provide spaces through which the public can engage ad hoc with a public event, be informed, shape their opinions and share them with others; and thus open up new possibilities for public discourse to occur. We suggest that new online public sphericules are emerging that provide spaces within which publics can engage with the cultural social and political realities with which they are confronted. In this way, we highlight the importance of mundane communication to the shaping and constant reshaping of public opinion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background To determine whether changes in appetite and energy intake (EI) can be detected and play a role in the effectiveness of interventions, it is necessary to identify their variability under normal conditions. We assessed the reproducibility of subjective appetite ratings and ad libitum test meal EI after a standardised pre-load in overweight and obese males. Methods Fifteen overweight and obese males (BMI 30.3 ± 4.9 kg/m2, aged 34.9 ± 10.6 years) completed two identical test days, 7 days apart. Participants were provided with a standardised fixed breakfast (1676 kJ) and 5 h later an ad libitum pasta lunch. An electronic appetite rating system was used to assess subjective ratings before and after the fixed breakfast, and periodically during the postprandial period. EI was assessed at the ad libitum lunch meal. Sample size estimates for paired design studies were calculated. Results Appetite ratings demonstrated a consistent oscillating pattern between test days, and were more reproducible for mean postprandial than fasting ratings. The correlation between ad libitum EI on the two test days was r = 0.78 (P < 0.01). Using a paired design and a power of 0.8, a minimum of 12 participants would be needed to detect a 10 mm change in 5 h postprandial mean ratings and 17 to detect a 500 kJ difference in ad libitum EI. Conclusion Intra-individual variability of appetite and ad libitum test meal EI in overweight and obese males is comparable to previous reports in normal weight adults. Sample size requirements for studies vary depending on the parameter of interest and sensitivity needed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent arguments on the ethics of stem cell research have taken a novel approach to the question of the moral status of the embryo. One influential argument focuses on a property that the embryo is said to posses—namely, the property of being an entity with a rational nature or, less controversially, an entity that has the potential to acquire a rational nature—and claims that this property is also possessed by a somatic cell. Since nobody seriously thinks that we have a duty to preserve the countless such cells we wash off our body every day in the shower, the argument is intended as a reductio ad absurdum of the claim that the embryo should be afforded the same moral status as a fully developed human being. This article argues that this argument is not successful and that it consequently plays into the hands of those who oppose embryonic stem cell research. It is therefore better to abandon this argument and focus instead on the different argument that potentiality, as such, is not a sufficient ground for the creation of moral obligations towards the embryo.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a new approach for creating and implementing an ad-hoc underwater acoustic sensor network based on connecting a small processor to the serial port of a commercial CDMA acoustic modem. The processor acts as a "node controller" providing the networking layer that the modems lack. The ad-hoc networking protocol is based on a modified dynamic source routing (DSR) approach and can be configured for maximising information throughput or minimising energy expenditure. The system was developed in simulation and then evaluated during field trials using a 10 node deployment. Experimental results show reliable multi-hop networking under a variety of network configurations, with the added ability to determine internode ranges to within 1.5 m for localisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tourist individual differences, such as levels of knowledge, are increasingly recognized as influencing how people respond to information. However, little research has examined the role of consumer knowledge on responses to different components of cruise advertising information. Using input from an industry panel combined with insight and measures from the literature, the results of this field experiment show that consumer knowledge interacts with two aspects of advertising—testimonial expertise and advertising copy—to influence purchase intentions towards a cruise. The results offer important implications for researchers and tourism managers regarding how consumer knowledge influences which types of advertising information are most persuasive to consumers. Results also indicate that expert consumers have more favorable attitudes than novice consumers towards cruise advertising.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Government and tobacco companies recently faced off in Australia's High Court over the legality of plain packaging for cigarettes. Stephen Stern and Matthew Rimmer give their contrasting views on the arguments and implications

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This project was a step forward in introducing suitable cooperative diversity transmission techniques for vehicle to vehicle communications. The contributions are intended to aid in the successful implementation of future vehicular safety and autonomous controlling systems. Several protocols were introduced for vehicles to communicate effectively without losing connectivity. This study investigated novel protocols in terms of diversity-multiplexing trade-off and outage for a range of potential vehicular safety and infotainment applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Driving can be a lonely activity. While there has been a lot of research and technical inventions concerning car-to-car communication and passenger entertainment, there is still little work concerning connecting drivers. Whereas tourism is very much a social activity, drive tourists and road trippers have few options to communicate with fellow travelers. Our study is placed at the intersection of tourism and driving. It aims to enhance the trip experience during driving through social interaction. This paper explores how a mobile application that allows instant messaging between travelers sharing similar context can establish a temporary, ad hoc community and enhance the road trip experience. A prototype was developed and evaluated in various user and field studies. The study’s outcomes are relevant for the design of future mobile tourist guides that benefit from community design, social encounters and recommendations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the use of Twitter has become more commonplace throughout many nations, its role in political discussion has also increased. This has been evident in contexts ranging from general political discussion through local, state, and national elections (such as in the 2010 Australian elections) to protests and other activist mobilisation (for example in the current uprisings in Tunisia, Egypt, and Yemen, as well as in the controversy around Wikileaks). Research into the use of Twitter in such political contexts has also developed rapidly, aided by substantial advancements in quantitative and qualitative methodologies for capturing, processing, analysing, and visualising Twitter updates by large groups of users. Recent work has especially highlighted the role of the Twitter hashtag – a short keyword, prefixed with the hash symbol ‘#’ – as a means of coordinating a distributed discussion between more or less large groups of users, who do not need to be connected through existing ‘follower’ networks. Twitter hashtags – such as ‘#ausvotes’ for the 2010 Australian elections, ‘#londonriots’ for the coordination of information and political debates around the recent unrest in London, or ‘#wikileaks’ for the controversy around Wikileaks thus aid the formation of ad hoc publics around specific themes and topics. They emerge from within the Twitter community – sometimes as a result of pre-planning or quickly reached consensus, sometimes through protracted debate about what the appropriate hashtag for an event or topic should be (which may also lead to the formation of competing publics using different hashtags). Drawing on innovative methodologies for the study of Twitter content, this paper examines the use of hashtags in political debate in the context of a number of major case studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The thesis is connected with death, memory and ancestor commemoration during the Merovingian Period, the Viking Age and the beginning of the Crusade Period (AD 550-1150) in Finland. During this time, cremation was the dominant burial rite. It was not until the end of the Viking Age that inhumation became more common but both cremations and inhumations are performed even at the same sites throughout the time. Three different burial types 1) cremation cemeteries below level ground, 2) inhumation burials and 3) water burials are discussed in five articles. I consider these burial forms from three different viewpoints; collectivity-individuality, visibility-invisibility and cremation-inhumation. The thesis also discusses the topics of memory, memorialisation and monument re-use, which have been neglected subjects in Finnish archaeology until now. Both cremation cemeteries below level ground and inhumation burials have been re-used during their time of usage, and on most occasions are situated in a landscape that is overlaid by other monuments as well. The main questions of the thesis are: What kinds of ritual behaviour can we detect in the burials during the period (AD 550-1150)? How did people perceive the moraine hills that functioned as burial places? What kind of re-use can be detected in the Iron Age cemeteries? Why have ancient sites and artefacts been re-used? This thesis shows that it is possible to claim that both artefact and site re-use is a much more widespread phenomenon than has previously been thought in Finnish archaeology. It is also a conscious and deliberate behaviour that can be related to an ancestor cult and commemoration of the dead. The funerary rituals during this time period show great variation and complex, both regionally and nationally. Not only have the dead been buried using elaborate rituals, they have also been mourned and commemorated in intricate ways that proves that death was not an end product, but the start of something new.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless technologies are continuously evolving. Second generation cellular networks have gained worldwide acceptance. Wireless LANs are commonly deployed in corporations or university campuses, and their diffusion in public hotspots is growing. Third generation cellular systems are yet to affirm everywhere; still, there is an impressive amount of research ongoing for deploying beyond 3G systems. These new wireless technologies combine the characteristics of WLAN based and cellular networks to provide increased bandwidth. The common direction where all the efforts in wireless technologies are headed is towards an IP-based communication. Telephony services have been the killer application for cellular systems; their evolution to packet-switched networks is a natural path. Effective IP telephony signaling protocols, such as the Session Initiation Protocol (SIP) and the H 323 protocol are needed to establish IP-based telephony sessions. However, IP telephony is just one service example of IP-based communication. IP-based multimedia sessions are expected to become popular and offer a wider range of communication capabilities than pure telephony. In order to conjoin the advances of the future wireless technologies with the potential of IP-based multimedia communication, the next step would be to obtain ubiquitous communication capabilities. According to this vision, people must be able to communicate also when no support from an infrastructured network is available, needed or desired. In order to achieve ubiquitous communication, end devices must integrate all the capabilities necessary for IP-based distributed and decentralized communication. Such capabilities are currently missing. For example, it is not possible to utilize native IP telephony signaling protocols in a totally decentralized way. This dissertation presents a solution for deploying the SIP protocol in a decentralized fashion without support of infrastructure servers. The proposed solution is mainly designed to fit the needs of decentralized mobile environments, and can be applied to small scale ad-hoc networks or also bigger networks with hundreds of nodes. A framework allowing discovery of SIP users in ad-hoc networks and the establishment of SIP sessions among them, in a fully distributed and secure way, is described and evaluated. Security support allows ad-hoc users to authenticate the sender of a message, and to verify the integrity of a received message. The distributed session management framework has been extended in order to achieve interoperability with the Internet, and the native Internet applications. With limited extensions to the SIP protocol, we have designed and experimentally validated a SIP gateway allowing SIP signaling between ad-hoc networks with private addressing space and native SIP applications in the Internet. The design is completed by an application level relay that permits instant messaging sessions to be established in heterogeneous environments. The resulting framework constitutes a flexible and effective approach for the pervasive deployment of real time applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Researchers and practitioners have been preoccupied with identifying ways for larger organizations to acquire and manage knowledge, however far less research attention has been directed towards these same pursuits in small and medium-sized enterprises (SMEs). This paper examines how SMEs engage in knowledge identification and acquisition; in particular how they identify knowledge needs and source this knowledge to enhance their business. The research studied six SMEs in Australia and Denmark. Contrary to prevailing assumptions, the findings suggest that SMEs engage in identification and sourcing of critical knowledge, albeit often with less than formal processes. These organizations relied on business plans to direct knowledge activities and ensure balance between long-range planning and flexibility. The results address a lack of empirical evidence about SME approaches to knowledge identification and acquisition, and demonstrate that although SMEs may approach such activities in an informal way, they are nonetheless deliberate and strategic in their knowledge activities.