958 resultados para iaas, anonymous cloud, p2p, anonymizing network, gossip


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Iowa Influenza Surveillance Network (IISN) was established in 2004, though surveillance has been conducted at the Iowa Department of Public Health. Schools and long-term care facilities report data weekly into a Web-based reporting system. Schools report the number of students absent due to illness and the total enrolled. Long-term care facilities report cases of influenza and vaccination status of each case. Both passively report outbreaks of illness, including influenza, to IDPH.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Iowa Influenza Surveillance Network (IISN) was established in 2004, though surveillance has been conducted at the Iowa Department of Public Health. Schools and long-term care facilities report data weekly into a Web-based reporting system. Schools report the number of students absent due to illness and the total enrolled. Long-term care facilities report cases of influenza and vaccination status of each case. Both passively report outbreaks of illness, including influenza, to IDPH.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Iowa Influenza Surveillance Network (IISN) was established in 2004, though surveillance has been conducted at the Iowa Department of Public Health. Schools and long-term care facilities report data weekly into a Web-based reporting system. Schools report the number of students absent due to illness and the total enrolled. Long-term care facilities report cases of influenza and vaccination status of each case. Both passively report outbreaks of illness, including influenza, to IDPH.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Iowa Influenza Surveillance Network (IISN) was established in 2004, though surveillance has been conducted at the Iowa Department of Public Health. Schools and long-term care facilities report data weekly into a Web-based reporting system. Schools report the number of students absent due to illness and the total enrolled. Long-term care facilities report cases of influenza and vaccination status of each case. Both passively report outbreaks of illness, including influenza, to IDPH.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Iowa Influenza Surveillance Network (IISN) was established in 2004, though surveillance has been conducted at the Iowa Department of Public Health. Schools and long-term care facilities report data weekly into a Web-based reporting system. Schools report the number of students absent due to illness and the total enrolled. Long-term care facilities report cases of influenza and vaccination status of each case. Both passively report outbreaks of illness, including influenza, to IDPH.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Iowa Influenza Surveillance Network (IISN) was established in 2004, though surveillance has been conducted at the Iowa Department of Public Health. Schools and long-term care facilities report data weekly into a Web-based reporting system. Schools report the number of students absent due to illness and the total enrolled. Long-term care facilities report cases of influenza and vaccination status of each case. Both passively report outbreaks of illness, including influenza, to IDPH.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A simple way to quickly optimize microsatellites in nonmodel organisms is to reuse loci available in closely related taxa; however, this approach can be limited by the stochastic and low cross-amplification success experienced in some groups (e.g. amphibians). An efficient alternative is to develop loci from transcriptome sequences. Transcriptomic microsatellites have been found to vary in their levels of cross-species amplification and variability, but this has to date never been tested in amphibians. Here, we compare the patterns of cross-amplification and levels of polymorphism of 18 published anonymous microsatellites isolated from genomic DNA vs. 17 loci derived from a transcriptome, across nine species of tree frogs (Hyla arborea and Hyla cinerea group). We established a clear negative relationship between divergence time and amplification success, which was much steeper for anonymous than transcriptomic markers, with half-lives (time at which 50% of the markers still amplify) of 1.1 and 37 My, respectively. Transcriptomic markers are significantly less polymorphic than anonymous loci, but remain variable across diverged taxa. We conclude that the exploitation of amphibian transcriptomes for developing microsatellites seems an optimal approach for multispecies surveys (e.g. analyses of hybrid zones, comparative linkage mapping), whereas anonymous microsatellites may be more informative for fine-scale analyses of intraspecific variation. Moreover, our results confirm the pattern that microsatellite cross-amplification is greatly variable among amphibians and should be assessed independently within target lineages. Finally, we provide a bank of microsatellites for Palaearctic tree frogs (so far only available for H. arborea), which will be useful for conservation and evolutionary studies in this radiation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ca(2+) import into the lumen of the trans-Golgi network (TGN) by the secretory pathway calcium ATPase1 (SPCA1) is required for the sorting of secretory cargo. How is Ca(2+) retained in the lumen of the Golgi, and what is its role in cargo sorting? We show here that a soluble, lumenal Golgi resident protein, Cab45, is required for SPCA1-dependent Ca(2+) import into the TGN; it binds secretory cargo in a Ca(2+)-dependent reaction and is required for its sorting at the TGN.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Here we report that the kinesin-5 motor Klp61F, which is known for its role in bipolar spindle formation in mitosis, is required for protein transport from the Golgi complex to the cell surface in Drosophila S2 cells. Disrupting the function of its mammalian orthologue, Eg5, in HeLa cells inhibited secretion of a protein called pancreatic adenocarcinoma up-regulated factor (PAUF) but, surprisingly, not the trafficking of vesicular stomatitis virus G protein (VSV-G) to the cell surface. We have previously reported that PAUF is transported from the trans-Golgi network (TGN) to the cell surface in specific carriers called CARTS that exclude VSV-G. Inhibition of Eg5 function did not affect the biogenesis of CARTS; however, their migration was delayed and they accumulated near the Golgi complex. Altogether, our findings reveal a surprising new role of Eg5 in nonmitotic cells in the facilitation of the transport of specific carriers, CARTS, from the TGN to the cell surface.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer-reviewed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices. On that regard, an issue that is becoming veryimportant in the recent times is being able to provide a security baseline to such applications. This paper analyzes the currentstate of security in JXME and proposes a simple security mechanism in order to protect JXME applications against a broad range of vulnerabilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority of new emerging wireless applications. One promising way to alleviate the spectrum shortage problem is adopting a spectrum sharing paradigm in which frequency bands are used opportunistically. Cognitive radio is the key technology to enable this shift of paradigm.Cognitive radio networks are self-organized systems in which devices cooperate to use those spectrum ranges that are not occupied by licensed users. They carry out spectrum sensing in order to detect vacant channels that can be used for communication. Even though spectrum sensing is an active area of research, an important issue remains unsolved: the secure authentication of sensing reports. Not providing security enables the input of false data in the system thus empowering false results. This paper presents a distributed protocol based on wireless physical layer security, symmetric cryptography and one-way functions that allows determining a final sensing decision from multiple sources in a quick and secure way, as well as it preserves users¿ privacy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the wake of the success of Peer-to-Peer (P2P) networking, security has arisen as one of its main concerns, becoming a key issue when evaluating a P2P system. Unfortunately, some systems' design focus targeted issues such as scalabil-ity or overall performance, but not security. As a result, security mechanisms must be provided at a later stage, after the system has already been designed and partially (or even fully) implemented, which may prove a cumbersome proposition. This work exposes how a security layer was provided under such circumstances for a specic Java based P2P framework: JXTA-Overlay.