972 resultados para store names


Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present findings from a field trial of CAM (Cooperative Artefact Memory) -- a mobile-tagging based messaging system -- in a design studio environment. CAM allows individuals to collaboratively store relevant information onto their physical design artefacts, such as sketches, collages, story-boards, and physical mock-ups in the form of messages, annotations and external web links. We studied the use of CAM in three student design projects. We observed that CAM facilitated new ways of collaborating in joint design projects. The serendipitous and asynchronous nature of CAM facilitated expressions of design aesthetics, allowed designers to have playful interactions, supported exploration of new design ideas, and supported designers' reflective practices. In general, our results show how CAM transformed mundane design artefacts into "living" artefacts that made the creative and playful side of cooperative design visible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Physical design objects such as sketches, drawings, collages, storyboards and models play an important role in supporting communication and coordination in design studios. CAM (Cooperative Artefact Memory) is a mobile-tagging based messaging system that allows designers to collaboratively store relevant information onto their design objects in the form of messages, annotations and external web links. We studied the use of CAM in a Product Design studio over three weeks, involving three different design teams. In this paper, we briefly describe CAM and show how it serves as 'object memory'.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we report the results of a field trial of a Ubicomp system called CAM that is aimed at supporting and enhancing collaboration in a design studio environment. CAM uses a mobile-tagging application which allows designers to collaboratively store relevant information onto their physical design objects in the form of messages, annotations and external web links. The purpose of our field trial was to explore the role of augmented objects in supporting and enhancing creative work. Our results show that CAM was used not only to support participants' mutual awareness and coordination but also to facilitate designers in appropriating their augmented design objects to be explorative, extendable and playful, supporting creative aspects of design work. In general, our results show how CAM transformed static design objects into 'remarkable' objects that made the creative and playful side of cooperative design visible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In January 2013, Apple Inc obtained United States trademarks for the design and layout of its retail stores. While innovative brand protection strategies of this kind are not without precedent in the United States, traders in Australia have seemingly not adopted them. This article considers the prospects of an applicant seeking to register a similar trade mark in Australia and the protection such a registration would likely provide.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Safety of repair, maintenance, alteration, and addition (RMAA) works have long been neglected because RMAAworks are often minute and only last for a short period of time. With rising importance of the RMAA sector in many developed societies, safety of RMAA works has begun to draw attention. Many RMAA contracting companies are small- and medium-sized enterprises (SMEs) that do not have comprehensive safety management systems. Existing safety legislation and regulations for new construction sites are not fully applicable to RMAAworks. Instead of relying on explicit and well-established safety systems, tacit safety knowledge plays an extremely important role in RMAA projects. To improve safety of RMAAworks, safety knowledge should be better managed. However, safety knowledge is difficult to capture in RMAA works. This study aims to examine safety management practices of RMAA contracting companies to see how safety knowledge of RMAA projects is managed. Findings show that RMAA contracting companies undertaking large-scale RMAA projects have more initiatives of safety management. Safety management of small-scale RMAA works relies heavily on the motivation of site supervisors and self-regulation of workers. Better tacit knowledge management improves safety performance. To enhance safety capability of RMAA contracting companies, a knowledge sharing culture should be cultivated. The government should provide assistance to SMEs to implement proper safety management practices in small-sized projects. Potentials of applying computer software technology in RMAA projects to capture, store, and retrieve safety information should be explored. Employees should be motivated to share safety knowledge by giving proper recognition to those who are willing to share.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we provide the results of a field study of a Ubicomp system called CAM (Cooperative Artefact Memory) in a Product Design studio. CAM is a mobile-tagging based messaging system that allows designers to store relevant information onto their design artefacts in the form of messages, annotations and external web links. From our field study results, we observe that the use of CAM adds another shared ‘space’ onto these design artefacts – that are in their natural settings boundary objects themselves. In the paper, we provide several examples from the field illustrating how CAM helps in the design process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two lecture notes describe recent developments of evolutionary multi objective optimization (MO) techniques in detail and their advantages and drawbacks compared to traditional deterministic optimisers. The role of Game Strategies (GS), such as Pareto, Nash or Stackelberg games as companions or pre-conditioners of Multi objective Optimizers is presented and discussed on simple mathematical functions in Part I , as well as their implementations on simple aeronautical model optimisation problems on the computer using a friendly design framework in Part II. Real life (robust) design applications dealing with UAVs systems or Civil Aircraft and using the EAs and Game Strategies combined material of Part I & Part II are solved and discussed in Part III providing the designer new compromised solutions useful to digital aircraft design and manufacturing. Many details related to Lectures notes Part I, Part II and Part III can be found by the reader in [68].

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restored from the watermarked relation) and/or non-blind (requiring original relation to detect the watermark in watermarked relation). This model has several disadvantages over reversible and blind watermarking (requiring only watermarked relation and secret key from which the watermark is detected and original relation is restored) including inability to identify rightful owner in case of successful secondary watermarking, inability to revert the relation to original data set (required in high precision industries) and requirement to store unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store original database at a secure secondary storage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

SINCE THE INVENTION OF recording technologies like the phonograph in the late 1800s, Indigenous music has been performed and recorded across Australia for a wide range of audiences. In the early twentieth century, for instance, music was recorded by anthropologists keen to capture the sounds of a culture that was believed to be in rapid decline (Thomas). Individual performers were not considered important in these recordings; their music was produced for scientific posterity rather than popular pleasure. And even though Aboriginal participation in local music festivals, touring vaudeville shows, and community gatherings was well documented throughout the twentieth century, it was not until the 1950s that Indigenous “pop stars” began to sell records for mass consumption(Dunbar-Hall and Gibson). Yet, with the persistence of recording artists like Jimmy Little over the past sixty years, Indigenous musicians have steadily gained prominence in Australia’s mainstream. This has been particularly true of the past twenty years, especially since the Sydney Olympics, where promotional strategies have brought about a new popular pride in musical achievements, based upon a celebrated history of diverse sounds and voices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Internet Corporation for Assigned Names and Numbers (ICANN) is an institution besieged. It has endeavored to be democratic but its attempts to do so have been disastrous. The typical explanation for this is that the problem is with ICANN: it fails to meet its democratic obligations. My view is that the problem is with our understanding of "democracy." Democracy is an empty concept that fails to describe few, if any, of our genuine political commitments. In the real world, the failings inherent in "democracy" have been papered over by some unusual characteristics of the physical political process. However, in online trans-national institutions like ICANN, democracy is exposed as a poor substitute for a number of other conceptions of our political commitments. This Article seeks to articulate these political commitments and to explain why democracy and ICANN are such a poor mix. It begins by charting the rise of ICANN and its attempts to be democratic. It then explains why democracy is an empty shell of a concept. It then explores some features of democracy and ICANN, explaining why the online world exposes limitations in implications of democracy such as the nature of the demos, the idea of constituencies, direct democracy, voting, and the like. It concludes that ICANN's example demonstrates that democracy is in fact anything but a coherent general theory of political action. We need to consider, then, whether we should continue to berate ICANN for its undemocratic actions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Epithelial-mesenchymal transition (EMT) is a process implicated in cancer metastasis that involves the conversion of epithelial cells to a more mesenchymal and invasive cell phenotype. In breast cancer cells EMT is associated with altered store-operated calcium influx and changes in calcium signalling mediated by activation of cell surface purinergic receptors. In this study, we investigated whether MDA-MB-468 breast cancer cells induced to undergo EMT exhibit changes in mRNA levels of calcium channels, pumps and exchangers located on intracellular calcium storing organelles, including the Golgi, mitochondria and endoplasmic reticulum (ER). Methods Epidermal growth factor (EGF) was used to induce EMT in MDA-MB-468 breast cancer cells. Serum-deprived cells were treated with EGF (50 ng/mL) for 12 h and gene expression was assessed using quantitative RT-PCR. Results and conclusions These data reveal no significant alterations in mRNA levels of the Golgi calcium pump secretory pathway calcium ATPases (SPCA1 and SPCA2), or the mitochondrial calcium uniporter (MCU) or Na+/Ca2+ exchanger (NCLX). However, EGF-induced EMT was associated with significant alterations in mRNA levels of specific ER calcium channels and pumps, including (sarco)-endoplasmic reticulum calcium ATPases (SERCAs), and inositol 1,4,5-trisphosphate receptor (IP3R) and ryanodine receptor (RYR) calcium channel isoforms. The most prominent change in gene expression between the epithelial and mesenchymal-like states was RYR2, which was enriched 45-fold in EGF-treated MDA-MB-468 cells. These findings indicate that EGF-induced EMT in breast cancer cells may be associated with major alterations in ER calcium homeostasis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For transmedia to be acknowledged as worthy of investment by the business world, and even by those considering a career in development of transmedia creative products, there first needs to be established a business case for the concept. This chapter seeks to inform transmedia advocates about the concept of value and the ROI of transmedia more generally. While it is by no means a template or formula for measurement of value, it is a reminder to transmedia professionals and theorists, that intangible benefits are neither valueless nor unquantifiable. The chapter is divided into four sections: 1. Definitions of transmedia – concept and scope of transmedia, expressed in a manner that is intelligible for a business audience. 2. Value and cost – discussion of the terms from an economic perspective. 3. Audience interaction and collaborative content development – discussion of how feedback and engagement systems of transmedia have facilitated rich experiences which offer more than mere content and audience reach outputs. 4. ROI metrics for transmedia – measurable criteria for articulation of value to business investors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ken Talbot was one of Australian mining’s most successful entrepreneurs and rose to the top of his industry to become one of Australia’s wealthiest men. Although the nation’s resources industry is synonymous with global names such as Xstrata, BHP Billiton and Rio Tinto, Ken was an individual who made a big impact on the development and growth of the sector. This case study examines Ken’s achievements, his transition from employee to entrepreneur, and the qualities that enabled him to succeed at such a high level. In particular, it focuses on his Jellinbah and Coppabella mining developments that directly led to the creation of Macarthur Coal and the Talbot Group. By the time of his premature death in an African plane crash in 2010, Ken had amassed a fortune estimated at almost $1 billion and was aged just 59. The last publically available Talbot Group annual report for calendar year 2009 showed that the investment portfolio of the group returned 113 per cent that year. Even throughout the global financial crisis the portfolio made a positive return on investment of no less than 10 per cent. Ken’s sense of mateship and his tremendous people skills were keys to his success in the mining industry and the wider community. In addition to excelling in business, he is also remembered for his philanthropy and leaving 30 per cent of his estate to charity through the Talbot Family Foundation.