983 resultados para Helber, Tim
Resumo:
It is received wisdom that Tim Berners-Lee invented the Web; but there is a lot more technology and historical context that plays a part.
Resumo:
El objetivo de este trabajo de grado es describir una disputa política por el significado del concepto de explotación en el marco de la redacción del “Protocolo para prevenir, reprimir y sancionar la trata de personas, especialmente mujeres y niños”, en el cual se define aquello que se entiende por trata de personas. La construcción de este concepto excluye e invisibiliza otros tipos de explotación comunes en el sistema de producción capitalista contemporánea que pertenecen al universo de violencia objetiva sistémica a través del énfasis en la explotación sexual que hace parte de la violencia subjetiva.
Resumo:
A run through various aspects of Distributed Denial of Service attacks
Resumo:
Describes different approaches to authentication for wireless networks, and the evolution of eduroam
Resumo:
Notes about the Arbor WISR 2011 report, which we'll run through in the lecture.
Resumo:
A brief discussion of some of the impacts of introducing IPv6
Resumo:
Some examples of Netflow tools in use in ECS
Resumo:
Notes on revision topics for TJC's network and campus security lectures.
Resumo:
Augmented Reality: Past, present and future. An Educational Video on Digital Futures Awareness: Augmented Reality. Designed to be informative and entertaining.
Resumo:
El trabajo presenta una imagen de la disciplina de las Relaciones Internacionales en Colombia a través del estudio de la práctica de la escritura científica en cuatro centros de investigación.
Resumo:
Wednesday 26th March 2014 Speaker(s): Dr Trung Dong Huynh Organiser: Dr Tim Chown Time: 26/03/2014 11:00-11:50 Location: B32/3077 File size: 349Mb Abstract Understanding the dynamics of a crowdsourcing application and controlling the quality of the data it generates is challenging, partly due to the lack of tools to do so. Provenance is a domain-independent means to represent what happened in an application, which can help verify data and infer their quality. It can also reveal the processes that led to a data item and the interactions of contributors with it. Provenance patterns can manifest real-world phenomena such as a significant interest in a piece of content, providing an indication of its quality, or even issues such as undesirable interactions within a group of contributors. In this talk, I will present an application-independent methodology for analysing provenance graphs, constructed from provenance records, to learn about such patterns and to use them for assessing some key properties of crowdsourced data, such as their quality, in an automated manner. I will also talk about CollabMap (www.collabmap.org), an online crowdsourcing mapping application, and show how we applied the approach above to the trust classification of data generated by the crowd, achieving an accuracy over 95%.
Resumo:
Wednesday 19th March 2014 Speaker(s): Kirk Martinez, Dr Jonathon S Hare and Dr Enrico Costanza Organiser: Dr Tim Chown Time: 19/03/2014 11:00-11:50 Location: B32/3077 File size: 676 Mb Abstract The new WAIS seminar series features classic seminars, research discussions, tutorial-style presentations, and research debates. This seminar takes the form of a research discussion which will focus on the Internet of Things (IoT) research being undertaken in WAIS and other research groups in ECS. IoT is a significant emerging research area, with funding for research available from many channels including new H2020 programmes and the TSB. We have seen examples of IoT devices being built in WAIS and other ECS groups, e.g. in sensor networking, energy monitoring via Zigbee devices, and of course Erica the Rhino (a Big Thing!). The goal of the session is to briefly present such examples of existing Things in our lab with the intent of seeding discussion on open research questions, and therefore future work we could do towards new Things being deployed for experimentation in Building 32 or its environs. The session will discuss what 'things' we have, how they work, what new 'things' might we want to create and deploy, what components we might need to enable this, and how we might interact with these objects.
Resumo:
Wednesday 12th March 2014 Speaker(s): Dr Tim Chown Organiser: Time: 12/03/2014 11:00-11:50 Location: B32/3077 File size: 642 Mb Abstract The WAIS seminar series is designed to be a blend of classic seminars, research discussions, debates and tutorials. The Domain Name System (DNS) is a critical part of the Internet infrastructure. In this talk we begin by explaining the basic model of operation of the DNS, including how domain names are delegated and how a DNS resolver performs a DNS lookup. We then take a tour of DNS-related topics, including caching, poisoning, governance, the increasing misuse of the DNS in DDoS attacks, and the expansion of the DNS namespace to new top level domains and internationalised domain names. We also present the latest work in the IETF on DNS privacy. The talk will be pitched such that no detailed technical knowledge is required. We hope that attendees will gain some familiarity with how the DNS works, some key issues surrounding DNS operation, and how the DNS might touch on various areas of research within WAIS.
Resumo:
Speaker(s): Prof. David Evans Organiser: Dr Tim Chown Time: 22/05/2014 10:45-11:45 Location: B53/4025 Abstract Secure multi-party computation enables two (or more) participants to reliably compute a function that depends on both of their inputs, without revealing those inputs to the other party or needing to trust any other party. It could enable two people who meet at a conference to learn who they known in common without revealing any of their other contacts, or allow a pharmaceutical company to determine the correct dosage of a medication based on a patient’s genome without compromising the privacy of the patient. A general solution to this problem has been known since Yao's pioneering work in the 1980s, but only recently has it become conceivable to use this approach in practice. Over the past few years, my research group has worked towards making secure computation practical for real applications. In this talk, I'll provide a brief introduction to secure computation protocols, describe the techniques we have developed to design scalable and efficient protocols, and share some recent results on improving efficiency and how secure computing applications are developed.