235 resultados para Stateless Roaming Credentials


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Synthetic Geology Information System (SGIS) is an important constituent part of the theory of Engineering Geomechanics Mate-Synthetic (EGMS), and is the information system more suited for the collection, storage, management, analysis and processing to the information coming from engineering geology,' geological engineering and geotechnical engineering. Its contents involve various works and methods of the investigation, design, and construction in different stages of the geological engineering. Engineering geological and three-dimensional modeling and visualization is the fundamental part of the SGIS, and is a theory, method and technique by which, adopting the computer graphics and image processing techniques, the data derived from engineering geological survey and the calculated results obtained from the geomechanical numerical simulation and analysis are converted to the graphics and images displayed on the computer screen and can be processed interactively. In this paper, the significance and realizing approaches of the three-dimensional modeling and visualization for the complex geological mass in the engineering geology are discussed and the methods of taking advantage of the interpolation and fitting for the scattered and field-surveyed data to simulate the geological layers, such as the topography and earth surface, the groundwater table and the stratum boundary, are researched into. At the mean time, in mind the characteristics of the structure of the basic data for three-dimensional modeling, its visual management can be resolved into the engineering surveyed database management module, plot parameter management module and data output module and the requirement for basic data management can be fulfilled. In the paper, the establishment and development of the three-dimensional geological information system are probed tentatively, and an instance of three-dimensional visual Engineering Distribution Information System (EDIS), theConstruction Management Information System for an airport, in which the functions, such as the real-time browse among the three-dimensional virtual-reality landscapes of the airport construction from start to finish, the information query to the airport facility and the building in the housing district and the recording and playback of the animation sets for the browse and the takeoff and landing of the planes, is developed by applying the component-mode three-dimensional virtual-reality geological information system (GIS) software development kits (SDK), so the three-dimensional visual management platform is provided for the airport construction. Moreover, in the gaper, integrated with the three-dimensional topography visualization and its application in the Sichuan-Tibet Highways, the method of the digital elevation model (DEM) data collection from the topographic maps is described, and the three-dimensional visualization and the roaming about the terrain along the highway are achieved through computer language programming. Understanding to the important role played by the varied and unique topographical condition in the gestation and germination of the highly-dense, frequently-arising and severely-endangered geological hazards can be deepened.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Erskine, Toni, 'Qualifying Cosmopolitanism? Solidarity, Criticism, and Michael Walzer's 'View from the Cave'', International Politics (2007) 44(1) pp.125-149 RAE2008

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book was donated to BU by its author Stephanie Angelini, 2005 College of Communication alumna. All e-book versions of this work display best on the widest margin settings and the largest font setting. You may download the free Kindle reading software here: http://is.gd/yg9P5k ***PLEASE NOTE:*** The author has permitted us to make the book available to the BU community only. To download the files, please click on the appropriate lock icon and log in with your BU credentials. Thank you.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div can determine whether one of them was generated by the forger. Surprisingly, this is possible even after the adversary has inconspicuously learned (exposed) some-or even all-the secrets in the system. In this case, it might be impossible to tell which signature is generated by the legitimate signer and which by the forger. But at least the fact of the tampering will be made evident. We define several variants of tamper-evidence, differing in their power to detect tampering. In all of these, we assume an equally powerful adversary: she adaptively controls all the inputs to the legitimate signer (i.e., all messages to be signed and their timing), and observes all his outputs; she can also adaptively expose all the secrets at arbitrary times. We provide tamper-evident schemes for all the variants and prove their optimality. Achieving the strongest tamper evidence turns out to be provably expensive. However, we define a somewhat weaker, but still practical, variant: α-synchronous tamper-evidence (α-te) and provide α-te schemes with logarithmic cost. Our α-te schemes use a combinatorial construction of α-separating sets, which might be of independent interest. We stress that our mechanisms are purely cryptographic: the tamper-detection algorithm Div is stateless and takes no inputs except the two signatures (in particular, it keeps no logs), we use no infrastructure (or other ways to conceal additional secrets), and we use no hardware properties (except those implied by the standard cryptographic assumptions, such as random number generators). Our constructions are based on arbitrary ordinary signature schemes and do not require random oracles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

MPLS (Multi-Protocol Label Switching) has recently emerged to facilitate the engineering of network traffic. This can be achieved by directing packet flows over paths that satisfy multiple requirements. MPLS has been regarded as an enhancement to traditional IP routing, which has the following problems: (1) all packets with the same IP destination address have to follow the same path through the network; and (2) paths have often been computed based on static and single link metrics. These problems may cause traffic concentration, and thus degradation in quality of service. In this paper, we investigate by simulations a range of routing solutions and examine the tradeoff between scalability and performance. At one extreme, IP packet routing using dynamic link metrics provides a stateless solution but may lead to routing oscillations. At the other extreme, we consider a recently proposed Profile-based Routing (PBR), which uses knowledge of potential ingress-egress pairs as well as the traffic profile among them. Minimum Interference Routing (MIRA) is another recently proposed MPLS-based scheme, which only exploits knowledge of potential ingress-egress pairs but not their traffic profile. MIRA and the more conventional widest-shortest path (WSP) routing represent alternative MPLS-based approaches on the spectrum of routing solutions. We compare these solutions in terms of utility, bandwidth acceptance ratio as well as their scalability (routing state and computational overhead) and load balancing capability. While the simplest of the per-flow algorithms we consider, the performance of WSP is close to dynamic per-packet routing, without the potential instabilities of dynamic routing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The lives of Thomas and Anna Haslam were dedicated to the attainment of women's equality. They were feminists before the word was coined. In an era when respectable women were not supposed to know of the existence of prostitutes, Anna became empowered to do the unthinkable, not only to speak in public but to discuss openly matters sexual and to attack the double standard of sexuality which was enshrined in the official treatment of prostitutes. Their life-long commitment to the cause of women's suffrage never faltered, despite the repeated discouragement of the fate of bills defeated in the House of Commons. The Haslams represented an Ireland which did not survive them. While they were dedicated to the union with Westminster, they worked happily with those who applied themselves to its destruction. Although in many ways they exemplified the virtues of their Quaker backgrounds, they did not subscribe to any organised religion. Despite living in straitened circumstances, they were part of an urban intellectual elite and participated in the social and cultural life of Dublin for over fifty years. It is tempting to speculate how the Haslams would have fared in post independence Ireland. Hanna Sheehy Skeffington who had impeccable nationalist credentials, was effectively marginalised. It is likely that they would have protested against discriminatory legislation in their usual law abiding manner but, in a country which quickly developed an overwhelmingly Roman Catholic ethos, would they have had a voice or a constituency? Ironically, Thomas's teaching on chastity would have found favour with the hierarchy; his message was disseminated in a simple and more pious manner in numerous Catholic Truth Society pamphlets. The Protestant minority never sought to subvert the institutions of the state, was careful not to criticise and kept its collective head down. Dáil Éireann was not bombarded with petitions for the restoration of divorce facilities or the unbanning of birth control. Those who sought such amenities obtained them quietly 'in another jurisdiction.' Fifty years were to pass before the condom wielding 'comely maidens' erupted on to the front pages of the Sunday papers. They were, one imagines, the spiritual descendants of the militant rather than the constitutional suffrage movement. "Once and for all we need to commit ourselves to the concept that women's rights are not factional or sectional privileges, bestowed on the few at the whim of the many. They are human rights. In a society in which the rights and potential of women are constrained no man can be truly free." These words spoken by Mary Robinson as President of Ireland are an echo of the principles to which the Haslams dedicated their lives and are, perhaps, a tribute to their efforts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Post-apartheid South Africa is characterized by centralized, neo-liberal policymaking that perpetuates, and in some cases exaggerates, socio-economic inequalities inherited from the apartheid era. The African National Congress (ANC) leadership’s alignment with powerful international and domestic market actors produces tensions within the Tripartite Alliance and between government and civil society. Consequently, several characteristics of ‘predatory liberalism’ are evident in contemporary South Africa: neo-liberal restructuring of the economy is combined with an increasing willingness by government to assert its authority, to marginalize and delegitimize those critical of its abandonment of inclusive governance. A new form of oligarch power, combining entrenched economic interests with those of a new ‘black bourgeoisie’ promoted by narrowly implemented Black Economic Empowerment policies, diminishes prospects for broad-based socio-economic transformation. Because the new policy environment is failing to resolve tensions between global market demands for increasing market liberalization and domestic popular demands for poverty-alleviation and socio-economic transformation, the ANC leadership is forced increasingly to confront ‘ultra-leftists’ who are challenging its credentials as defender of the National Democratic Revolution which was the cornerstone in the anti-apartheid struggle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we show how a self-tracking antenna array constructed using gimel /4 monopoles can be constructed, which is capable of receiving with gain over an entire 360 degrees azimuthal cut. It is also shown how the self-tacking receive unit can be used in conjunction with a self-phased transmitter so that self-steered spatially selective receive and transmit functions ran be formed simultaneously. The resulting array is capable of maintaining spatially selective receive and transmit functions to a roaming target without prior knowledge of its physical location.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – This paper aims to examine the growing incidence of judicialisation of politics in Nigeria’s democratisation experience against the backdrop of questionable judicial accountability. Design/methodology/approach – The article draws on legal and political theory as well as comparative law perspectives. Findings – The judiciary faces a daunting task in deepening democracy and (re) instituting the rule of law. The formidable challenges derive in part from structural problems within the judiciary, deficient accountability credentials and the complexities of a troubled transition. Practical implications – Effective judicial mediation of political transition requires a transformed and accountable judiciary. Originality/value – The article calls attention to the need for judicial accountability as a cardinal and integral part of political transitions. Keywords Democracy, Politics, Law, Nigeria, Africa Paper type Viewpoint

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An ongoing paradigm shift is giving birth to a more multidimensional understanding of the relationship between nationalism, sovereignty, self determination and democratic governance. A common element across the various versions of the new paradigm is the dispersal of democratic governance across multiple and overlapping jurisdictions. Governmental processes are no longer seen as discrete, centralised and homogenous as in the old nation-state model, but as asymmetrical, multilayered and multicultural, with devolution into multiple jurisdictions. These changes have hardly affected the two main conceptual frameworks that dominate the study of nationalism, Modernism and Ethnosymbolism. As a result, they risk becoming irrelevant to the new forms of national self determination, asymmetrical governance and shared sovereignty. Modernism and Ethnosymbolism insist that nationalism seeks to equate the nation with a sovereign state, while in reality the overwhelming majority of nations are stateless and unable to build nation states, as they often inhabit territories shared with other nations. The paradigm shift occurs precisely with the realisation that nation state sovereignty is no longer a feasible solution to the demands of stateless nations. Ethnosymbolism is in a much better position to adapt to the paradigm shift provided it abandons the claim that the nation state is the best shell for the nation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article evaluates the anti-corruption campaign instituted in Nigeria following on the post-authoritarian transition in the country, with specific focus on political corruption. The anti-corruption campaign is being prosecuted within a context where law is as critical a factor as politics. This article examines whether the judiciary, in view of its accountability deficit, can offer legitimacy to the campaign. How has its questionable credentials impacted on its involvement in the campaign to sanitise public life? What has been the impact of the judicial role on the rule of law? These are some of the important questions this article seeks to answer. The inquiry in this article demonstrates how the guardian institution of the rule of law faces an uphill task in the performance of that role in a post-authoritarian context.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A service is a remote computational facility which is made available for general use by means of a wide-area network. Several types of service arise in practice: stateless services, shared state services and services with states which are customised for individual users. A service-based orchestration is a multi-threaded computation which invokes remote services in order to deliver results back to a user (publication). In this paper a means of specifying services and reasoning about the correctness of orchestrations over stateless services is presented. As web services are potentially unreliable the termination of even finite orchestrations cannot be guaranteed. For this reason a partial-correctness powerdomain approach is proposed to capture the semantics of recursive orchestrations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we consider the problem of tracking similar objects. We show how a mean field approach can be used to deal with interacting targets and we compare it with Markov Chain Monte Carlo (MCMC). Two mean field implementations are presented. The first one is more general and uses particle filtering. We discuss some simplifications of the base algorithm that reduce the computation time. The second one is based on suitable Gaussian approximations of probability densities that lead to a set of self-consistent equations for the means and covariances. These equations give the Kalman solution if there is no interaction. Experiments have been performed on two kinds of sequences. The first kind is composed of a single long sequence of twenty roaming ants and was previously analysed using MCMC. In this case, our mean field algorithms obtain substantially better results. The second kind corresponds to selected sequences of a football match in which the interaction avoids tracker coalescence in situations where independent trackers fail.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article explores how stateless nationalist parties in the ‘Celtic periphery’ of Scotland and Northern Ireland have used Europe to advance their territorial projects. Despite vastly different historical, political and social contexts, the Scottish National Party and Northern Ireland's Social Democratic and Labour Party have both advanced a pro-European, social democratic discourse that emphasises the importance of Europe as a framework for constitutional reform and shared sovereignty. However, in recent years the parties have diverged on Europe. While the SDLP has continued its principled commitment to further integration, the SNP has articulated an increased criticism of the supranational project. This divergence in party attitudes reveals the extent to which the pro-European dimension of Celtic nationalism is ideological or opportunistic.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The susceptibility of WiFi networks to Rogue Access Point attacks derives from the lack of identity for 802.11 devices. The most common means of detecting these attacks in current research is through tracking the credentials or the location of unauthorised and possibly malicious APs. In this paper, the authors outline a method of distinguishing WiFi Access Points using 802.11 MAC layer management frame traffic profiles. This system does not require location estimation or credential tracking techniques as used in current research techniques, which are known to be inaccurate. These characteristic management traffic profiles are shown to be unique for each device, tantamount to a MAC identity. The application of this technique to solving Rogue AP attacks under the constraints of an open access, public WiFi environment is discussed with the conclusion that the identity is practically very difficult to forge