Mostrando recursos 1 - 20 de 328.413

  1. ABSTRACT Anonymity and Accountability in Self-Organizing Electronic Communities

    Csilla Farkas; Attila Meretei
    In this paper we study the problem of anonymity versus accountability in electronic communities. We argue that full anonymity may present a security risk that is unacceptable in certain applications; therefore, anonymity and accountability are both needed. To resolve the inherent contradiction between anonymity and accountability in a flexible manner, we introduce the concepts of internal and external accountabilities. Intuitively, internal accountability applies to virtual users only, and is governed by the policy of a group (a community). In contrast, external accountability is needed to address issues related to misuse if the activity is to be penalized in real life...

  2. An Agent-Based Platform for the Management of Dynamic Virtual Enterprises Vorgelegt von Dipl-Ing.

    Evangelos K. Ouzounis; Von Fakultät; Iv Elektrotechnik Informatik
    The penetration of Internet and the World Wide Web (Web) in accordance with new technological advances urged companies to seize the opportunities offered by Electronic Commerce and Electronic Business. Especial promising are the opportunities for co-operation among companies in terms of Virtual Communities and Virtual Enterprises based on open networks and innovative Information and Communication Technologies (ICT). Virtual Enterprises provide, from one side, the possibility to share key business processes in a profitable way and, from the other side, access to capabilities and resources offered by other partners. This can lead to shorten development and manufacturing cycles, reduced time to...

  3. Analysis of self-correcting selfassembly growth models

    Yuliy Baryshnikov; Ed Coffman; Nadrian Seeman; Teddy Yimwadsana
    In many respects, the current state of DNA-based computing resembles the state of standard, electronic computing a half century ago: a fascinating prospect is slow to develop owing to inflexible interfaces and unacceptably low reliability of the computational processes. We concentrate in this paper on the latter aspect,

  4. How to Bypass the Wassenaar Arrangement: A New Application for Watermarking

    Franck Leprévost
    The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption software on the other hand. We will look at different international agreements, such as the UKUSAagreement and the Wassenaar arrangement, and elaborate on current encryption techniques falling under these regulations. This discussion is then followed by introducing the basic concepts of steganography and digital watermarking which could be used for secret communication. As a consequence, we propose an original way to legally bypass the international export regulations using these technologies. To this...

  5. Acquisitions and Acquisitions et Bibliographie Services services bibliographiques

    Masters Of Arts; O Namwüka Ornari
    The author has granted a non-exclusive licence allowing the National Lïbrary of Canada to reproduce, loan, distribute or sell copies of this thesis in microfom, paper or electronic formats. The author retains ownership of the copyright in this thesis. Neither the thesis nor substantial extracts fiom it may be printed or othenirise reproduced without the author's permission. YocumQ voue r6u-Our fi4 hW18 refBrenc6 L'auteur a accordé une Licence non exclusive permettant à la Bibliothèque nationale du Canada dre reproduire, prêter, distribuer ou vendre des copies de cette thèse sous la fonne de microfiche/fïh, de reproduction sur papier ou sur form~at...

  6. INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 4 (2004), #G01 NIM RESTRICTIONS

    M. H. Albert; R. J. Nowakowski
    A number of Nim-like games in which moves are restricted somehow to occur from a single pile are analysed. In each case the complete description of type P and type N positions is obtained. A more detailed analysis of the Sprague-Grundy values of positions in two heap Nim where the move must be from the larger heap is also presented. 1.

  7. $rec.titulo

    Alex X. Liu; Jason M. Kovacs
    Cookies are the primary means for web applications to authenticate HTTP requests and to maintain client states. Many web applications (such as electronic commerce) demand a secure cookie protocol. Such a protocol needs to provide the following four services: authentication, confidentiality, integrity and anti-replay. Several secure cookie protocols have been proposed in previous literature; however, none of them are completely satisfactory. In this paper, we propose a secure cookie protocol that is effective, efficient, and easy to deploy. In terms of effectiveness, our protocol provides all of the above four security services. In terms of efficiency, our protocol does not...

  8. Abstract An Object-Oriented Scripting Environment for the WEBSS Electronic Book System

    J. Monnard; J. Pasquier-boltuck
    This paper presents the scripting facilities built on top of WEBSS, an interactive system for the creation and consultation of electronic books. The sclipting environment relies on the same object-oriented software architecture used in the design of the WEBSs application, rendering it consistently integratcxi with the other components of the system. Scripts enhance the application in two ways. First, the ability to combine basic WEBSS actions allows users to easily define new high-level functions like, for example, the automatic creation of tables of contents and indexes. Secondly, the behavior of the objects that constitute an electronic book can be enriched...

  9. On Mediated Search of the United States Holocaust Memorial Museum Data

    Jefferson Heard Jordan Wilberding; Ophir Frieder; David Grossman; Larry Kane
    recently celebrated its ten-year anniversary. The museum was established to bear witness to the human atrocities committed by the Nazi reign of terror. As such, related data must be collected, and means to store, search, and analyze the data must be provided. Presently, the data available reside in various formats, sizes, and structures, in videotape and films, in microfilms and microfiche, in various incompatible structured databases, as unstructured electronic documents, and semi-structured indexes scattered throughout the organizations. Collected data are partitioned over more than a dozen languages, further complicating their processing. There is currently no single search mechanism or even...

  10. Handwriting Analysis for Diagnosis and Prognosis of Parkinson's Disease

    Atilla Ünlü; Rüdiger Brause; Karsten Krakow
    At present, there are no quantitative, objective methods for diagnosing the Parkinson disease. Existing methods of quantitative analysis by myograms suffer by inaccuracy and patient strain; electronic tablet analysis is limited to the visible drawing, not including the writing forces and hand movements. In our paper we show how handwriting analysis can be obtained by a new electronic pen and new features of the recorded signals. This gives good results for diagnostics.

  11. Data Policy for Increasing the Data Quality in Intelligent Systems

    Tatjana Welzer; Izidor Golob; Marjan Družovec; Boštjan Brumen
    Use of data in various areas and their electronic availability has put importance of data quality to higher level. In general data quality has syntactic and semantic component. The syntactic component is relatively easy to achieve if supported by tools, while semantic component requires more research. In many cases such data come from different sources, which are distributed across enterprise and are at different quality levels. Special attention needs to be paid to data upon which critical decisions are met in/for intelligent systems. In the present paper we will focus on the semantic component of data quality in the selected...

  12. A handy multi-coupon system

    Sébastien Canard; Aline Gouget; Emeline Hufschmitt
    Abstract. A coupon is an electronic data that represents the right to access a service provided by a service provider (e.g. gift certificates or movie tickets). At Financial Crypto’05, a privacy-protecting multi-coupon system that allows a user to withdraw a predefined number of single coupons from the service provider has been proposed by Chen et al. In this system, every coupon has the same value which is predetermined by the system. The main drawbacks of Chen et al. proposal are that the redemption protocol of their system is inefficient, and that no formal security model is proposed. In this paper,...

  13. ABSTRACT DIGITAL IDENTITY: HOW TO BE SOMEONE ON THE NET

    Toby Baier; Christian Zirpins; Winfried Lamersdorf
    Personal communication and collaboration has been and still is a major driver of the Internet. A severe drawback in human centric electronic interaction is the fuzziness of the image that the co-operation partners have of each other (i.e. their respective “identities”) – especially in different and varying application contexts. This uncertainty adversely affects increasingly important “soft ” co-operation factors like, e.g., trust and social behavior, and should therefore be minimized whenever possible. In addition, the lack of a homogenous representation of digital identities results, even at the systemlevel, in many cases in increased and unnecessary administration tasks – like, e.g.,...

  14. Construction of codes identifying sets of vertices,” The Electronic

    Sylvain Gravier; Julien Moncel
    In this paper the problem of constructing graphs having a (1, ≤ ℓ)-identifying code of small cardinality � is addressed. � It is known that the cardinality of such a ℓ2 code is bounded by Ω log ℓ log n. Here we construct graphs on n vertices having a(1, ≤ ℓ)-identifying code of cardinality O � ℓ4 log n � for all ℓ ≥ 2. We derive our construction from a connection between identifying codes and superimposed codes, which we describe in this paper. 1 Codes identifying sets of vertices Let G =(V,E) be a simple, non-oriented graph. For a...

  15. Knowledge discovery from databases: The NYU project

    James Clifford; James Clifford; James Clifford; Vasant Dhar; Vasant Dhar; Vasant Dhar; Alex Tuzhilin; Alex Tuzhilin; Alex Tuzhilin
    More and more application domains, from financial market analysis to weather prediction, from monitoring supermarket purchases to monitoring satellite images, are becomingly increasingly data-intensive. The result is massive databases that are grow-ing at a rapid rate- it has been estimated that the world7s electronic data almost doubles every year. With this rate of data explosion, there is a pressing need for com-puters to play an increasing role in analyzing these huge data repositories which are impossible to penetrate manually. The challenge is to ferret out the regularities in the data that will prove to be interesting to the user. A...

  16. Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety

    Richard Robinson; Mingyan Li; Scott Lintelman (boeing Phantom Works; Krishna Sampigethaya Radha Poovendran (nsl
    Abstract. The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airplanes with wired and wireless network interfaces offer a wide spectrum of network applications, in particular electronic distribution of software (EDS), and onboard collection and off-board retrieval of airplane health reports. On the other hand, airplane safety may be heavily dependent on the security of data transported in these applications. The FAA mandates safety regulations and policies for the design and development of airplane software to ensure continued airworthiness. However, data networks have well known security vulnerabilities that can be exploited by attackers to corrupt and/or...

  17. Degree Sequences of F-Free Graphs

    Oleg Pikhurko; Anusch Taraz; Technische Universität München
    Let F be a fixed graph of chromatic number r + 1. We prove that for all large n the degree sequence of any F-free graph of order n is, in a sense, close to being dominated by the degree sequence of some r-partite graph. We present two different proofs: one goes via the Regularity Lemma and the other uses a more direct counting argument. Although the latter proof is longer, it gives better estimates and allows F to grow with n. As an application of our theorem, we present new results on the generalization of the Turán problem introduced...

  18. Using Machine Learning to Predict Trouble During Collaborative Learning

    Brad Goodman; Frank Linton; Guido Zarrella; Robert Gaimari
    Abstract. Our goal is to build and evaluate a web-based, collaborative distance-learning system that will allow groups of students to interact with each other remotely and with an intelligent electronic agent that will aid them in their learning. The agent will follow the discussion and interact with the participants when it detects learning trouble. In order to recognize problems in the dialogue, we investigated conversational elements that can be utilized as predictors for effective and ineffective interaction between human students. In this paper we discuss our representation of participant dialogue and the statistical models we are using to determine the...

  19. Vision-based Navigation from Wheels to Wings

    Jean-christophe Zufferey; Antoine Beyeler; Dario Floreano
    Abstract- We describe an incremental approach towards the development of autonomous indoor flyers that use only vision to navigate in textured environments. In order to cope with the severe weight and energy constraints of such systems, we use spiking neural controllers that can be implemented in tiny micro-controllers and map visual information into motor commands. The network morphology is evolved by means of an evolutionary process on the physical robots. This methodology is tested in three robots of increasing complexity, from a wheeled robot to a dirigible to a winged robot. The paper describes the approach, the robots, their degrees...

  20. Concept of Combining Adaptable Passive Behaviour with an Active Control Structure Using Pleated Pneumatic Artificial Muscles for the Bipedal Robot LUCY

    Björn Verrelst; Ronald Van Ham; Jimmy Vermeulen; Dirk Lefeber
    Abstract. This paper reports on the concept of combining passive behaviour with an active control strategy using Pleated Pneumatic Artificial Muscles. These actuators have a very high power to weight ratio and an inherent adaptable compliance which makes them extremely suitable for legged machines. Lucy, our Bipedal robot, is equipped with these muscles in order to walk in a dynamically stable way while the adaptable compliance will be used to alter the natural dynamics of the system. The paper presents the concept of the Pleated Pneumatic Artificial Muscle and its characteristics. It shows the implementation of these muscles to actuate...

Aviso de cookies: Usamos cookies propias y de terceros para mejorar nuestros servicios, para análisis estadístico y para mostrarle publicidad. Si continua navegando consideramos que acepta su uso en los términos establecidos en la Política de cookies.