3,045 research outputs found

    Configuration Management of Distributed Systems over Unreliable and Hostile Networks

    Get PDF
    Economic incentives of large criminal profits and the threat of legal consequences have pushed criminals to continuously improve their malware, especially command and control channels. This thesis applied concepts from successful malware command and control to explore the survivability and resilience of benign configuration management systems. This work expands on existing stage models of malware life cycle to contribute a new model for identifying malware concepts applicable to benign configuration management. The Hidden Master architecture is a contribution to master-agent network communication. In the Hidden Master architecture, communication between master and agent is asynchronous and can operate trough intermediate nodes. This protects the master secret key, which gives full control of all computers participating in configuration management. Multiple improvements to idempotent configuration were proposed, including the definition of the minimal base resource dependency model, simplified resource revalidation and the use of imperative general purpose language for defining idempotent configuration. Following the constructive research approach, the improvements to configuration management were designed into two prototypes. This allowed validation in laboratory testing, in two case studies and in expert interviews. In laboratory testing, the Hidden Master prototype was more resilient than leading configuration management tools in high load and low memory conditions, and against packet loss and corruption. Only the research prototype was adaptable to a network without stable topology due to the asynchronous nature of the Hidden Master architecture. The main case study used the research prototype in a complex environment to deploy a multi-room, authenticated audiovisual system for a client of an organization deploying the configuration. The case studies indicated that imperative general purpose language can be used for idempotent configuration in real life, for defining new configurations in unexpected situations using the base resources, and abstracting those using standard language features; and that such a system seems easy to learn. Potential business benefits were identified and evaluated using individual semistructured expert interviews. Respondents agreed that the models and the Hidden Master architecture could reduce costs and risks, improve developer productivity and allow faster time-to-market. Protection of master secret keys and the reduced need for incident response were seen as key drivers for improved security. Low-cost geographic scaling and leveraging file serving capabilities of commodity servers were seen to improve scaling and resiliency. Respondents identified jurisdictional legal limitations to encryption and requirements for cloud operator auditing as factors potentially limiting the full use of some concepts

    Multidisciplinary perspectives on Artificial Intelligence and the law

    Get PDF
    This open access book presents an interdisciplinary, multi-authored, edited collection of chapters on Artificial Intelligence (‘AI’) and the Law. AI technology has come to play a central role in the modern data economy. Through a combination of increased computing power, the growing availability of data and the advancement of algorithms, AI has now become an umbrella term for some of the most transformational technological breakthroughs of this age. The importance of AI stems from both the opportunities that it offers and the challenges that it entails. While AI applications hold the promise of economic growth and efficiency gains, they also create significant risks and uncertainty. The potential and perils of AI have thus come to dominate modern discussions of technology and ethics – and although AI was initially allowed to largely develop without guidelines or rules, few would deny that the law is set to play a fundamental role in shaping the future of AI. As the debate over AI is far from over, the need for rigorous analysis has never been greater. This book thus brings together contributors from different fields and backgrounds to explore how the law might provide answers to some of the most pressing questions raised by AI. An outcome of the Católica Research Centre for the Future of Law and its interdisciplinary working group on Law and Artificial Intelligence, it includes contributions by leading scholars in the fields of technology, ethics and the law.info:eu-repo/semantics/publishedVersio

    Climate Change and Critical Agrarian Studies

    Full text link
    Climate change is perhaps the greatest threat to humanity today and plays out as a cruel engine of myriad forms of injustice, violence and destruction. The effects of climate change from human-made emissions of greenhouse gases are devastating and accelerating; yet are uncertain and uneven both in terms of geography and socio-economic impacts. Emerging from the dynamics of capitalism since the industrial revolution — as well as industrialisation under state-led socialism — the consequences of climate change are especially profound for the countryside and its inhabitants. The book interrogates the narratives and strategies that frame climate change and examines the institutionalised responses in agrarian settings, highlighting what exclusions and inclusions result. It explores how different people — in relation to class and other co-constituted axes of social difference such as gender, race, ethnicity, age and occupation — are affected by climate change, as well as the climate adaptation and mitigation responses being implemented in rural areas. The book in turn explores how climate change – and the responses to it - affect processes of social differentiation, trajectories of accumulation and in turn agrarian politics. Finally, the book examines what strategies are required to confront climate change, and the underlying political-economic dynamics that cause it, reflecting on what this means for agrarian struggles across the world. The 26 chapters in this volume explore how the relationship between capitalism and climate change plays out in the rural world and, in particular, the way agrarian struggles connect with the huge challenge of climate change. Through a huge variety of case studies alongside more conceptual chapters, the book makes the often-missing connection between climate change and critical agrarian studies. The book argues that making the connection between climate and agrarian justice is crucial

    LIPIcs, Volume 251, ITCS 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 251, ITCS 2023, Complete Volum

    The use of proxies in designing for and with autistic children: supporting friendship as a case study

    Get PDF
    Participatory Design (PD) is an approach for designing new technologies which involves end users in the design process. It is generally accepted that involving users in the design process gives them a sense of ownership over the final product which enhances its usability and acceptance by the target population. Employing a PD approach can introduce multiple challenges especially when working with autistic children. Many approaches for involving autistic children and children with special needs were developed to address these challenges. However, these frameworks introduce their own limitations as well. There is an ethical dilemma to consider in the involvement of autistic children in the design process. Although we established the ethical benefit of involving children, we did not address the ethical issues that will result from involving them in these research projects. Among other issues, the nature of design workshops we as a community currently run require working with unfamiliar researchers and communicating with them while social and communication differences are one of the main diagnostic criteria for autism. When designing for autistic children and other vulnerable populations an alternative (or most often an additional) approach is designing with proxies. Proxies for the child can be one of several groups of other stakeholders, such as: teachers, parents and siblings. Each of these groups may inform the design process, from their particular perspective, and as proxies for the target group of autistic children. Decisions need to be made about what stages in the design process are suited to their participation, and the role they play in each case. For this reason, we explore the role of teachers, parents, autistic adults and neurotypical children as proxies in the design process. To explore the roles of proxies we chose friendship between autistic and neurotypical children as the context we are designing for. We are interested in understanding the nature of children's friendships and the potential for technology to support them. Although children themselves are the ones who experience friendship and challenges around its development and peer interaction, they might find it difficult to articulate the challenges they face. Furthermore, it is unrealistic to expect children to identify strategies to help them overcome the challenges with friendship development that they are facing as it assumes children have the social skills to come up with these strategies in the first place. Hence, it is necessary in this context to consider proxies who can identify challenges and suggest ways to overcome them

    Evaluating Architectural Safeguards for Uncertain AI Black-Box Components

    Get PDF
    Although tremendous progress has been made in Artificial Intelligence (AI), it entails new challenges. The growing complexity of learning tasks requires more complex AI components, which increasingly exhibit unreliable behaviour. In this book, we present a model-driven approach to model architectural safeguards for AI components and analyse their effect on the overall system reliability

    Managing risks and harms associated with the use of anabolic steroids

    Get PDF
    Background: People using AAS may adopt a range of strategies to prevent and treat adverse health conditions potentially associated with the use of these substances (AAS-HC). These strategies include seeking support from physicians, using the needle and syringe exchange programme (NSP) and seeking support from informal sources such as coaches and online forums. The process of identifying risks and harms, adopting and modifying health-related strategies is similar to the methods of risk-management employed in other fields of human activity. This approach recognises the importance of the informal body of knowledge produced by decades of AAS-related folk-pharmacology and seeks to understand harm-reduction from the users’ perspective.Objectives: The primary objective of this thesis is to investigate the strategies adopted by people using AAS to prevent and treat AAS-HC. Secondary objectives include to explore the factors associated with the adoption of health strategies and the occurrence of AAS-HC, as well as the barriers and facilitators experienced by AAS users when accessing health services and other sources of support.Methods: To achieve the objectives above, three work packages (WP) were produced as part of a mixed-methods research design. WP1 is a systematic review and meta-analysis of the prevalence of AAS users seeking support from physicians. WP2 is a cross-sectional online survey that identified AAS-HC, risk factors and health-related strategies adopted by AAS users in the UK. WP3 is a qualitative study based on in-depth interviews to discuss the experiences of AAS users and their risk-management strategies (RMS).Results: The estimated overall prevalence of AAS users seeking support from physicians is 37.1%. Higher prevalence rates were observed in studies from Australia (67.3%) and amongst clients of the NSP (54.1%), whilst the lowest was observed among adolescents (17.3%). The health conditions most commonly reported by the 883 participants of the online survey were insomnia (33.3%) and anxiety (32.2%). Most participants adopted preventive strategies such as having blood tests in the last 12 months (86.2%) and seeking a GP to treat AAS-HC (55.0%). Those who sought a GP for AAS-related information were 76% less likely to report an AAS-HC in the last 12 months. The interviews described AAS users’ RMS as a continuous process of awareness and behavioural changes. Participants described an extensive use of private health services and other sources of support to bypass the barriers experienced by AAS users engaging with the public health system.Conclusion: A large number of AAS users refrain from seeking support from physicians. Health professionals should be trained to recognise and manage the most common AAS-HC and help users improve their RMS. Further studies should investigate the efficacy of AAS-related RMS and the subpopulations of AAS users more likely to experience AAS-HC and less likely to engage with health services.<br/

    2017 GREAT Day Program

    Get PDF
    SUNY Geneseo’s Eleventh Annual GREAT Day.https://knightscholar.geneseo.edu/program-2007/1011/thumbnail.jp

    Approximate Computing Survey, Part I: Terminology and Software & Hardware Approximation Techniques

    Full text link
    The rapid growth of demanding applications in domains applying multimedia processing and machine learning has marked a new era for edge and cloud computing. These applications involve massive data and compute-intensive tasks, and thus, typical computing paradigms in embedded systems and data centers are stressed to meet the worldwide demand for high performance. Concurrently, the landscape of the semiconductor field in the last 15 years has constituted power as a first-class design concern. As a result, the community of computing systems is forced to find alternative design approaches to facilitate high-performance and/or power-efficient computing. Among the examined solutions, Approximate Computing has attracted an ever-increasing interest, with research works applying approximations across the entire traditional computing stack, i.e., at software, hardware, and architectural levels. Over the last decade, there is a plethora of approximation techniques in software (programs, frameworks, compilers, runtimes, languages), hardware (circuits, accelerators), and architectures (processors, memories). The current article is Part I of our comprehensive survey on Approximate Computing, and it reviews its motivation, terminology and principles, as well it classifies and presents the technical details of the state-of-the-art software and hardware approximation techniques.Comment: Under Review at ACM Computing Survey
    • …
    corecore