41,398 research outputs found
Personalizable Service Discovery in Pervasive Systems
Today, telecom providers are facing changing challenges.
To stay ahead in the competition and provide market
leading offerings, carriers need to enable a global ecosystem of
third party independent application developers to deliver converged
services. This is the aim of leveraging a open standardsbased
service delivery platform. To identify and to cope with
those challenges is the main target of the EU funded project
IST DAIDALOS II. And a central point to satisfy the changing
user needs is the provision of a well working, user friendly and
personalized service discovery. This paper describes our work
in the project on a middleware in a framework for pervasive
service usage. We have designed an architecture for it, that
enables full transparency to the user, grants high compatibility
and extendability by a modular and pluggable conception and
allows for interoperability with most known service discovery
protocols. Our Multi-Protocol Service Discovery and the Four
Phases Service Filtering concept enabling personalization should
allow for the best possible results in service discovery
Aligning Evidence-Based Practice With Translational Research: Opportunities for Clinical Practice Research
Magnet(R) and other organizations investing resources in evidence-based practice (EBP) are ideal laboratories for translational nursing research. Translational research, the study of implementation of evidence into practice, provides a unique opportunity to leverage local EBP work for maximum impact. Aligning EBP projects with rigorous translational research can efficiently meet both EBP and research requirements for Magnet designation or redesignation, inform clinical practice, and place organizations at the leading edge of practice-based knowledge development for the nursing discipline
Graphical Methods in Device-Independent Quantum Cryptography
We introduce a framework for graphical security proofs in device-independent
quantum cryptography using the methods of categorical quantum mechanics. We are
optimistic that this approach will make some of the highly complex proofs in
quantum cryptography more accessible, facilitate the discovery of new proofs,
and enable automated proof verification. As an example of our framework, we
reprove a previous result from device-independent quantum cryptography: any
linear randomness expansion protocol can be converted into an unbounded
randomness expansion protocol. We give a graphical proof of this result, and
implement part of it in the Globular proof assistant.Comment: Publishable version. Diagrams have been polished, minor revisions to
the text, and an appendix added with supplementary proof
Complete Genome Sequences of Mycobacterium smegmatis Phages Chewbacca, Reptar3000, and Riparian, Isolated in Las Vegas, Nevada
Here, we present the complete genome sequences of Mycobacterium smegmatis phages Chewbacca, Reptar3000, and Riparian, isolated from soil in Las Vegas, NV. The phages were isolated and annotated by undergraduate students enrolled in the Phage Discovery course offered by the School of Life Sciences at the University of Nevada, Las Vega
WSMO-lite annotations for web services
and other research output
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
We present APHRODITE, an architecture designed to reduce false positives in
network intrusion detection systems. APHRODITE works by detecting anomalies in
the output traffic, and by correlating them with the alerts raised by the NIDS
working on the input traffic. Benchmarks show a substantial reduction of false
positives and that APHRODITE is effective also after a "quick setup", i.e. in
the realistic case in which it has not been "trained" and set up optimall
JWalk: a tool for lazy, systematic testing of java classes by design introspection and user interaction
Popular software testing tools, such as JUnit, allow frequent retesting of modified code; yet the manually created test scripts are often seriously incomplete. A unit-testing tool called JWalk has therefore been developed to address the need for systematic unit testing within the context of agile methods. The tool operates directly on the compiled code for Java classes and uses a new lazy method for inducing the changing design of a class on the fly. This is achieved partly through introspection, using Java’s reflection capability, and partly through interaction with the user, constructing and saving test oracles on the fly. Predictive rules reduce the number of oracle values that must be confirmed by the tester. Without human intervention, JWalk performs bounded exhaustive exploration of the class’s method protocols and may be directed to explore the space of algebraic constructions, or the intended design state-space of the tested class. With some human interaction, JWalk performs up to the equivalent of fully automated state-based testing, from a specification that was acquired incrementally
CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions
By regularly querying Web search engines, users (unconsciously) disclose
large amounts of their personal data as part of their search queries, among
which some might reveal sensitive information (e.g. health issues, sexual,
political or religious preferences). Several solutions exist to allow users
querying search engines while improving privacy protection. However, these
solutions suffer from a number of limitations: some are subject to user
re-identification attacks, while others lack scalability or are unable to
provide accurate results. This paper presents CYCLOSA, a secure, scalable and
accurate private Web search solution. CYCLOSA improves security by relying on
trusted execution environments (TEEs) as provided by Intel SGX. Further,
CYCLOSA proposes a novel adaptive privacy protection solution that reduces the
risk of user re- identification. CYCLOSA sends fake queries to the search
engine and dynamically adapts their count according to the sensitivity of the
user query. In addition, CYCLOSA meets scalability as it is fully
decentralized, spreading the load for distributing fake queries among other
nodes. Finally, CYCLOSA achieves accuracy of Web search as it handles the real
query and the fake queries separately, in contrast to other existing solutions
that mix fake and real query results
- …