14,028 research outputs found
Proceedings of International Workshop "Global Computing: Programming Environments, Languages, Security and Analysis of Systems"
According to the IST/ FET proactive initiative on GLOBAL COMPUTING, the goal is to obtain techniques (models, frameworks, methods, algorithms) for constructing systems that are flexible, dependable, secure, robust and efficient.
The dominant concerns are not those of representing and manipulating data efficiently but rather those of handling the co-ordination and interaction, security, reliability, robustness, failure modes, and control of risk of the entities in the system and the overall design, description and performance of the system itself.
Completely different paradigms of computer science may have to be developed to tackle these issues effectively. The research should concentrate on systems having the following characteristics: • The systems are composed of autonomous computational entities where activity is not centrally controlled, either because global control is impossible or impractical, or because the entities are created or controlled by different owners.
• The computational entities are mobile, due to the movement of the physical platforms or by movement of the entity from one platform to another.
• The configuration varies over time. For instance, the system is open to the introduction of new computational entities and likewise their deletion.
The behaviour of the entities may vary over time.
• The systems operate with incomplete information about the environment.
For instance, information becomes rapidly out of date and mobility requires information about the environment to be discovered.
The ultimate goal of the research action is to provide a solid scientific foundation for the design of such systems, and to lay the groundwork for achieving effective principles for building and analysing such systems.
This workshop covers the aspects related to languages and programming environments as well as analysis of systems and resources involving 9 projects (AGILE , DART, DEGAS , MIKADO, MRG, MYTHS, PEPITO, PROFUNDIS, SECURE) out of the 13 founded under the initiative. After an year from the start of the projects, the goal of the workshop is to fix the state of the art on the topics covered by the two clusters related to programming environments and analysis of systems as well as to devise strategies and new ideas to profitably continue the research effort towards the overall objective of the initiative.
We acknowledge the Dipartimento di Informatica and Tlc of the University of Trento, the Comune di Rovereto, the project DEGAS for partially funding the event and the Events and Meetings Office of the University of Trento for the valuable collaboration
Options for Securing RTP Sessions
The Real-time Transport Protocol (RTP) is used in a large number of
different application domains and environments. This heterogeneity
implies that different security mechanisms are needed to provide
services such as confidentiality, integrity, and source
authentication of RTP and RTP Control Protocol (RTCP) packets
suitable for the various environments. The range of solutions makes
it difficult for RTP-based application developers to pick the most
suitable mechanism. This document provides an overview of a number
of security solutions for RTP and gives guidance for developers on
how to choose the appropriate security mechanism
Recommended from our members
The Use of Web-Based Support Groups Versus Usual Quit-Smoking Care for Men and Women Aged 21-59 Years: Protocol for a Randomized Controlled Trial (Preprint)
BACKGROUND
Existing smoking cessation treatments are challenged by low engagement and high relapse rates, suggesting the need for more innovative, accessible, and interactive treatment strategies. Twitter is a Web-based platform that allows people to communicate with each other throughout the day using their phone.
OBJECTIVE
This study aims to leverage the social media platform of Twitter for fostering peer-to-peer support to decrease relapse with quitting smoking. Furthermore, the study will compare the effects of coed versus women-only groups on women’s success with quitting smoking.
METHODS
The study design is a Web-based, three-arm randomized controlled trial with two treatment arms (a coed or women-only Twitter support group) and a control arm. Participants are recruited online and are randomized to one of the conditions. All participants will receive 8 weeks of combination nicotine replacement therapy (patches plus their choice of gum or lozenges), serial emails with links to Smokefree.gov quit guides, and instructions to record their quit date online (and to quit smoking on that date) on a date falling within a week of initiation of the study. Participants randomized to a treatment arm are placed in a fully automated Twitter support group (coed or women-only), paired with a buddy (matched on age, gender, location, and education), and encouraged to communicate with the group and buddy via daily tweeted discussion topics and daily automated feedback texts (a positive tweet if they tweet and an encouraging tweet if they miss tweeting). Recruited online from across the continental United States, the sample consists of 215 male and 745 female current cigarette smokers wanting to quit, aged between 21 and 59 years. Self-assessed follow-up surveys are completed online at 1, 3, and 6 months after the date they selected to quit smoking, with salivary cotinine validation at 3 and 6 months. The primary outcome is sustained biochemically confirmed abstinence at the 6-month follow-up.
RESULTS
From November 2016 to September 2018, 960 participants in 36 groups were recruited for the randomized controlled trial, in addition to 20 participants in an initial pilot group. Data analysis will commence soon for the randomized controlled trial based on data from 896 of the 960 participants (93.3%), with 56 participants lost to follow-up and 8 dropouts.
CONCLUSIONS
This study combines the mobile platform of Twitter with a support group for quitting smoking. Findings will inform the efficacy of virtual peer-to-peer support groups for quitting smoking and potentially elucidate gender differences in quit rates found in prior research.
CLINICALTRIAL
ClinicalTrials.gov NCT02823028; https://clinicaltrials.gov/ct2/show/NCT0282302
Security in Wireless Sensor Networks: Issues and Challenges
Wireless Sensor Network (WSN) is an emerging technology that shows great
promise for various futuristic applications both for mass public and military.
The sensing technology combined with processing power and wireless
communication makes it lucrative for being exploited in abundance in future.
The inclusion of wireless communication technology also incurs various types of
security threats. The intent of this paper is to investigate the security
related issues and challenges in wireless sensor networks. We identify the
security threats, review proposed security mechanisms for wireless sensor
networks. We also discuss the holistic view of security for ensuring layered
and robust security in wireless sensor networks.Comment: 6 page
Application of JXTA-overlay platform for secure robot control
In this paper, we present the evaluation and experimental results of secured robot control in a P2P system. The control system is based on JXTA-Overlay platform. We used secure primitives and functions of JXTA-Overlay for the secure control of the robot motors. We investigated the time of robot control for some scenarios with different number of peers connected in JXTA-Overlay network. All experiments are realised in a LAN environment. The experimental results show that with the join of other peers in the network, the average time of robot control is increased, but the difference between the secure and unsecure robot control average time is nearly the samePeer ReviewedPostprint (published version
Recommended from our members
Computing infrastructure issues in distributed communications systems : a survey of operating system transport system architectures
The performance of distributed applications (such as file transfer, remote login, tele-conferencing, full-motion video, and scientific visualization) is influenced by several factors that interact in complex ways. In particular, application performance is significantly affected both by communication infrastructure factors and computing infrastructure factors. Several communication infrastructure factors include channel speed, bit-error rate, and congestion at intermediate switching nodes. Computing infrastructure factors include (among other things) both protocol processing activities (such as connection management, flow control, error detection, and retransmission) and general operating system factors (such as memory latency, CPU speed, interrupt and context switching overhead, process architecture, and message buffering). Due to a several orders of magnitude increase in network channel speed and an increase in application diversity, performance bottlenecks are shifting from the network factors to the transport system factors.This paper defines an abstraction called an "Operating System Transport System Architecture" (OSTSA) that is used to classify the major components and services in the computing infrastructure. End-to-end network protocols such as TCP, TP4, VMTP, XTP, and Delta-t typically run on general-purpose computers, where they utilize various operating system resources such as processors, virtual memory, and network controllers. The OSTSA provides services that integrate these resources to support distributed applications running on local and wide area networks.A taxonomy is presented to evaluate OSTSAs in terms of their support for protocol processing activities. We use this taxonomy to compare and contrast five general-purpose commercial and experimental operating systems including System V UNIX, BSD UNIX, the x-kernel, Choices, and Xinu
- …