115,029 research outputs found

    A Hypervisor-Based Bus System for Usage Control

    Get PDF
    Data usage control is concerned with requirements on data after access has been granted. In order to enforce usage control requirements, it is necessary to track the different representations that the data may take (among others, file, window content, network packet). These representations exist at different layers of abstraction. As a consequence, in order to enforce usage control requirements, multiple data flow tracking and usage control enforcement monitors must exist, one at each layer. If a new representation is created at some layer of abstraction, e.g., if a cache file is created for a picture after downloading it with a browser, then the initiating layer (in the example, the browser) must notify the layer at which the new representation is created (in the example, the operating system). We present a bus system for system-wide usage control that, for security and performance reasons, is implemented in a hypervisor. We evaluate its security and performance

    Accessing on-chip temperature health monitors using the IEEE 1687 standard

    Get PDF
    The IEEE 1687 (IJTAG) is a newly IEEE approved standard to access embedded instruments. The usage of these embedded instruments (health monitors) is increasing in order to perform different online measurements for testing purposes as dependability is becoming a key concern in today’s electronics. Aging and intermittent resistive faults (IRF) are two threats to a highly dependable system, and temperature can accelerate these two phenomena. In this paper, the work carried out for enabling online IJTAG control, observation and reconfiguration of the health monitors will be discussed. Three temperature monitors along with an IJTAG controller are used to demonstrate online temperature measurements using an IJTAG network interface. The simulation results show that the proposed (on-chip)methodology can reduce the dependency on the PC while observing the (static) embedded instruments in the field

    Relationships Among Heart Rate Monitor Usage, Neuroticism, and Performance in Triathletes

    Get PDF
    Triathlon, a sport that consists of swimming, biking and running, is growing in popularity throughout the country and the world. There is a large percentage of athletes that rely on the use of a heart rate monitor to gauge effort, but there is also a group of athletes that do not use this technology. The purpose of this research was to determine if personality, specifically neuroticism, played a role in determining which athletes use heart rate monitors and whether these variables had any effect on performance. Ninety-eight triathletes were surveyed from 2 half iron distance triathlons in the summer of 2010. There proved to be no interaction effect between neuroticism and heart rate monitor usage on performance [F 2 = 1.830, p = 0.168]. Interestingly, the data showed that there was no significant relationship between heart rate monitor usage and performance. This finding is interesting because heart rate monitors are widely used in the triathlon community, and these data show that perhaps heart rate monitors are not the best tool for gauging effort

    Designing an Adaptive Interface: Using Eye Tracking to Classify How Information Usage Changes Over Time in Partially Automated Vehicles

    Get PDF
    While partially automated vehicles can provide a range of benefits, they also bring about new Human Machine Interface (HMI) challenges around ensuring the driver remains alert and is able to take control of the vehicle when required. While humans are poor monitors of automated processes, specifically during ‘steady state’ operation, presenting the appropriate information to the driver can help. But to date, interfaces of partially automated vehicles have shown evidence of causing cognitive overload. Adaptive HMIs that automatically change the information presented (for example, based on workload, time or physiologically), have been previously proposed as a solution, but little is known about how information should adapt during steady-state driving. This study aimed to classify information usage based on driver experience to inform the design of a future adaptive HMI in partially automated vehicles. The unique feature of this study over existing literature is that each participant attended for five consecutive days; enabling a first look at how information usage changes with increasing familiarity and providing a methodological contribution to future HMI user trial study design. Seventeen participants experienced a steady-state automated driving simulation for twenty-six minutes per day in a driving simulator, replicating a regularly driven route, such as a work commute. Nine information icons, representative of future partially automated vehicle HMIs, were displayed on a tablet and eye tracking was used to record the information that the participants fixated on. The results found that information usage did change with increased exposure, with significant differences in what information participants looked at between the first and last trial days. With increasing experience, participants tended to view information as confirming technical competence rather than the future state of the vehicle. On this basis, interface design recommendations are made, particularly around the design of adaptive interfaces for future partially automated vehicles

    Device-Centric Monitoring for Mobile Device Management

    Full text link
    The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices and operating systems is mostly application-centric, resulting in global, device-centric properties (e.g. the user may not send more than 100 messages per day across all applications) being difficult or impossible to verify. In this paper we present a device-centric approach to runtime verify the device behaviour against a device policy with the different applications acting as independent components contributing to the overall behaviour of the device. We also present an implementation for Android devices, and evaluate it on a number of device-centric policies, reporting the empirical results obtained.Comment: In Proceedings FESCA 2016, arXiv:1603.0837

    The Beauty Industry\u27s Influence on Women in Society

    Get PDF
    There has been a significant amount of research done on the effect that advertising in the fashion and beauty industry has on women. By creating advertisements with unrealistic images of beauty, it has resulted in anxiety, low self-esteem, and low self-confidence in many women. Most of these negative emotions stems from unhappiness among body and appearance. Less research has been performed relating to cosmetics and how this can have an influence on women, and how women can use cosmetics to manipulate their appearance. This paper first discusses the existing research that focuses on the cosmetic industry’s influence on women. From this research, a general survey was created in order to gather general information about a group of college student’s cosmetic usage, habits, and beliefs. The results indicate that college women are high users of cosmetics, are very aware of the cosmetic industry, and that some individual differences can have an effect on the choices a woman makes regarding cosmetics

    A practical review of energy saving technology for ageing populations

    Get PDF
    Fuel poverty is a critical issue for a globally ageing population. Longer heating/cooling requirements combine with declining incomes to create a problem in need of urgent attention. One solution is to deploy technology to help elderly users feel informed about their energy use, and empowered to take steps to make it more cost effective and efficient. This study subjects a broad cross section of energy monitoring and home automation products to a formal ergonomic analysis. A high level task analysis was used to guide a product walk through, and a toolkit approach was used thereafter to drive out further insights. The findings reveal a number of serious usability issues which prevent these products from successfully accessing an important target demographic and associated energy saving and fuel poverty outcomes. Design principles and examples are distilled from the research to enable practitioners to translate the underlying research into high quality design-engineering solutions

    Sensor data to measure Hawthorne effects in cookstove evaluation.

    Get PDF
    This data in brief article includes estimated time cooking based on temperature sensor data taken every 30 min from three stone fires and introduced fuel-efficient Envirofit stoves in approximately 168 households in rural Uganda. These households were part of an impact evaluation study spanning about six months to understand the effects of fuel-efficient cookstoves on fuel use and pollution. Daily particulate matter (pollution) and fuelwood use data are also included. This data in brief file only includes the weeks prior to, during, and after an in-person measurement team visited each home. The data is used to analyze whether households change cooking patterns when in-person measurement teams are present versus when only the temperature sensor is in the home

    Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots

    Full text link
    The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. Based on this model we generalize the flooding attacks and propose an effective attack detection using Honeypots
    • …
    corecore