5,196 research outputs found

    Desert Island Discs and British emotional life

    Get PDF
    This chapter explores how the long-running BBC radio programme Desert Island Discs has responded over time to an increasing public appetite for openness and honesty. One of the programme’s presenters once said it was ‘properly impressed by power, wealth and ambition, but
 knows that the world is made up of more than that’. This spoke to a longer-term revolution in modern life, as outlined by historians of the emotions: an increasing informality of manners, especially in broadcast talk. How did the BBC navigate these trends in a series that had long been a by-word for decorum? And what did Radio 4 listeners think of its new willingness in the 1980s and 1990s to probe guests more deeply? Drawing on unpublished BBC records and Mass Observation archives, this chapter focuses on how various desires for openness over private lives and feelings - and the anxieties this prompted - were negotiated behind-the-scenes at crucial moments in its history

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    A System for Distributed Mechanisms: Design, Implementation and Applications

    Full text link
    We describe here a structured system for distributed mechanism design appropriate for both Intranet and Internet applications. In our approach the players dynamically form a network in which they know neither their neighbours nor the size of the network and interact to jointly take decisions. The only assumption concerning the underlying communication layer is that for each pair of processes there is a path of neighbours connecting them. This allows us to deal with arbitrary network topologies. We also discuss the implementation of this system which consists of a sequence of layers. The lower layers deal with the operations that implement the basic primitives of distributed computing, namely low level communication and distributed termination, while the upper layers use these primitives to implement high level communication among players, including broadcasting and multicasting, and distributed decision making. This yields a highly flexible distributed system whose specific applications are realized as instances of its top layer. This design is implemented in Java. The system supports at various levels fault-tolerance and includes a provision for distributed policing the purpose of which is to exclude `dishonest' players. Also, it can be used for repeated creation of dynamically formed networks of players interested in a joint decision making implemented by means of a tax-based mechanism. We illustrate its flexibility by discussing a number of implemented examples.Comment: 36 pages; revised and expanded versio

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    Full text link
    With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of the data flowing through across networks provides the researchers with an interesting and intriguing potential for research. Design of these networks to ensure the protection of data faces the constraints of limited power and processing resources. We provide the basics of wireless sensor network security to help the researchers and engineers in better understanding of this applications field. In this chapter, we will provide the basics of information security with special emphasis on WSNs. The chapter will also give an overview of the information security requirements in these networks. Threats to the security of data in WSNs and some of their counter measures are also presented

    DisQo : A user needs analysis method for smart home

    Get PDF
    International audienceHow can people identify the services that they might expect from their smart home when they have little to no knowledge about novel technologies? This paper reports on a user needs analysis method designed to answer this question: DisQo. We have recruited 17 families and used a combination of interviews and playful cultural probes. Results show that families are willing to couple smart objects to improve their lives

    Network parameters impact on dynamic transmission power control in vehicular ad hoc networks

    Get PDF
    International audienceIn vehicular ad hoc networks, the dynamic change in transmission power is very effective to increase the throughput of the wireless vehicular network and decrease the delay of the message communication between vehicular nodes on the highway. Whenever an event occurs on the highway, the reliability of the communication in the vehicular network becomes so vital so that event created messages should reach to all the moving network nodes. It becomes necessary that there should be no interference from outside of the network and all the neighbor nodes should lie in the transmission range of the reference vehicular node. Transmission range is directly proportional to the transmission power the moving node. If the transmission power will be high, the interference increases that can cause higher delay in message reception at receiver end, hence the performance of the network decreased. In this paper, it is analyzed that how transmission power can be controlled by considering other different parameter of the network such as; density, distance between moving nodes, different types of messages dissemination with their priority, selection of an antenna also affects the transmission power. The dynamic control of transmission power in VANET serves also for the optimization of the resources where it needs, can be decreased and increased depending on the circumstances of the network. Different applications and events of different types also cause changes in transmission power to enhance the reachability. The analysis in this paper is comprised of density, distance with single hop and multi hop message broadcasting based dynamic transmission power control as well as antenna selection and applications based. Some summarized tables are produced according to the respective parameters of the vehicular network. At the end some valuable observations are made and discussed in detail

    Challenging the Autonomous Press

    Get PDF
    Dean Lee Bollinger's most recent book -- Images of a Free Press 1 -- comes at a time in which both the press and the First Amendment are under searching scrutiny. Complaints about the press-protectiveness of libel law 2 vie with charges of press bias, sensationalism, and scandal-mongering. 3 Those doing the complaining have easy targets. Economic incentives lead local newscasts to focus on fires, crimes, and plane crashes. 4 Network news narratives, particularly in the political arena, are often driven by the whiff of scandal or employ sports metaphors like the "horse race." 5 Politicians pitch their appeals on MTV, soliciting viewers suspected of having attention spans of a nanosecond. Not suprisingly, public confidence in traditional journalism is at a low ebb. 6 New evidence suggests that even journalists themselves are dissatisfied with their news organizations' effectiveness in informing the public. 7 At the same time, commentators increasingly perceive traditional approaches to the First Amendment as ripe for examination. On the one hand, elite law reviews abound with challenges to libertarian interpretations of the Free Speech Clause. 8 On the other hand, expansive free speech language marks both recent Supreme Court opinions 9 and scholarly critiques of the calls for "positive" interpretations of the First Amendment. 10 Since the 1980s, market-based deregulatory arguments have convinced the Federal Communications Commission to revise many of its regulations of broadcast licensees in order to bring the broadcast medium into greater First Amendment parity with the assertedly freer print press. 11 For these ..
    • 

    corecore