10,353 research outputs found

    volume 25, no. 1 (Spring 2018)

    Get PDF

    volume 14, no. 2 (Summer 2009)

    Get PDF

    Privacy, security, and trust issues in smart environments

    Get PDF
    Recent advances in networking, handheld computing and sensor technologies have driven forward research towards the realisation of Mark Weiser's dream of calm and ubiquitous computing (variously called pervasive computing, ambient computing, active spaces, the disappearing computer or context-aware computing). In turn, this has led to the emergence of smart environments as one significant facet of research in this domain. A smart environment, or space, is a region of the real world that is extensively equipped with sensors, actuators and computing components [1]. In effect the smart space becomes a part of a larger information system: with all actions within the space potentially affecting the underlying computer applications, which may themselves affect the space through the actuators. Such smart environments have tremendous potential within many application areas to improve the utility of a space. Consider the potential offered by a smart environment that prolongs the time an elderly or infirm person can live an independent life or the potential offered by a smart environment that supports vicarious learning

    Report from GI-Dagstuhl Seminar 16394: Software Performance Engineering in the DevOps World

    Get PDF
    This report documents the program and the outcomes of GI-Dagstuhl Seminar 16394 "Software Performance Engineering in the DevOps World". The seminar addressed the problem of performance-aware DevOps. Both, DevOps and performance engineering have been growing trends over the past one to two years, in no small part due to the rise in importance of identifying performance anomalies in the operations (Ops) of cloud and big data systems and feeding these back to the development (Dev). However, so far, the research community has treated software engineering, performance engineering, and cloud computing mostly as individual research areas. We aimed to identify cross-community collaboration, and to set the path for long-lasting collaborations towards performance-aware DevOps. The main goal of the seminar was to bring together young researchers (PhD students in a later stage of their PhD, as well as PostDocs or Junior Professors) in the areas of (i) software engineering, (ii) performance engineering, and (iii) cloud computing and big data to present their current research projects, to exchange experience and expertise, to discuss research challenges, and to develop ideas for future collaborations

    Southeastern Law Librarian Summer 2016

    Get PDF

    15th Annual HIGHER Ground Women\u27s Leadership Conference Booklet

    Get PDF
    The practice of leadership is most often understood within the context of relationships inside organizations and institutions. The boundaries that dictated our lives months before have all but dissolved, prompting the need to reconsider our definition of leadership, where it takes place, and who controls it. Circumstances and opportunities have required women to readjust their expectations and what is expected of them. While the past 18-months took a physical, emotional, social, and political toll on many families, it has also provided a moment for reflection, resignation, recovery, and reimagination of what our lives could be beyond this moment. It has forced a shift in our notion of leadership and allowed us to reconsider our roles and worth at home and work. Opportunities have emerged from an uncertain environment for leaders to reflect on how we capitalize on the leadershifts that have transpired over the last year to pivot forward

    Communicating for Policy Change

    Get PDF
    Synthesizes information from a November 2006 GIH Issue Dialogue meeting that explored communications theories and techniques and their application to policy work

    Shinren : Non-monotonic trust management for distributed systems

    Get PDF
    The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust management which utilises the notion of trust in order to specify and interpret security policies and make decisions on security-related actions. Most trust management systems assume monotonicity where additional information can only result in the increasing of trust. The monotonic assumption oversimplifies the real world by not considering negative information, thus it cannot handle many real world scenarios. In this paper we present Shinren, a novel non-monotonic trust management system based on bilattice theory and the anyworld assumption. Shinren takes into account negative information and supports reasoning with incomplete information, uncertainty and inconsistency. Information from multiple sources such as credentials, recommendations, reputation and local knowledge can be used and combined in order to establish trust. Shinren also supports prioritisation which is important in decision making and resolving modality conflicts that are caused by non-monotonicity
    • …
    corecore