774,594 research outputs found
The food environment within the primary school fringe
Purpose – The school fringe environment (peripheral 400m buffer) offers an important opportunity for young people to obtain food and drink. There is international evidence to suggest socio-economic influence on food outlet availability and healthfulness within these environments; however the situation in the UK is unclear. The purpose of this paper is to describe food outlet provision (frequency and type) within primary school fringes across the spectrum of deprivation. Design/methodology/approach – Ten primary schools in Newcastle upon Tyne were purposefully selected from a comprehensive list of all schools within the region. Two schools were chosen at random from each quintile of deprivation. A total of 400-metre buffer zones around schools were audited. School fringe food environments were classified using a Food Outlet Classification System. Access (i.e. frequency), and type of food outlets were compared to area level deprivation, obesity prevalence rates and area type. Findings – Food outlet frequency was highest in the most deprived school fringe area. Convenience stores and takeaways represented the greatest proportion of total food outlets across all school fringe environments. More total food outlets were observed in fringes with above national average obesity prevalence rates for children. Research limitations/implications – UK case study approach limits widespread and international applicability. Practical implications – Informs school, health and urban planning disciplines regarding current picture of UK school fringes. Originality/value – Provides evidence in UK context that area deprivation and Census 2001 Supergroup class show significant correlations with school fringe food environment
ESPOON: Enforcing Security Policies In Outsourced Environments
Data outsourcing is a growing business model offering services to individuals
and enterprises for processing and storing a huge amount of data. It is not
only economical but also promises higher availability, scalability, and more
effective quality of service than in-house solutions. Despite all its benefits,
data outsourcing raises serious security concerns for preserving data
confidentiality. There are solutions for preserving confidentiality of data
while supporting search on the data stored in outsourced environments. However,
such solutions do not support access policies to regulate access to a
particular subset of the stored data.
For complex user management, large enterprises employ Role-Based Access
Controls (RBAC) models for making access decisions based on the role in which a
user is active in. However, RBAC models cannot be deployed in outsourced
environments as they rely on trusted infrastructure in order to regulate access
to the data. The deployment of RBAC models may reveal private information about
sensitive data they aim to protect. In this paper, we aim at filling this gap
by proposing \textbf{} for enforcing RBAC policies in
outsourced environments. enforces RBAC policies in an
encrypted manner where a curious service provider may learn a very limited
information about RBAC policies. We have implemented
and provided its performance evaluation showing a limited overhead, thus
confirming viability of our approach.Comment: The final version of this paper has been accepted for publication in
Elsevier Computers & Security 2013. arXiv admin note: text overlap with
arXiv:1306.482
Ad hoc categories
People construct ad hoc categories to achieve goals. For example, constructing the category of “things to sell at a garage sale” can be instrumental to achieving the goal of selling unwanted possessions. These categories differ from common categories (e.g., “fruit,” “furniture”) in that ad hoc categories violate the correlational structure of the environment and are not well established in memory. Regarding the latter property, the category concepts, concept-to-instance associations, and instance-to-concept associations structuring ad hoc categories are shown to be much less established in memory than those of common categories. Regardless of these differences, however, ad hoc categories possess graded structures (i.e., typicality gradients) as salient as those structuring common categories. This appears to be the result of a similarity comparison process that imposes graded structure on any category regardless of type
A Flexible and Fast Event-Driven Simulator for wireless MAC protocols
Many multiple-access (MAC) protocols have been or are being proposed for wireless networks. As most of these multiple-access protocols are designed for specific applications (such as telephony) and analyzed accordingly, the analysis results can not always be adapted to situations where each user has a different behavior. Wireless MAC protocols for data communication are not straightforward to analyse. To quickly make a reliable judgement of the usability of a MAC protocol for specific situations, we designed a simulator that makes it simple to implement the protocol and test it in different configurations and with differently behaving users. Our simulator generates a large amount of quantitative performance information that can be processed with standard graph drawing tools and an integrated trace analyze
- …