29 research outputs found

    A Critical Examination of the Climate Change Vulnerability and Adaptation Literature in Nunavut, Canada

    Get PDF
    This paper attempts to study the climate change vulnerability and adaptation literature in Nunavut, a province in the Canadian Arctic. The paper begins with a review of literature produced by Inuit organizations on colonization in the Canadian Arctic and Nunavut specifically, then systematically reviews the literature on climate change vulnerability and adaptation. Using a post-colonial analysis, this study found that while the climate change vulnerability and adaptation literature attempts to attend to colonial histories and legacies, it often falls short. Climate change vulnerability and adaptation literature had minimal representation of colonization, residential schooling, sanatoria, and Inuit Qaujimajatuqangit. This may perpetuate unequal power relationships between researchers and participants, and can potentially lead to maladaptation. The literature references mining and shipping more often, however they rarely mention or attempt to quantify the vulnerabilities these activities pose to communities in the Canadian North. The paper ends with recommendations for future research

    A fast and accurate energy source emulator for wireless sensor networks

    Get PDF
    The capability to either minimize energy consumption in battery-operated devices, or to adequately exploit energy harvesting from various ambient sources, is central to the development and engineering of energy-neutral wireless sensor networks. However, the design of effective networked embedded systems targeting unlimited lifetime poses several challenges at different architectural levels. In particular, the heterogeneity, the variability, and the unpredictability of many energy sources, combined to changes in energy required by powered devices, make it difficult to obtain reproducible testing conditions, thus prompting the need of novel solutions addressing these issues. This paper introduces a novel embedded hardware-software solution aimed at emulating a wide spectrum of energy sources usually exploited to power sensor networks motes. The proposed system consists of a modular architecture featuring small factor form, low power requirements, and limited cost. An extensive experimental characterization confirms the validity of the embedded emulator in terms of flexibility, accuracy, and latency while a case study about the emulation of a lithium battery shows that the hardware-software platform does not introduce any measurable reduction of the accuracy of the model. The presented solution represents therefore a convenient solution for testing large-scale testbeds under realistic energy supply scenarios for wireless sensor networks

    On bisimulations for the asynchronous π-calculus

    Get PDF
    AbstractThe asynchronous π-calculus is a variant of the π-calculus where message emission is non-blocking. Honda and Tokoro have studied a semantics for this calculus based on bisimulation. Their bisimulation relies on a modified transition system where, at any moment, a process can perform any input action.In this paper we propose a new notion of bisimulation for the asynchronous π-calculus, defined on top of the standard labelled transition system. We give several characterizations of this equivalence including one in terms of Honda and Tokoro's bisimulation, and one in terms of barbed equivalence. We show that this bisimulation is preserved by name substitutions, hence by input prefix. Finally, we give a complete axiomatization of the (strong) bisimulation for finite terms

    Pratiques informationnelles en physique des particules

    Get PDF
    La physique des hautes énergies est une discipline qui vise à découvrir les constituants de la matière et comprendre leurs interactions. Elle compte environ 30 000 chercheurs dans différents instituts de recherche et universités répartis dans le monde et constitue une petite communauté scientifique qui possède une culture internationale et collaborative très marquée. D’autres particularités propres à cette communauté l’ont conduite à développer des pratiques informationnelles spécifiques. Ell..

    Generic Distribution Support for Programming Systems

    Get PDF
    This dissertation provides constructive proof, through the implementation of a middleware, that distribution transparency is practical, generic, and extensible. Fault tolerant distributed services can be developed by using the failure detection abilities of the middleware. By generic we mean that the middleware can be used for many different programming languages and paradigms. Distribution for each kind of language entity is done in terms of consistency protocols, which guarantee that the semantics of the entities are preserved in a distributed setting. The middleware allows new consistency protocols to be added easily. The efficiency of the middleware and the ease of integration are shown by coupling the middleware to a programming system, which encompasses the object oriented, the functional, and the concurrent-declarative programming paradigms. Our measurements show that the distribution middleware is competitive with the most popular distributed programming systems (JavaRMI, .NET, IBM CORBA)

    Exploring Potential 6LoWPAN Traffic Side Channels.

    Get PDF
    The Internet of Things (IoT) has become a reality: small connected devices feature in everyday objects including childrens’ toys, TVs, fridges, heating control units, etc. Supply chains feature sensors throughout, and significant investments go into researching next-generation healthcare, where sensors monitor wellbeing. A future in which sensors and other (small) devices interact to create sophisticated applications seems just around the corner. All of these applications have a fundamental need for security and privacy and thus cryptography is deployed as part of an attempt to secure them. In this paper we explore a particular type of flaw, namely side channel information, on the protocol level that can exist despite the use of cryptography. Our research investigates the potential for utilising packet length and timing information (both are easily obtained) to extract interesting information from a system. We find that using these side channels we can distinguish between devices, different programs running on the same device including which sensor is accessed. We also find it is possible to distinguish between different types of ICMP messages despite the use of encryption. Based on our findings, we provide a set of recommendations to efficiently mitigate these side channels in the IoT context.</p

    Utilizando LOTOS na concepção formal de uma aplicação para gerência de redes : Especificação e verificação

    Get PDF
    Este trabalho apresenta um estudo sobre a aplicação da técnica de descrição formal LOTOS na concepção formal de um sistema para gerência de redes denominado Gateway CMIP-SNMP. São apresentados os resultados obtidos durante o trabalho de descrição formal do sistema em LOTOS e durante o desenvolvimento das tarefas de análise, simulação, teste e verificação. Devido ao uso de dados, principalmente para a tarefa de verificação, variadas restrições são impostas pelas ferramentas utilizadas. Tais restrições são abordadas segundo as capacidades e incompatibilidades dessas ferramentas.This work presents a study about the application of the LOTOS formal description technique on the formal conception of a network management system called CMIP-SNMP Gateway. The results reached during the work of the formal description of system using full LOTOS, and during the development of analysis, simutation, test and verification of the specification, are presents. With the use of abstract data types, mostly to the verification task, the tolls presented restrictions. These restrictions are approached by their capacities and incompatibilities.Eje: Procesamiento distribuido y paralelo. Tratamiento de señalesRed de Universidades con Carreras en Informática (RedUNCI

    Utilizando LOTOS na concepção formal de uma aplicação para gerência de redes : Especificação e verificação

    Get PDF
    Este trabalho apresenta um estudo sobre a aplicação da técnica de descrição formal LOTOS na concepção formal de um sistema para gerência de redes denominado Gateway CMIP-SNMP. São apresentados os resultados obtidos durante o trabalho de descrição formal do sistema em LOTOS e durante o desenvolvimento das tarefas de análise, simulação, teste e verificação. Devido ao uso de dados, principalmente para a tarefa de verificação, variadas restrições são impostas pelas ferramentas utilizadas. Tais restrições são abordadas segundo as capacidades e incompatibilidades dessas ferramentas.This work presents a study about the application of the LOTOS formal description technique on the formal conception of a network management system called CMIP-SNMP Gateway. The results reached during the work of the formal description of system using full LOTOS, and during the development of analysis, simutation, test and verification of the specification, are presents. With the use of abstract data types, mostly to the verification task, the tolls presented restrictions. These restrictions are approached by their capacities and incompatibilities.Eje: Procesamiento distribuido y paralelo. Tratamiento de señalesRed de Universidades con Carreras en Informática (RedUNCI
    corecore