10 research outputs found

    Preface

    Get PDF
    Originating from the need stressed by several scholars to devote more research to the complex relationship between the local food producers and processors on the one hand and the tourist industry on the other, this book aims to build a bridge between these two realities. Having practised fruitful research cooperation on farm tourism between the Universities of G\uf6ttingen and Bologna for several years, the editors of this book aim to broaden the scope of both the involved universities and the research streams. To this purpose, in December 2009, a conference on \u201cFood, Agri-Culture and Tourism\u201d took place in G\uf6ttingen under the aegis of the DIH (Deutsch-Italienische Hochschulzentrum) and the DAAD (Deutscher Akademischer Austausch Dienst). This book comprises the work presented at this event as well as combining further results and best practice case studies from scholars and practitioners from more than eleven universities. To this purpose, the book has an interdisciplinary approach. Regarding the structure, there are three main sections. The first part is entitled \u201cFarm and rural tourism\u201d and analyzes the tourist sector in many European countries. Stockebrand, Sidali and Spiller compare different communication styles to promote high-quality food in German farm tourism. Regoli, Vittuari and Segr\ue8 focus their analysis on the recent evolution of rural and farm tourism in Romania. Finally, Bianchi offers a diachronical overview of agritourism in the context of the common agricultural policy and comments on the Italian law No. 96/2006 which is entirely dedicated to the promotion of agritourism. As the title already suggests, the second part of the book links the topic of farm and rural tourism with the sector of food and wine. As shown by Canavari et al. farm operators who tailor educational activities for school groups can make an important contribution to improve the nutritional habits of these young farm guests. Dreyer and M\ufcller claim that cooperative marketing can display economic benefits also at a regional level, using the example of the synergies established between tourist operators and wine makers in the region of Saale-Unstrut. Thus, the challenges posed by the rapidly changing behaviour of customers seem to be well managed by farmers who are eager to try new ways to attract guests and appreciate acting together. Creativity is another important driver of success, as it is shown in the best-practice described by Sch\ue4tzel, Arens and Sch\ue4tzel. Buiatti stresses the important role of other intermediaries, such as the Slow Food Association, who mediate between individuals and farmers. The latter in fact often ignore the new sensitivity of customers for a more sustainable and authentic way of food production. Other strategies for helping farmers to better profile their oeno-gastronomical offer as a unique selling proposition are discussed in section three which is entitled \u201cNew avenues of research: online marketing and sensory analysis\u201d. While Gyau and Stringer as well as Fuchs and H\uf6pken show the pros and cons of adopting emarketing strategies in the farm and rural hospitality industry, Santini, Cavicchi and Canavari as well as Scharf focus on the growing importance of sensory analysis for better identification of market-segments based on their sensory attributes. Hence, as stressed by Telfer and Wall in 1996 \u201crelationships between tourism and food production can be placed on a continuum ranging from conflict through coexistence to symbiosis\u201d. This book claims, more than 10 years later, that above all rural and farm tourism has proven to be an example of such a symbiotic relationship between tourism and the food industr

    Self-stabilizing TDMA Algorithms for Wireless Ad-hoc Networks without External Reference

    Full text link
    Time division multiple access (TDMA) is a method for sharing communication media. In wireless communications, TDMA algorithms often divide the radio time into timeslots of uniform size, ξ\xi, and then combine them into frames of uniform size, τ\tau. We consider TDMA algorithms that allocate at least one timeslot in every frame to every node. Given a maximal node degree, δ\delta, and no access to external references for collision detection, time or position, we consider the problem of collision-free self-stabilizing TDMA algorithms that use constant frame size. We demonstrate that this problem has no solution when the frame size is τ<max{2δ,χ2}\tau < \max\{2\delta,\chi_2\}, where χ2\chi_2 is the chromatic number for distance-22 vertex coloring. As a complement to this lower bound, we focus on proving the existence of collision-free self-stabilizing TDMA algorithms that use constant frame size of τ\tau. We consider basic settings (no hardware support for collision detection and no prior clock synchronization), and the collision of concurrent transmissions from transmitters that are at most two hops apart. In the context of self-stabilizing systems that have no external reference, we are the first to study this problem (to the best of our knowledge), and use simulations to show convergence even with computation time uncertainties

    Recovery based time synchronization for wireless networks

    Get PDF
    Time synchronization schemes in Wireless Sensor Net-works have been subjected to various security threats and attacks. In this paper we throw light on some of these at-tacks. Nevertheless we are more concerned with the pulse delay attack which cannot be countered using any of the cryptographic techniques. We propose an algorithm called Resync algorithm which not only detects the delay attack but also aims to rectify the compromised node and intro-duce it back in the network for the synchronization process. In-depth analysis has been done in terms of the rate of suc-cess achieved in detecting multiple outliers ie nodes under attack and the level of accuracy obtained in the offset values after running the Resync algorithm

    Secure Precise Clock Synchronization for Interconnected Body Area Networks

    Get PDF
    Secure time synchronization is a paramount service for wireless sensor networks (WSNs) constituted by multiple interconnected body area networks (BANs). We propose a novel approach to securely and efficiently synchronize nodes at BAN level and/or WSN level. Each BAN develops its own notion of time. To this effect, the nodes of a BAN synchronize with their BAN controller node. Moreover, controller nodes of different BANs cooperate to agree on a WSN global and/or to transfer UTC time. To reduce the number of exchanged synchronization messages, we use an environmental-aware time prediction algorithm. The performance analysis in this paper shows that our approach exhibits very advanced security, accuracy, precision, and low-energy trade-off. For comparable precision, our proposal outstands related clock synchronization protocols in energy efficiency and risk of attacks. These results are based on computations

    Secure and Self-Stabilizing Clock Synchronization in Sensor Networks

    No full text
    Contains fulltext : 36446.pdf (publisher's version ) (Closed access

    Secure and Self-Stabilizing Clock Synchronization in Sensor Networks

    No full text
    In sensor networks, correct clocks have arbitrary starting offsetsand nondeterministic fluctuating skews. We consider an adversarythat aims at tampering with the clock synchronization by interceptingmessages, replaying intercepted messages (after the adversary’s choiceof delay), and capturing nodes (i.e., revealing their secret keys and impersonatingthem). We present the first self-stabilizing algorithm for secureclock synchronization in sensor networks that is resilient to suchan adversary’s attacks. Our algorithm tolerates random media noise,guarantees with high probability efficient communication overheads, andfacilitates a variety of masking techniques against pulse-delay attacks inthe presence of captured nodes

    Secure and Self-Stabilizing Clock Synchronization in Sensor Networks

    No full text
    Abstract. In sensor networks, correct clocks have arbitrary starting offsets and nondeterministic fluctuating skews. We consider an adversary that aims at tampering with the clock synchronization by intercepting messages, replaying intercepted messages (after the adversary’s choice of delay), and capturing nodes (i.e., revealing their secret keys and impersonating them). We present the first self-stabilizing algorithm for secure clock synchronization in sensor networks that is resilient to such an adversary’s attacks. Our algorithm tolerates random media noise, guarantees with high probability efficient communication overheads, and facilitates a variety of masking techniques against pulse-delay attacks in the presence of captured nodes
    corecore