83,575 research outputs found

    Reconfigurable mobile communications: compelling needs and technologies to support reconfigurable terminals

    Get PDF

    SecMon: End-to-End Quality and Security Monitoring System

    Get PDF
    The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however, these features are usually optional and supported by limited number of implementations. As a result, the lack of mandatory and widely applicable QoS and security guaranties makes the contemporary VoIP systems vulnerable to attacks and network disturbances. In this paper we are facing these issues and propose the SecMon system, which simultaneously provides a lightweight security mechanism and improves quality parameters of the call. SecMon is intended specially for VoIP service over P2P networks and its main advantage is that it provides authentication, data integrity services, adaptive QoS and (D)DoS attack detection. Moreover, the SecMon approach represents a low-bandwidth consumption solution that is transparent to the users and possesses a self-organizing capability. The above-mentioned features are accomplished mainly by utilizing two information hiding techniques: digital audio watermarking and network steganography. These techniques are used to create covert channels that serve as transport channels for lightweight QoS measurement's results. Furthermore, these metrics are aggregated in a reputation system that enables best route path selection in the P2P network. The reputation system helps also to mitigate (D)DoS attacks, maximize performance and increase transmission efficiency in the network.Comment: Paper was presented at 7th international conference IBIZA 2008: On Computer Science - Research And Applications, Poland, Kazimierz Dolny 31.01-2.02 2008; 14 pages, 5 figure

    Checks And Balances: 2015 Update

    Get PDF
    Checking accounts are a vital financial tool, utilized by 9 in 10 American households. This report provides the third annual evaluation of disclosure, overdraft, and dispute resolution policies and practices of 45 of the nation's 50 largest retail banks, totaling 66 percent of all domestic deposit volume. Pew's Model Summary Disclosure Box for Checking Accounts served as the template for rating each bank's disclosure documents to determine best or good practices for overdraft and dispute resolution. Additionally, this report identified trends among the 32 institutions examined in all three Checks and Balances reports to date. To ensure that all checking accounts are safe and transparent, Pew has also developed a set of policy recommendations and urges the Consumer Financial Protection Bureau to incorporate these policies in new rules on overdraft practices and arbitration clauses

    Unified radio and network control across heterogeneous hardware platforms

    Get PDF
    Experimentation is an important step in the investigation of techniques for handling spectrum scarcity or the development of new waveforms in future wireless networks. However, it is impractical and not cost effective to construct custom platforms for each future network scenario to be investigated. This problem is addressed by defining Unified Programming Interfaces that allow common access to several platforms for experimentation-based prototyping, research, and development purposes. The design of these interfaces is driven by a diverse set of scenarios that capture the functionality relevant to future network implementations while trying to keep them as generic as possible. Herein, the definition of this set of scenarios is presented as well as the architecture for supporting experimentation-based wireless research over multiple hardware platforms. The proposed architecture for experimentation incorporates both local and global unified interfaces to control any aspect of a wireless system while being completely agnostic to the actual technology incorporated. Control is feasible from the low-level features of individual radios to the entire network stack, including hierarchical control combinations. A testbed to enable the use of the above architecture is utilized that uses a backbone network in order to be able to extract measurements and observe the overall behaviour of the system under test without imposing further communication overhead to the actual experiment. Based on the aforementioned architecture, a system is proposed that is able to support the advancement of intelligent techniques for future networks through experimentation while decoupling promising algorithms and techniques from the capabilities of a specific hardware platform

    The UK National Health Service’s 'innovation agenda': lessons on commercialization and trust

    Get PDF
    The UK National Health Service (the 'NHS'), encouraged by the 2011 report Innovation Health and Wealth, Accelerating Adoption and Diffusion in the NHS, and empowered by the Health and Social Care Act 2012, is in the process of adopting a new agenda for stimulating innovation in healthcare. For this, the bodies, body materials, and confidential health information of NHS patients may be co-opted. We explain why this brings the NHS into a moral conflict with its basic goal of providing a universal healthcare service. Putting NHS databases at the disposal of industry, without addressing ethical concerns regarding the privacy, autonomy, and moral integrity of patients and without requiring a 'kick-back' to enhance the service that the NHS provides, is inappropriate. As this article shows, with reference to the commercial arena of direct-to-consumer genetic testing, it is crucial that patient and public trust in the NHS is not eroded

    Mining Knowledge in Astrophysical Massive Data Sets

    Full text link
    Modern scientific data mainly consist of huge datasets gathered by a very large number of techniques and stored in very diversified and often incompatible data repositories. More in general, in the e-science environment, it is considered as a critical and urgent requirement to integrate services across distributed, heterogeneous, dynamic "virtual organizations" formed by different resources within a single enterprise. In the last decade, Astronomy has become an immensely data rich field due to the evolution of detectors (plates to digital to mosaics), telescopes and space instruments. The Virtual Observatory approach consists into the federation under common standards of all astronomical archives available worldwide, as well as data analysis, data mining and data exploration applications. The main drive behind such effort being that once the infrastructure will be completed, it will allow a new type of multi-wavelength, multi-epoch science which can only be barely imagined. Data Mining, or Knowledge Discovery in Databases, while being the main methodology to extract the scientific information contained in such MDS (Massive Data Sets), poses crucial problems since it has to orchestrate complex problems posed by transparent access to different computing environments, scalability of algorithms, reusability of resources, etc. In the present paper we summarize the present status of the MDS in the Virtual Observatory and what is currently done and planned to bring advanced Data Mining methodologies in the case of the DAME (DAta Mining & Exploration) project.Comment: Pages 845-849 1rs International Conference on Frontiers in Diagnostics Technologie
    • 

    corecore