71 research outputs found

    Report on the Dagstuhl Seminar on Visualization and Monitoring of Network Traffic

    Get PDF
    The Dagstuhl Seminar on Visualization and Monitoring of Network Traffic took place May 17-20, 2009 in Dagstuhl, Germany. Dagstuhl seminars promote personal interaction and open discussion of results as well as new ideas. Unlike at most conferences, the focus is not solely on the presentation of established results but also, and in equal parts, to presentation of results, ideas, sketches, and open problems. The aim of this particular seminar was to bring together experts from the information visualization community and the networking community in order to discuss the state of the art of monitoring and visualization of network traffic. People from the different research communities involved jointly organized the seminar. The co-chairs of the seminar from the networking community were Aiko Pras (University of Twente) and Jürgen Schönwälder (Jacobs University Bremen). The co-chairs from the visualization community were Daniel A. Keim (University of Konstanz) and Pak Chung Wong (Pacific Northwest National Laboratory). Florian Mansmann (University of Konstanz) helped with producing this report. The seminar was organized and supported by Schloss Dagstuhl and the European Network of Excellence for the Management of Internet Technologies and Complex Systems (EMANICS)

    Scenario-Based Design Theorizing:The Case of a Digital Idea Screening Cockpit

    Get PDF
    As ever more companies encourage employees to innovate, a surplus of ideas has become reality in many organizations – often exceeding the available resources to execute them. Building on insights from a literature review and a 3-year collaboration with a banking software provider, the paper suggests a Digital Idea Screening Cockpit (DISC) to address this challenge. Following a design science research approach, it suggests a prescriptive design theory that provides practitioner-oriented guidance for implementing a DISC. The study shows that, in order to facilitate the assessment, selection, and tracking of ideas for different stakeholders, such a system needs to play a dual role: It needs to structure decision criteria and at the same be flexible to allow for creative expression. Moreover, the paper makes a case for scenario-based design theorizing by developing design knowledge via scenarios

    Cross-Fadings of Racialisation and Migratisation: The Postcolonial Turn in Western European Gender and Migration Studies

    Get PDF
    Looking at feminist and anti-racist approaches situated in or focused on Western Europe, especially Germany, this article investigates how racism and migration can be theorised in relation to each other in critical knowledge production. Rather than being an article ‘about Germany’, my intervention understands the German context as an exemplary place for deconstructing Europe and its gendered, racialised and sexualised premises. I argue that a ‘postcolonial turn’ has begun to emerge in Western European gender and migration studies and is questioning easy assumptions about the connections between racism and migration. Discussing examples from academic knowledge production and media debates, I suggest to think of migratisation (the ascription of migration) as performative practice that repeatedly re-stages a sending-off to an elsewhere and works in close interaction with racialisation. In particular, drawing on postcolonial approaches, I carve out the interconnection of racialisation and migratisation with class and gender. I argue that equating racialisation with migratisation carries the risk of whitening understandings of migration and/or reinforcing already whitened understandings of nation and Europeanness. To make discrimination ‘accessible’ to critical knowledge production, I engage in an epistemological discussion of the potentials and challenges of differentiating analytical categorisations. With this, this article engages with ascriptions, exclusions and abjectifications and attempts to formulate precise conceptualisations for the ever shifting forms of resistance we urgently need in transnational feminist activism and knowledge productio

    Understanding support for immigrant political representation: evidence from German cities

    No full text
    Immigrant-origin residents are under-represented in many West European legislatures, and this is often seen as a problem for democratic legitimacy. Yet little is known about the level of demand for immigrant-origin political representation, whether among immigrant-origin residents or among non-migrants. We present new evidence from surveys in German cities, and examine factors that may explain variation in the desire for migrant-origin political representation. We show that there is considerable support, both among those with and among those without immigrant backgrounds. However, this is not always linked to a voting preference for migrant-origin candidates. Support for migrant-origin political representation turns out to be a multifaceted phenomenon. In order to understand support for the political representation of migrant-origin residents, scholars need to look beyond migrant-origin voters. Our results also suggest that scholars should study the issue of migrant-origin political representation in the context of wider conflicts over cosmopolitan versus nationalist values, and inclusive versus exclusive political institutions

    Appui au développement des productions fruitiÚres

    Full text link
    Bilan sur l'évolution des superficies plantées, le développement de la lutte intégrée en verger et la commercialisation des fruit

    Multiple Authentications With a Nonce-Based Protocol Using Generalized Timestamps

    No full text
    The Kerberos authentication service, a part of MIT's Project Athena, is based on the Needham and Schroeder protocol. Timestamps depending on reliable synchronized clocks are used to guarantee the freshness of messages. As an improvement, we present a nonce-based protocol offering the same features as Kerberos. We generate a ticket in an initial message exchange which includes a generalized timestamp. Checking this generalized timestamp is left to the principal who created it. Consequently we do not need synchronized clocks. Our protocol has the property of using a minimal number of messages to establish an authenticated session key. Keywords: Security, Authentication, Kerberos 1 Introduction In computer networks and distributed computing systems a mechanism is needed to provide secure communication. To trust the identity of each other, two principals must run a procedure resulting in mutual authentication. Key distribution protocols establish secret authenticated session keys using c..

    Visualization and Monitoring of Network Traffic : Executive Summary

    No full text
    The seamless operation of the Internet requires being able to monitor and visualize the actual behaviour of the network. Today, IP network operators usually collect network flow statistics from critical points of their network infrastructure. Flows aggregate packets that share common properties. Flow records are stored and analyzed to extract accounting information and increasingly to identify and isolate network problems or security incidents. While network problems or attacks significantly changing traffic patterns are relatively easy to identify, it tends to be much more challenging to identify creeping changes or attacks and faults that manifest themselves only by very careful analysis of initially seemingly unrelated traffic pattern and their changes. There are currently no deployable good solutions and research in this area is just starting. In addition, the large volume of flow data on high capacity networks and exchange points requires to move to probabilistic sampling techniques, which require new analysis techniques to calculate and also visualize the uncertainty attached to data sets
    • 

    corecore