71 research outputs found
Report on the Dagstuhl Seminar on Visualization and Monitoring of Network Traffic
The Dagstuhl Seminar on Visualization and Monitoring of Network Traffic took place May 17-20, 2009 in Dagstuhl, Germany. Dagstuhl seminars promote personal interaction and open discussion of results as well as new ideas. Unlike at most conferences, the focus is not solely on the presentation of established results but also, and in equal parts, to presentation of results, ideas, sketches, and open problems. The aim of this particular seminar was to bring together experts from the information visualization community and the networking community in order to discuss the state of the art of monitoring and visualization of network traffic. People from the different research communities involved jointly organized the seminar. The co-chairs of the seminar from the networking community were Aiko Pras (University of Twente) and JuÌrgen SchoÌnwaÌlder (Jacobs University Bremen). The co-chairs from the visualization community were Daniel A. Keim (University of Konstanz) and Pak Chung Wong (Pacific Northwest National Laboratory). Florian Mansmann (University of Konstanz) helped with producing this report. The seminar was organized and supported by Schloss Dagstuhl and the European Network of Excellence for the Management of Internet Technologies and Complex Systems (EMANICS)
Recommended from our members
At the extremes of exclusion: Deportation, detention and dispersal
Deportation, detention and dispersal have formed an occasional part of Britain's migration regime throughout the twentieth century, though they tended to be used in response to particular events or âcrisesâ. By the end of the twentieth century, however, deportation, detention and, most recently, dispersal have become ânormalizedâ, âessentialâ instruments in the ongoing attempt to control or manage immigration to Britain. This article outlines the use of detention, deportation and dispersal in the twentieth century exploring how they have evolved and then become an integral part of the migration regime into the twenty-first century. Where appropriate, British practices are compared with those of its European neighbours, where to differing degrees, deportation, detention and dispersal have also become everyday practices. In examining these practices in Britain, we consider the rationale and stated aims of their employment, as well as describing some of the consequences, where known, of detention, deportation and dispersal
Scenario-Based Design Theorizing:The Case of a Digital Idea Screening Cockpit
As ever more companies encourage employees to innovate, a surplus of ideas has become reality in many organizations â often exceeding the available resources to execute them. Building on insights from a literature review and a 3-year collaboration with a banking software provider, the paper suggests a Digital Idea Screening Cockpit (DISC) to address this challenge. Following a design science research approach, it suggests a prescriptive design theory that provides practitioner-oriented guidance for implementing a DISC. The study shows that, in order to facilitate the assessment, selection, and tracking of ideas for different stakeholders, such a system needs to play a dual role: It needs to structure decision criteria and at the same be flexible to allow for creative expression. Moreover, the paper makes a case for scenario-based design theorizing by developing design knowledge via scenarios
Cross-Fadings of Racialisation and Migratisation: The Postcolonial Turn in Western European Gender and Migration Studies
Looking at feminist and anti-racist approaches situated in or focused on Western Europe, especially Germany, this article investigates how racism and migration can be theorised in relation to each other in critical knowledge production. Rather than being an article âabout Germanyâ, my intervention understands the German context as an exemplary place for deconstructing Europe and its gendered, racialised and sexualised premises. I argue that a âpostcolonial turnâ has begun to emerge in Western European gender and migration studies and is questioning
easy assumptions about the connections between racism and migration. Discussing examples from academic knowledge production and media debates, I suggest to think of migratisation (the ascription of migration) as performative practice that repeatedly re-stages a sending-off to an elsewhere and works in close interaction with racialisation. In particular, drawing on postcolonial approaches, I carve out the interconnection of racialisation and migratisation with class and gender. I argue that equating racialisation with migratisation carries the risk of whitening understandings of migration and/or reinforcing already whitened understandings of nation and Europeanness. To make discrimination
âaccessibleâ to critical knowledge production, I engage in an epistemological discussion of the potentials and challenges of differentiating analytical categorisations. With this, this article engages with ascriptions, exclusions and abjectifications and attempts to formulate precise conceptualisations for the ever shifting forms of resistance we urgently need in transnational feminist activism and knowledge productio
Understanding support for immigrant political representation: evidence from German cities
Immigrant-origin residents are under-represented in many West European legislatures, and this is often seen as a problem for democratic legitimacy. Yet little is known about the level of demand for immigrant-origin political representation, whether among immigrant-origin residents or among non-migrants. We present new evidence from surveys in German cities, and examine factors that may explain variation in the desire for migrant-origin political representation. We show that there is considerable support, both among those with and among those without immigrant backgrounds. However, this is not always linked to a voting preference for migrant-origin candidates. Support for migrant-origin political representation turns out to be a multifaceted phenomenon. In order to understand support for the political representation of migrant-origin residents, scholars need to look beyond migrant-origin voters. Our results also suggest that scholars should study the issue of migrant-origin political representation in the context of wider conflicts over cosmopolitan versus nationalist values, and inclusive versus exclusive political institutions
Appui au développement des productions fruitiÚres
Bilan sur l'évolution des superficies plantées, le développement de la lutte intégrée en verger et la commercialisation des fruit
Multiple Authentications With a Nonce-Based Protocol Using Generalized Timestamps
The Kerberos authentication service, a part of MIT's Project Athena, is based on the Needham and Schroeder protocol. Timestamps depending on reliable synchronized clocks are used to guarantee the freshness of messages. As an improvement, we present a nonce-based protocol offering the same features as Kerberos. We generate a ticket in an initial message exchange which includes a generalized timestamp. Checking this generalized timestamp is left to the principal who created it. Consequently we do not need synchronized clocks. Our protocol has the property of using a minimal number of messages to establish an authenticated session key. Keywords: Security, Authentication, Kerberos 1 Introduction In computer networks and distributed computing systems a mechanism is needed to provide secure communication. To trust the identity of each other, two principals must run a procedure resulting in mutual authentication. Key distribution protocols establish secret authenticated session keys using c..
Visualization and Monitoring of Network Traffic : Executive Summary
The seamless operation of the Internet requires being able to monitor and visualize the actual behaviour of the network. Today, IP network operators usually collect network flow statistics from critical points of
their network infrastructure. Flows aggregate packets that share common properties. Flow records are stored and analyzed to extract accounting information and increasingly to identify and isolate network
problems or security incidents. While network problems or attacks significantly changing traffic patterns are relatively easy to identify, it tends to be much more challenging to identify creeping changes or attacks and faults that manifest themselves only by very careful analysis of initially seemingly unrelated traffic pattern and their changes. There are currently no deployable good solutions and research in this area is just starting. In addition, the large volume of flow data on high capacity networks and exchange
points requires to move to probabilistic sampling techniques, which require new analysis techniques to calculate and also visualize the uncertainty attached to data sets
- âŠ