3,156 research outputs found

    El contrato de confianza con la información televisiva

    Get PDF
    The work focuses on the trust that society places on the Spanish television news. From the relative fidelity to the various news programs of the respective television networks, it can be supposed the domain of the trust in television networks above the trust in its programmes and professionals. Based on the relative limitations of luhmanian approach to account for the trust with regard to organized mediated communication system, it is made an empirical approach to the perception of the public television news. The main empirical sources are various surveys of Centro de Investigaciones Sociológicas and six focus groups among the middle class, with different ages. They were held in Madrid and focused on information in television.El trabajo aborda la confianza que la sociedad española deposita en las noticias televisivas. Desde la relativa fidelidad a los distintos programas informativos de las respectivas cadenas televisivas, cabe establecer la hipótesis del dominio de la confianza en la cadena sobre sus elementos (programas, profesionales). Partiendo de las relativas limitaciones del enfoque luhmaniano para dar cuenta de la confianza con respecto al sistema de comunicación mediada organizada, se realiza una aproximación empírica a la percepción que tiene el público de las noticias televisivas. Las fuentes empíricas principales son diversas encuestas del Centro de Investigaciones Sociológicas y seis grupos de discusión entre sectores de la clase media, con distintas edades, llevados a cabo en Madrid, y centrados en la información en televisión

    A Security Pattern for Cloud service certification

    Get PDF
    Cloud computing is interesting from the economic, operational and even energy consumption perspectives but it still raises concerns regarding the security, privacy, governance and compliance of the data and software services offered through it. However, the task of verifying security properties in services running on cloud is not trivial. We notice the provision and security of a cloud service is sensitive. Because of the potential interference between the features and behavior of all the inter-dependent services in all layers of the cloud stack (as well as dynamic changes in them). Besides current cloud models do not include support for trust-focused communication between layers. We present a mechanism to implement cloud service certification process based on the usage of Trusted Computing technology, by means of its Trusted Computing Platform (TPM) implementation of its architecture. Among many security security features it is a tamper proof resistance built in device and provides a root of trust to affix our certification mechanism. We present as a security pattern the approach for service certification based on the use TPM.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tec

    Some results on rational surfaces and Fano varieties

    Get PDF
    The goal of this article is to study the equations and syzygies of embeddings of rational surfaces and certain Fano varieties. Given a rational surface X and an ample and base-point-free line bundle L on X, we give an optimal numerical criterion for L to satisfy property Np. This criterion turns out to be a characterization of property Np if X is anticanonical. We also prove syzygy results for adjunction bundles and a Reider type theorem for higher syzygies. For certain Fano varieties we also prove results on very ampleness and higher syzygies.Comment: 26 pages, AMSTe

    MirBot: A collaborative object recognition system for smartphones using convolutional neural networks

    Get PDF
    MirBot is a collaborative application for smartphones that allows users to perform object recognition. This app can be used to take a photograph of an object, select the region of interest and obtain the most likely class (dog, chair, etc.) by means of similarity search using features extracted from a convolutional neural network (CNN). The answers provided by the system can be validated by the user so as to improve the results for future queries. All the images are stored together with a series of metadata, thus enabling a multimodal incremental dataset labeled with synset identifiers from the WordNet ontology. This dataset grows continuously thanks to the users' feedback, and is publicly available for research. This work details the MirBot object recognition system, analyzes the statistics gathered after more than four years of usage, describes the image classification methodology, and performs an exhaustive evaluation using handcrafted features, convolutional neural codes and different transfer learning techniques. After comparing various models and transformation methods, the results show that the CNN features maintain the accuracy of MirBot constant over time, despite the increasing number of new classes. The app is freely available at the Apple and Google Play stores.Comment: Accepted in Neurocomputing, 201

    Cuando el oyente es tu emisora

    Get PDF
    El periodismo y los periodistas han de cumplir una función social y de denuncia. Los escenarios que permiten hacerlo con total independencia solo pueden estar fuera del sistema mediático convencional. El programa de radio "Carne Cruda" es un gran ejemplo de ello: crowdfunding; independencia; transparencia...Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech
    corecore