1,296 research outputs found

    Himnes del no-ésser

    Get PDF

    Presentació de Matèria d'ombres d'Antoni Clapés

    Get PDF

    [Poemes]

    Get PDF

    La poesia, és a dir, la utopia

    Get PDF

    De la poesia com a antipoesia apoètica, o sigui, com a poesia

    Get PDF

    Rethinking the law and politics of democratic police accountability

    Get PDF
    This paper evaluates the work and impact of a number of Police and Crime Commissioners (PCCs) in England and Wales and attempts to refocus public discourse and scrutiny on their Police and Crime Plans as a key prism through which their performance should be measured. Drawing upon the literature published by various PCCs, the Stevens Commission, the Home Affairs Committee and numerous academics, the paper will argue that a major reform of democratic police accountability in England and Wales is needed. Due to the often voluminous and piecemeal nature of the documents published on the PCCs’ websites, the textual analysis is limited to the Police and Crime Plans for Greater Manchester, the West Midlands and the London Metropolitan are

    Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Get PDF
    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.Comment: 19 pages, 7 figure

    The Use of Passive Magnetic Methods in Inferring the Variability of Sub-Glacial Water Systems

    Full text link
    Honors (Bachelor's)Interdisciplinary PhysicsUniversity of Michiganhttp://deepblue.lib.umich.edu/bitstream/2027.42/91875/1/nickhac.pd
    corecore