155 research outputs found

    False positive HIV diagnoses in resource limited settings: operational lessons learned for HIV programmes

    Get PDF
    Access to HIV diagnosis is life-saving; however the use of rapid diagnostic tests in combination is vulnerable to wrongly diagnosing HIV infection when both screening tests give a false positive result. Misclassification of HIV patients can also occur due to poor quality control, administrative errors and lack of supervision and training of staff. Médecins Sans Frontières discovered in 2004 that HIV negative individuals were enrolled in some HIV programmes. This paper describes the result of an audit of three sites to review testing practices, implement improved testing algorithms and offer re-testing to clients enrolled in the HIV clinic

    Absence of N addition facilitates B cell development, but impairs immune responses

    Get PDF
    The programmed, stepwise acquisition of immunocompetence that marks the development of the fetal immune response proceeds during a period when both T cell receptor and immunoglobulin (Ig) repertoires exhibit reduced junctional diversity due to physiologic terminal deoxynucleotidyl transferase (TdT) insufficiency. To test the effect of N addition on humoral responses, we transplanted bone marrow from TdT-deficient (TdT−/−) and wild-type (TdT+/+) BALB/c mice into recombination activation gene 1-deficient BALB/c hosts. Mice transplanted with TdT−/− cells exhibited diminished humoral responses to the T-independent antigens α-1-dextran and (2,4,6-trinitrophenyl) hapten conjugated to AminoEthylCarboxymethyl-FICOLL, to the T-dependent antigens NP19CGG and hen egg lysozyme, and to Enterobacter cloacae, a commensal bacteria that can become an opportunistic pathogen in immature and immunocompromised hosts. An exception to this pattern of reduction was the T-independent anti-phosphorylcholine response to Streptococcus pneumoniae, which is normally dominated by the N-deficient T15 idiotype. Most of the humoral immune responses in the recipients of TdT−/− bone marrow were impaired, yet population of the blood with B and T cells occurred more rapidly. To further test the effect of N-deficiency on B cell and T cell population growth, transplanted TdT-sufficient and -deficient BALB/c IgMa and congenic TdT-sufficient CB17 IgMb bone marrow were placed in competition. TdT−/− cells demonstrated an advantage in populating the bone marrow, the spleen, and the peritoneal cavity. TdT deficiency, which characterizes fetal lymphocytes, thus appears to facilitate filling both central and peripheral lymphoid compartments, but at the cost of altered responses to a broad set of antigens

    Predictors of Poor CD4 and Weight Recovery in HIV-Infected Children Initiating ART in South Africa

    Get PDF
    Objective: To identify baseline demographic and clinical risk factors associated with poor CD4 and weight response after initiation of antiretroviral therapy (ART) in a cohort of human immunodeficiency virus (HIV)-infected children in KwaZulu-Natal, South Africa. Methods: We performed a retrospective cohort study of 674 children initiating antiretroviral therapy at McCord and St. Mary’s hospitals in KwaZulu-Natal, South Africa, from August 2003 to December 2008. We extracted data from paper charts and electronic medical records to assess risk factors associated with CD4 and weight response using logistic regression. Results: From the initial cohort of 901 children,10 years old initiating ART between August 2003 and December 2008, we analyzed 674 children with complete baseline data. Viral suppression rates (,400 copies/ml) were 84 % after six months of therapy and 88 % after 12 months of therapy. Seventy-three percent of children achieved CD4 recovery after six months and 89 % after 12 months. Weight-for-age Z-score (WAZ) improvements were seen in 58 % of children after six months of ART and 64 % after 12 months. After six months of ART, lower baseline hemoglobin (p = 0.037), presence of chronic diarrhea (p = 0.007), and virologic failure (p = 0.046) were all associated with poor CD4 recovery by multivariate logistic regression. After 12 months of ART, poor CD4 recovery was associated with higher baseline CD4 % (p = 0.005), chronic diarrhe

    The longitudinal changes of BOLD response and cerebral hemodynamics from acute to subacute stroke. A fMRI and TCD study

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>By mapping the dynamics of brain reorganization, functional magnetic resonance imaging MRI (fMRI) has allowed for significant progress in understanding cerebral plasticity phenomena after a stroke. However, cerebro-vascular diseases can affect blood oxygen level dependent (BOLD) signal. Cerebral autoregulation is a primary function of cerebral hemodynamics, which allows to maintain a relatively constant blood flow despite changes in arterial blood pressure and perfusion pressure. Cerebral autoregulation is reported to become less effective in the early phases post-stroke.</p> <p>This study investigated whether any impairment of cerebral hemodynamics that occurs during the acute and the subacute phases of ischemic stroke is related to changes in BOLD response.</p> <p>We enrolled six aphasic patients affected by acute stroke. All patients underwent a Transcranial Doppler to assess cerebral autoregulation (Mx index) and fMRI to evaluate the amplitude and the peak latency (time to peak-TTP) of BOLD response in the acute (i.e., within four days of stroke occurrence) and the subacute (i.e., between five and twelve days after stroke onset) stroke phases.</p> <p>Results</p> <p>As patients advanced from the acute to subacute stroke phase, the affected hemisphere presented a BOLD TTP increase (p = 0.04) and a deterioration of cerebral autoregulation (Mx index increase, p = 0.046). A similar but not significant trend was observed also in the unaffected hemisphere. When the two hemispheres were grouped together, BOLD TTP delay was significantly related to worsening cerebral autoregulation (Mx index increase) (Spearman's rho = 0.734; p = 0.01).</p> <p>Conclusions</p> <p>The hemodynamic response function subtending BOLD signal may present a delay in peak latency that arises as patients advance from the acute to the subacute stroke phase. This delay is related to the deterioration of cerebral hemodynamics. These findings suggest that remodeling the fMRI hemodynamic response function in the different phases of stroke may optimize the detection of BOLD signal changes.</p

    The Role of Muscle microRNAs in Repairing the Neuromuscular Junction

    Get PDF
    microRNAs have been implicated in mediating key aspects of skeletal muscle development and responses to diseases and injury. Recently, we demonstrated that a synaptically enriched microRNA, miR-206, functions to promote maintenance and repair of the neuromuscular junction (NMJ); in mutant mice lacking miR-206, reinnervation is impaired following nerve injury and loss of NMJs is accelerated in a mouse model of amyotrophic lateral sclerosis (ALS). Here, we asked whether other microRNAs play similar roles. One attractive candidate is miR-133b because it is in the same transcript that encodes miR-206. Like miR-206, miR-133b is concentrated near NMJs and induced after denervation. In miR-133b null mice, however, NMJ development is unaltered, reinnervation proceeds normally following nerve injury, and disease progression is unaffected in the SOD1(G93A) mouse model of ALS. To determine if miR-206 compensates for the loss of miR-133b, we generated mice lacking both microRNAs. The phenotype of these double mutants resembled that of miR-206 single mutants. Finally, we used conditional mutants of Dicer, an enzyme required for the maturation of most microRNAs, to generate mice in which microRNAs were depleted from skeletal muscle fibers postnatally, thus circumventing a requirement for microRNAs in embryonic muscle development. Reinnervation of muscle fibers following injury was impaired in these mice, but the defect was similar in magnitude to that observed in miR-206 mutants. Together, these results suggest that miR-206 is the major microRNA that regulates repair of the NMJ following nerve injury.National Institutes of Health (U.S.) (NIH grant R01AG032322)National Institute of Neurological Disorders and Stroke (U.S.) (NRSA Postdoctoral Fellowship from NINDS/NIH)Ruth K. Broad Biomedical Research Foundation (Fellowship)McGovern Institute for Brain Research at MIT (Poitras Center for Affective Disorders Research

    Postpartum psychiatric disorders

    Get PDF
    Pregnancy is a complex and vulnerable period that presents a number of challenges to women, including the development of postpartum psychiatric disorders (PPDs). These disorders can include postpartum depression and anxiety, which are relatively common, and the rare but more severe postpartum psychosis. In addition, other PPDs can include obsessive–compulsive disorder, post-traumatic stress disorder and eating disorders. The aetiology of PPDs is a complex interaction of psychological, social and biological factors, in addition to genetic and environmental factors. The goals of treating postpartum mental illness are reducing maternal symptoms and supporting maternal–child and family functioning. Women and their families should receive psychoeducation about the illness, including evidence-based discussions about the risks and benefits of each treatment option. Developing effective strategies in global settings that allow the delivery of targeted therapies to women with different clinical phenotypes and severities of PPDs is essential

    Depression in Primary care: Interpersonal Counseling vs Selective serotonin reuptake inhibitors. The DEPICS Study. A multicenter randomized controlled trial. Rationale and design

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Depression is a frequently observed and disabling condition in primary care, mainly treated by Primary Care Physicians with antidepressant drugs. Psychological interventions are recommended as first-line treatment by the most authoritative international guidelines but few evidences are available on their efficacy and effectiveness for mild depression.</p> <p>Methods/Design</p> <p>This multi-center randomized controlled trial was conducted in 9 Italian centres with the aim to compare the efficacy of Inter-Personal Counseling, a brief structured psychological intervention, to that of Selective Serotonin Reuptake Inhibitors. Patients with depressive symptoms referred by Primary Care Physicians to psychiatric consultation-liaison services were eligible for the study if they met the DSM-IV criteria for major depression, had a score ≥13 on the 21-item Hamilton Depression Rating Scale, and were at their first or second depressive episode. The primary outcome was remission of depressive symptoms at 2-months, defined as a HDRS score ≤ 7. Secondary outcome measures were improvement in global functioning and recurrence of depressive symptoms at 12-months. Patients who did not respond to Inter-Personal Counseling or Selective Serotonin Reuptake Inhibitors at 2-months received augmentation with the other treatment.</p> <p>Discussion</p> <p>This trial addresses some of the shortcomings of existing trials targeting major depression in primary care by evaluating the comparative efficacy of a brief psychological intervention that could be easily disseminated, by including a sample of patients with mild/moderate depression and by using different outcome measures.</p> <p>Trial registration</p> <p>Australian New Zealand Clinical Trials Registry ACTRN12608000479303</p

    A spontaneous ad hoc network to share www access

    Get PDF
    In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc networks, nobody has published any design and simulation until today. Spontaneous networking will enable a more natural form of wireless computing when people physically meet in the real world. We also validate the success of our proposal through several simulations and comparisons with a regular architecture, taking into account the optimization of the resources of the devices. Finally, we compare our proposal with other caching techniques published in the related literature. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low-resource communities. That is, it lets communicate spontaneous networks, which are working collaboratively and which have been created on different physical places.Authors want to give thanks to the anonymous reviewers for their valuable suggestions, useful comments, and proofreading of this paper. This work was partially supported by the Ministerio de Educacion y Ciencia, Spain, under Grant no. TIN2008-06441-C02-01, and by the "Ayudas complementarias para proyectos de I+D para grupos de calidad de la Generalitat Valenciana" (ACOMP/2010/005).Lacuesta Gilaberte, R.; Lloret, J.; García Pineda, M.; Peñalver Herrero, ML. (2010). A spontaneous ad hoc network to share www access. EURASIP Journal on Wireless Communications and Networking. 2010:1-16. https://doi.org/10.1155/2010/232083S1162010Preuß S, Cap CH: Overview of spontaneous networking-evolving concepts and technologies. In Rostocker Informatik-Berichte. Volume 24. Fachbereich Informatik der Universit at Rostock; 2000:113-123.Gallo S, Galluccio L, Morabito G, Palazzo S: Rapid and energy efficient neighbor discovery for spontaneous networks. Proceedings of the 7th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, October 2004, Venice, ItalyLatvakoski J, Pakkala D, Pääkkönen P: A communication architecture for spontaneous systems. IEEE Wireless Communications 2004, 11(3):36-42. 10.1109/MWC.2004.1308947Zarate Silva VH, De Cruz Salgado EI, Quintana FR: AWISPA: an awareness framework for collaborative spontaneous networks. Proceedings of the 36th ASEE/IEEE Frontiers in Education Conference (FIE '06), October 2006 1-6.Feeney LM, Ahlgren B, Westerlund A: Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Communications Magazine 2001, 39(6):176-181. 10.1109/35.925687Perkins CE, Bhagwat P: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94), August 1994 234-244.Johnson DB, Maltz DA, Broch J: DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks, Ad Hoc Networking. Addison-Wesley Longman Publishing, Boston, Mass, USA; 2001.Perkins C, Belding-Royer E, Das S: Ad hoc on-demand distance vector (AODV) routing. RFC 3561, July 2003Park V, Corson MS: IETF MANET Internet Draft "draft-ietf-MANET-tora-spe03.txt". Novemmer 2000.Viana AC, De Amorim MD, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3(5):589-606.Gilaberte RL, Herrero LP: IP addresses configuration in spontaneous networks. Proceedings of the 9th WSEAS International Conference on Computers, July 2005, Athens, GreeceViana AC, Dias de Amorim M, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3(5):589-606.Alvarez-Hamelin JI, Carneiro Viana A, Dias De Amorim M: Architectural considerations for a self-configuring routing scheme for spontaneous networks.,Tech. Rep. 1 October 2005.Lacuesta R, Peñalver L: Automatic configuration of ad-hoc networks: establishing unique IP link-local addresses. Proceedings of the International Conference on Emerging Security Information, Systems and Technologies (SECURWARE '07), October 2007, Valencia, SpainFoulks EF: Social network therapies and society: an overview. Contemporary Family Therapy 1985, 3(4):316-320.Wang Y, Wu H: DFT-MSN: the delay/fault-tolerant mobile sensor network for pervasive information gathering. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006Kindberg T, Zhang K: Validating and securing spontaneous associations between wireless devices. In Proceedings of the 6th Information Security Conference (ISC '03), 2003. Springer; 44-53.Al-Jaroodi J: Routing security in open/dynamic mobile ad hoc networks. The International Arab Journal of Information Technology 2007, 4(1):17-25.Stajano F, Anderson RJ: The resurrecting duckling: security issues for ad-hoc wireless networks. Proceedings of the 7th International Workshop on Security Protocols, April 1999 172-194.Zhou L, Haas ZJ: Securing ad hoc networks. IEEE Network 1999, 13(6):24-30. 10.1109/65.806983Hauspie M, Simplot-Ryl I: Cooperation in ad hoc networks: enhancing the virtual currency based models. Proceedings of the 1st International Conference on Integrated Internet Ad Hoc and Sensor Networks (InterSense '06), May 2006, Nice, FranceWang X, Dai F, Qian L, Dong H: A way to solve the threat of selfish and malicious nodes for ad hoc networks. Proceedings of the International Symposium on Information Science and Engieering (ISISE '08), December 2008, Shanghai, China 1: 368-370.Kargl F, Klenk A, Weber M, Schlott S: Sensors for detection of misbehaving nodes in MANETs. Detection of Intrusion and Malware and Vulnerability Assessment (DIMVA '04), July 2004, Dortmund, Germany 83-97.Kargl F, Geiss A, Scholott S, Weber M: Secure dynamic source routing. Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS '05), January 2005, Big Island, Hawaii, USAGokhale S, Dasgupta P: Distributed authentication for peer-to-peer networks. Proceedings of the Symposium on Applications and the Internet Workshops, January 2003 347-353.Capkun S, Buttyán L, Hubaux J-P: Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing 2003, 2(1):52-64. 10.1109/TMC.2003.1195151Stajano F, Anderson R: The resurrecting duckling security issues for ad-hoc wireless networks. In Proceedings of the 7th International Workshop on Security Protocols, 1999, Berlin, Germany, Lecture Notes in Computer Science. Volume 1796. Springer; 172-194.Balfanz D, Smetters DK, Stewart P, Wong HC: Talking to strangers: authentication in ad-hoc wireless networks. Proceedings of the International Symposium on Network and Distributed Systems Security (NDSS '02), February 2002, San Diego, Calif, USABarbara D, Imielinski T: Sleepers and workaholics: caching strategies in mobile environments. Proceedings of the ACM SIGMOD International Conference on Management of Data, May 1994 1-12.Cao G: A scalable low-latency cache invalidation strategy for mobile environments. IEEE Transactions on Knowledge and Data Engineering 2003, 15(5):1251-1265. 10.1109/TKDE.2003.1232276Hu Q, Lee D: Cache algorithms based on adaptive invalidation reports for mobile environments. Cluster Computing 1998, 1(1):39-50. 10.1023/A:1019012927328Jing J, Elmagarmid A, Helal A, Alonso R: Bit-sequences: an adaptive cache invalidation method in mobile client/server environments. Mobile Networks and Applications 1997, 2(2):115-127. 10.1023/A:1013616213333Kahol A, Khurana S, Gupta S, Srimani P: An efficient cache management scheme for mobile environment. Proceedings of the 20th International Conference on Distributied Computing System (ICDCS '00), April 2000, Taipei, Taiwan 530-537.Kazar M: Synchronization and caching issues in the Andrew file system. Proceedings of USENIX Conference, February 1988, Dallas, Tex, USA 27-36.Roussopoulos M, Baker M: CUP: controlled update propagation in peer-to-peer networks. Proceedings of USENIX Annual Technical Conference, June 2003, San Antonio, Tex, USASandberg S, Kleiman S, Goldberg D, Walsh D, Lyon B: Design and implementation of the sun network file system. Proceedings of USENIX Summer Conference, June 1985, Portland, Ore, USA 119-130.Wu K, Yu PS, Chen M: Energy-efficient caching for wireless mobile computing. Proceedings of the 12th IEEE International Conference on Data Engineering, February-March 1996, New Orleans, La, USA 336-343.Yeung MKH, Kwok Y-K: Wireless cache invalidation schemes with link adaptation and downlink traffic. IEEE Transactions on Mobile Computing 2005, 4(1):68-83.Wessels D, Claffy K: Internet cache protocol (IC) v.2. http://www.ietf.org/rfc/rfc2186.txtFan L, Cao P, Almeida J, Broder AZ: Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM Transactions on Networking 2000, 8(3):281-293. 10.1109/90.851975Dykes SG, Robbins KA: A viability analysis of cooperative proxy caching. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), April 2001, Anchorage, Alaska, USA 3: 1205-1214.Wessels D, Claffy K: RFC 2186: Internet cache protocol (ICP), version 2. The Internet Engineering Taskforce, September 1997Wessels D, Claffy K: RFC 2187: application of internet cache protocol (ICP), version 2. The Internet Engineering Taskforce, September 1997Ren Q, Dunhan MH: Using semantic caching to manage location dependent data in mobile computing. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, August 2000, Boston, Mass, USA 210-221.Lim S, Lee W-C, Cao G, Das CR: Cache invalidation strategies for internet-based mobile ad hoc networks. Computer Communications 2007, 30(8):1854-1869. 10.1016/j.comcom.2007.02.020Park B-N, Lee W, Lee C: QoS-aware internet access schemes for wireless mobile ad hoc networks. Computer Communications 2007, 30(2):369-384. 10.1016/j.comcom.2006.09.004Hara T: Effective replica allocation in ad hoc networks for improving data accessibility. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), April 2001, Anchorage, Alaska, USA 1568-1576.Papadopouli M, Schulzrinne H: Effects of power conservation, wireless converage and cooperation on data dissemination among mobile devices. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '01), October 2001, Long Beach, Calif, USA 117-127.Can P, Irani S: Cost-aware WWW proxy caching algorithms. Proceedings of the USENIX Symposium on lnternet Technology and Systems, December 1997Rizzo L, Vicisano L: Replacement policies for a proxy cache. IEEE/ACM Transactions on Networking 2000, 8(2):158-170. 10.1109/90.842139Williams S, Abrams M, Strandridge CR, Abdulla G, Fox EA: Removal policies in network caches for world-wide web documents. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, August 1996, Palo Alto, Calif, USA 293-305.Hara T: Replica allocation in ad hoc networks with period data update. Proceedings of the 3rd International Conference on Mobile Data Management (MDM '02), July 2002, Edmonton, Canada 79-86.Papadopouli M, Schulzrinne H: Effects of power conservation, wireless coverage and cooperation on data dissemination among mobile devices. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '01), October 2001, Long Beach, Calif, USA 117-127.Sailhan F, Issarny V: Cooperative caching in ad hoc networks. Proceedings of the 4th International Conference on Mobile Data Management (MDM '03), January 2003, Melbourne, Australia, Lecture Notes in Computer Science 2574: 13-28.Yin L, Cao G: Supporting cooperative caching in ad hoc networks. IEEE Transactions on Mobile Computing 2006, 5(1):77-89.Karumanchi G, Muralidharan S, Prakash R: Information dissemination in partitionable mobile ad hoc networks. Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems (SRDS '99), October 1999, Lausanne, Switzerland 4-13.Corson MS, Macker JP, Cirincione GH: Internet-based mobile ad hoc networking. IEEE Internet Computing 1999, 3(4):63-70. 10.1109/4236.780962Lim S, Lee W-C, Cao G, Das CR: A novel caching scheme for improving internet-based mobile ad hoc networks performance. Ad Hoc Networks 2006, 4(2):225-239. 10.1016/j.adhoc.2004.04.013Opnet Modeler http://www.opnet.com/solutions/network_rd/modeler_wireless.htmlLacuesta R, Lloret J, Garcia M, Peñalver L: Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks. Journal of Network and Computer Applications. In pres

    Internet of things: where to be is to trust

    Get PDF
    [EN] Networks' creation is getting more and more required, anytime, anywhere. Devices that can participate on these networks can be quite different among them. Sensors, mobiles, home appliances, or other type of devices will have to collaborate to increase and improve the services provided to clients. In the same way, network configuration, security mechanisms establishment, and optimal performance control must be done by them. Some of these devices could have limited resources to work, sometimes even resources restriction not existing, they must work to optimize network traffic. In this article, we center our researching on spontaneous networks. We propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction and communities' creation to grant a quick, easy, and secure access to users to surf the Web. Each device will have an identity in the network. Each community will also have an identity and will act as a unity on a world based on Internet connection. Security will be established in the moment they access to the network through the use of the trust chain generated by nodes. Trust is modified by each node on the basis of nodes behaviorLacuesta, R.; Palacios-Navarro, G.; Cetina Englada, C.; Peñalver Herrero, ML.; Lloret, J. (2012). Internet of things: where to be is to trust. EURASIP Journal on Wireless Communications and Networking. (203):1-16. doi:10.1186/1687-1499-2012-203S116203Lipnack J, Stamps J: Virtual Teams: Researching Across Space, Time, and Organizations with Technology. New York: John Wiley and Sons; 1997.Ahuja MK, Carley KN: Network structure in virtual organizations, organization science, Vol. 10, No. 6, Special Issue: Communication Processes for Virtual Organizations, November–December. 1999, 741-757.Mowshowitz A: Virtual organization. Commun ACM 1997, 40(9):30-37. 10.1145/260750.260759Preuß S: CH Cap, Overview of spontaneous networking-evolving concepts and technologies, in Rostocker Informatik-Berichte. Rostock: Fachbereich Informatik der Universit; 2000:113-123.Feeney LM, Ahlgren B, Westerlund A: Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Commun Mag 2001, 39(6):176-181. 10.1109/35.925687Latvakoski J, Pakkala D, Pääkkönen P: A communication architecture for spontaneous systems. IEEE Wirel Commun 2004, 11(3):36-42. 10.1109/MWC.2004.1308947Mani M, Nguyen A-M, Crespi N: SCOPE: a prototype for spontaneous P2P social networking. Proceedings of 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) 2010, 220-225.Legendre F, de Amorim MD, Fdida S: Implicit merging of overlapping spontaneous networks. Proceedings of Vehicular Technology Conference 2004, 3050-3054.Zarate Silva VH, De Cruz Salgado EI, Ramos Quintana F: AWISPA: an awareness framework for collaborative spontaneous networks. 36th Annual Frontiers in Education Conference 2006, 27-31.Perkins CE, Bhagwat P: Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM’94 1994, 234-244.Johnson DB, Maltz DA, Broch J: DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. Boston, MA: Ad Hoc Networking (Addison-Wesley Longman Publishing; 2001.Perkins C, Belding-Royer E, Das S: Ad hoc on-demand distance vector (AODV) routing, RFC 3561. 2003.Park V, Corson MS: IETF MANET Internet Draft “draft-ietf-MANET-tora-spe03.txt”, November 2000. 2012. Accessed March http://tools.ietf.org/html/draft-ietf-manet-tora-spec-03Viana AC, De Amorim MD, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3(5):589-606. 10.1016/j.adhoc.2004.08.006Lacuesta R, Peñalver L: IP addresses configuration in spontaneous networks. In Proceedings of the 9th WSEAS International Conference on Computers. Athens, Greece; 2005:1-6.Alvarez-Hamelin JI, Viana AC, de Amorim M Dias: Architectural considerations for a self-configuring routing scheme for spontaneous networks, Technical Report 1. 2005.Lacuesta R, Peñalver L: Automatic configuration of ad-hoc networks: establishing unique IP link-local addresses. In Proceedings of the International Conference on Emerging Security Information, Systems and Technologies (SECURWARE’07). Valencia, Spain; 2007:157-162.Foulks EF: Social network therapies and society: an overview. Contemp Fam Therapy 1985, 3(4):316-320.IBM: A Smarter Planet. 2012. http://www.ibm.com/smarterplanetMontenegro G, Kushalnagar N, Hui J, Culler D: RFC 4944: Transmission of IPv6 Packets over IEEE 802.15.4 Networks. 2007.Alcaraz C, Najera P, Lopez J, Roman R: Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?, 1st International workshop on the security of The internet of Things (SecIoT). tokyo (Japan); 2010. . Accessed January 2012 1er International Workshop on the Security of The Internet of Things (SecIoT 2010) http://www.nics.uma.es/seciot10/files/pdf/alcaraz_seciot10_paper.pdfFerscha A, Davies N, Schmidt A, Streitz N: Pervasive Socio-Technical Fabric. Procedia Computer Science 2011, 7: 88-91.Hubaux JP, Buttyán L, Capkun S: The quest for security in mobile ad-hoc networks, in Proceedings of the ACM Symposium on Mobile Ad-hoc Networking and Computing. 2001, 146-155.Wang Y, Varadharajan V: Interaction trust evaluation in decentralized environments, e-commerce and web technologies. In Proceedings of 5th International Conference on Electronic Commerce and Web Technologies, vol LNCS 3182. Springer; 2004:144-153.Jimin L, Junbao L, Aiguo A, Zhenpeng L: Two-way trust evaluation based on feedback. in Conference on Logistics Systems and Intelligent Management 2010, 3: 1910-1914.Daskapan S, Nurtanti I, Van den Berg J: Trust algorithms in P2P file sharing networks. Int J Internet Technol Secured Trans 2010, 2(1–2):174-200.Maña A, Koshutanski H, Pérez EJ: A trust negotiation based security framework for service provisioning in load-balancing clusters. Comput Secur 2012, 31(1):4-25. 10.1016/j.cose.2011.11.006Stajano F, Anderson R: The resurrecting duckling security issues for ad-hoc wireless networks. Security Protocols, 7th International Workshop Proceedings, Lecture notes in Computer Science, LNCS 1296 1999, 172-194.Balfanz D, Smetters DK, Stewart P, ChiWong H: Talking to strangers: authentication in ad-hoc wireless networks, in Symposium on Network and Distributed Systems Security (NDSS’02). San Diego, CA; 2002.Capkun S, Hubaux JP, Buttyán L: Mobility helps security in ad-hoc networks. In Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. MD, USA: Annapolis; 2003:46-56.Metzger MJ: Privacy, trust, and disclosure: exploring barriers to electronic commerce. J Comput-Mediat Commun 2004, 9(4). http://jcmc.indiana.edu/vol9/issue4/metzger.html 2004, 9(4)
    corecore