5,054 research outputs found
On trust and privacy in context-aware systems
Recent advances in networking, handheld computing and sensors technologies have led to the emergence of context-aware systems. The vast amounts of personal information collected by such systems has led to growing concerns about the privacy of their users. Users concerned about their private information are likely to refuse participation in such systems. Therefore, it is quite clear that for any context-aware system to be acceptable by the users, mechanisms for controlling access to personal information are a necessity. According to Alan Westin "privacy is the claim of individuals, groups, or institutions to determine for themselves when, how and to what extent information is communicated to others"1. Within this context we can classify users as either information owners or information receivers. It is also acknowledged that information owners are willing to disclose personal information if this disclosure is potentially beneficial. So, the acceptance of any context-aware system depends on the provision of mechanisms for fine-grained control of the disclosure of personal information incorporating an explicit notion of benefit
Privacy, security, and trust issues in smart environments
Recent advances in networking, handheld computing and sensor technologies have driven forward research towards the realisation of Mark Weiser's dream of calm and ubiquitous computing (variously called pervasive computing, ambient computing, active spaces, the disappearing computer or context-aware computing). In turn, this has led to the emergence of smart environments as one significant facet of research in this domain. A smart environment, or space, is a region of the real world that is extensively equipped with sensors, actuators and computing components [1]. In effect the smart space becomes a part of a larger information system: with all actions within the space potentially affecting the underlying computer applications, which may themselves affect the space through the actuators. Such smart environments have tremendous potential within many application areas to improve the utility of a space. Consider the potential offered by a smart environment that prolongs the time an elderly or infirm person can live an independent life or the potential offered by a smart environment that supports vicarious learning
A Mid-Infrared Galaxy Atlas (MIGA)
A mid-infrared atlas of part of the Galactic plane () has been constructed using HIRES processed infrared
data to provide a mid-infrared data set for the Canadian Galactic Plane Survey
(CGPS). The addition of this data set to the CGPS will enable the study of the
emission from the smallest components of interstellar dust at an angular
resolution comparable to that of the radio, millimetre, and far-infrared data
in the CGPS. The Mid-Infrared Galaxy Atlas (MIGA) is a mid-infrared (12 m
and 25 m) counterpart to the far-infrared IRAS Galaxy Atlas (IGA), and
consists of resolution enhanced ( resolution) HIRES images along
with ancillary maps. This paper describes the processing and characteristics of
the atlas, the cross-beam simulation technique used to obtain high-resolution
ratio maps, and future plans to extend both the IGA and MIGA.Comment: 38 pages (including 15 tables), 13 figures (8 dithered GIF and 5
EPS). Submitted to Astrophysical Journal Supplement Series. A preprint with
higher resolution figures is available at
http://www.cita.utoronto.ca/~kerton/publications.htm
Dynamic trust models for ubiquitous computing environments
A significant characteristic of ubiquitous computing is the need for interactions of highly mobile entities to be secure: secure both for the entity and the environment in which the entity operates. Moreover, ubiquitous computing is also characterised by partial views over the state of the global environment, implying that we cannot guarantee that an environment can always verify the properties of the mobile entity that it has just received. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. an entity might encrypt a deliberately incorrect answer to a legitimate request). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two entities during an interaction in a ubiquitous environment
The SECURE collaboration model
The SECURE project has shown how trust can be made computationally tractable while retaining a reasonable connection with human and social notions of trust. SECURE has produced a well-founded theory of trust that has been tested and refined through use in real software such as collaborative spam filtering and electronic purse. The software comprises the SECURE kernel with extensions for policy specification by application developers. It has yet to be applied to large-scale, multi-domain distributed systems taking different application contexts into account. The project has not considered privacy in evidence distribution, a crucial issue for many application domains, including public services such as healthcare and police. The SECURE collaboration model has similarities with the trust domain concept, embodying the interaction set of a principal, but SECURE is primarily concerned with pseudonymous entities rather than domain-structured systems
Discrete breathers in a nonlinear electric line: Modeling, Computation and Experiment
We study experimentally and numerically the existence and stability
properties of discrete breathers in a periodic nonlinear electric line. The
electric line is composed of single cell nodes, containing a varactor diode and
an inductor, coupled together in a periodic ring configuration through
inductors and driven uniformly by a harmonic external voltage source. A simple
model for each cell is proposed by using a nonlinear form for the varactor
characteristics through the current and capacitance dependence on the voltage.
For an electrical line composed of 32 elements, we find the regions, in driver
voltage and frequency, where -peaked breather solutions exist and
characterize their stability. The results are compared to experimental
measurements with good quantitative agreement. We also examine the spontaneous
formation of -peaked breathers through modulational instability of the
homogeneous steady state. The competition between different discrete breathers
seeded by the modulational instability eventually leads to stationary
-peaked solutions whose precise locations is seen to sensitively depend on
the initial conditions
Fundamental investigation of losses of skeletal mineral in young adult human males and collaterally in young adult male pigtail monkeys /macacus nemestrima/ through immobilization for varying periods of time, coupled with a study of methods of preven
Skeletal mineral losses in young adult humans and monkeys resulting from immobilizatio
Prevalence and risk factors for mast cell tumours in dogs in England
BACKGROUND: Mast cell tumour (MCT) appears to be a frequent tumour type in dogs, though there is little published in relation to its frequency in dogs in the UK. The current study aimed to investigate prevalence and risk factors for MCTs in dogs attending English primary-care veterinary practices. METHODS: Electronic patient records from practices participating in the VetCompass animal surveillance project between July 2007 and June 2013 were searched for MCT diagnosis. Various search terms and standard diagnostic terms (VeNom codes) identified records containing MCT diagnoses, which were evaluated against clinical criteria for inclusion to the study. MCT prevalence for the entire dataset and specific breed types were calculated. Descriptive statistics characterised MCT cases and multivariable logistic regression methods evaluated risk factors for association with MCT (Pâ<â0.05). RESULTS: Within a population of 168,636 dogs, 453 had MCT, yielding a prevalence of 0.27% (95% confidence interval (CI) 0.24% - 0.29%). The highest breed type specific prevalences were for the Boxer at 1.95% (95% CI 1.40% - 2.51%), Golden Retriever at 1.39% (0.98% - 1.81%) and Weimaraner at 0.85% (95% CI 0.17% to 1.53%). Age, insurance status, neuter status, weight and breed type were associated with MCT diagnosis. Of dogs of specific breed type, the Boxer, Pug and Staffordshire Bull Terrier showed greater odds of MCT diagnosis compared with crossbred dogs. Conversely, the German Shepherd Dog, Border Collie, West Highland White Terrier, Springer Spaniel and Cocker Spaniel had reduced odds of MCT diagnosis compared with crossbred dogs. No association was found between MCT diagnosis and sex. CLINICAL SIGNIFICANCE: This study highlights a clinically significant prevalence of MCT and identifies specific breed types with predisposition to MCT, potentially aiding veterinarian awareness and facilitating diagnosis
Ultrastable lasers based on vibration insensitive cavities
We present two ultra-stable lasers based on two vibration insensitive cavity
designs, one with vertical optical axis geometry, the other horizontal.
Ultra-stable cavities are constructed with fused silica mirror substrates,
shown to decrease the thermal noise limit, in order to improve the frequency
stability over previous designs. Vibration sensitivity components measured are
equal to or better than 1.5e-11 per m.s^-2 for each spatial direction, which
shows significant improvement over previous studies. We have tested the very
low dependence on the position of the cavity support points, in order to
establish that our designs eliminate the need for fine tuning to achieve
extremely low vibration sensitivity. Relative frequency measurements show that
at least one of the stabilized lasers has a stability better than 5.6e-16 at 1
second, which is the best result obtained for this length of cavity.Comment: 8 pages 12 figure
- âŠ