62 research outputs found

    iCapture: Facilitating Spontaneous User-Interaction with Pervasive Displays using Smart Devices

    Get PDF
    Abstract. The eCampus project at Lancaster University is an inter-disciplinary project aiming to deploy a wide range of situated displays across the University campus in order to create a large per-vasive communications infrastructure. At present, we are conducting a series of parallel research activities in order to investigate how the pervasive communications infrastructure can support the daily needs of staff, students and visitors to the University. This paper introduces one of our current research investigations into how one is able to mediate spontaneous interaction with the pervasive display infrastructure through camera equipped mobile phones (i.e. smart devices).

    Intrusion Detection Systems for Community Wireless Mesh Networks

    Get PDF
    Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive. Unfortunately, computer networks (including mesh networks) are frequently being exploited by increasingly profit-driven and insidious attackers, which can affect their utility for legitimate use. In response to this, a number of countermeasures have been developed, including intrusion detection systems that aim to detect anomalous behaviour caused by attacks. We present a set of socio-technical challenges associated with developing an intrusion detection system for a community wireless mesh network. The attack space on a mesh network is particularly large; we motivate the need for and describe the challenges of adopting an asset-driven approach to managing this space. Finally, we present an initial design of a modular architecture for intrusion detection, highlighting how it addresses the identified challenges

    An experimental dynamic RAM video cache

    Get PDF
    As technological advances continue to be made, the demand for more efficient distributed multimedia systems is also affirmed. Current support for end-to-end QoS is still limited; consequently mechanisms are required to provide flexibility in resource loading. One such mechanism, caching, may be introduced both in the end-system and network to facilitate intelligent load balancing and resource management. We introduce new work at Lancaster University investigating the use of transparent network caches for MPEG-2. A novel architecture is proposed, based on router-oriented caching and the employment of large scale dynamic RAM as the sole caching medium. The architecture also proposes the use of the ISO/IEC standardised DSM-CC protocol as a basic control infrastructure and the caching of pre-built transport packets (UDP/IP) in the data plane. Finally, the work discussed is in its infancy and consequently focuses upon the design and implementation of the caching architecture rather than an investigation into performance gains, which we intend to make in a continuation of the work

    Dichotomous mechanistic behaviour in Narasaka-Heck cyclizations: electron rich Pd-catalysts generate iminyl radicals

    Get PDF
    Pd-catalyzed cyclizations of oxime esters with pendant alkenes undergo ligand controlled mechanistic divergence. Electron deficient phosphines promote aza-Heck cyclization; electron rich systems favour a SET pathway. Mechanistic experiments differentiate the two manifolds.</p

    Recent developments in the use of aza-Heck cyclizations for the synthesis of chiral N-heterocycles

    Get PDF
    The scope and mechanism of aza-Heck methodologies that provide chiral heterocyclic systems are outlined.</p

    Copper catalyzed Heck-like cyclizations of oxime esters

    Get PDF
    Copper catalyzed Heck-like cyclizations of oxime esters are described. This new protocol is an effective alternative to Pd-based systems and highlights the value of replacing precious metal catalysts with cheaper and more sustainable variants.</p

    Meta-analysis of genome-wide association studies of asthma in ethnically diverse North American populations.

    Get PDF
    Asthma is a common disease with a complex risk architecture including both genetic and environmental factors. We performed a meta-analysis of North American genome-wide association studies of asthma in 5,416 individuals with asthma (cases) including individuals of European American, African American or African Caribbean, and Latino ancestry, with replication in an additional 12,649 individuals from the same ethnic groups. We identified five susceptibility loci. Four were at previously reported loci on 17q21, near IL1RL1, TSLP and IL33, but we report for the first time, to our knowledge, that these loci are associated with asthma risk in three ethnic groups. In addition, we identified a new asthma susceptibility locus at PYHIN1, with the association being specific to individuals of African descent (P = 3.9 × 10(-9)). These results suggest that some asthma susceptibility loci are robust to differences in ancestry when sufficiently large samples sizes are investigated, and that ancestry-specific associations also contribute to the complex genetic architecture of asthma

    Towards resilient community wireless mesh networks

    Get PDF
    Wireless Mesh Networks are an increasingly common technology providing connectivity in many communities, particularly where Internet access is unavailable or restricted via more conventional means. Their comparative ease of installation and relatively low cost makes this especially true for communities which might previously have lacked the technical knowledge or skill to attempt such an endeavour. In such a situation it is important that the operation of the network should be easily manageable; to this end the overall resiliency of the network is a key factor, enabling the network to resolve and remediate problems as they arise without requiring external technical understanding or input. This research aims to improve the resilience of community mesh networks by improving their security, initially examining the use of risk analysis techniques in this environment to identify potential attack vectors. This understanding will then be used to investigate intrusion detection techniques for operation specifically in a community environment
    corecore