3,518 research outputs found

    On trust and privacy in context-aware systems

    Get PDF
    Recent advances in networking, handheld computing and sensors technologies have led to the emergence of context-aware systems. The vast amounts of personal information collected by such systems has led to growing concerns about the privacy of their users. Users concerned about their private information are likely to refuse participation in such systems. Therefore, it is quite clear that for any context-aware system to be acceptable by the users, mechanisms for controlling access to personal information are a necessity. According to Alan Westin "privacy is the claim of individuals, groups, or institutions to determine for themselves when, how and to what extent information is communicated to others"1. Within this context we can classify users as either information owners or information receivers. It is also acknowledged that information owners are willing to disclose personal information if this disclosure is potentially beneficial. So, the acceptance of any context-aware system depends on the provision of mechanisms for fine-grained control of the disclosure of personal information incorporating an explicit notion of benefit

    Privacy, security, and trust issues in smart environments

    Get PDF
    Recent advances in networking, handheld computing and sensor technologies have driven forward research towards the realisation of Mark Weiser's dream of calm and ubiquitous computing (variously called pervasive computing, ambient computing, active spaces, the disappearing computer or context-aware computing). In turn, this has led to the emergence of smart environments as one significant facet of research in this domain. A smart environment, or space, is a region of the real world that is extensively equipped with sensors, actuators and computing components [1]. In effect the smart space becomes a part of a larger information system: with all actions within the space potentially affecting the underlying computer applications, which may themselves affect the space through the actuators. Such smart environments have tremendous potential within many application areas to improve the utility of a space. Consider the potential offered by a smart environment that prolongs the time an elderly or infirm person can live an independent life or the potential offered by a smart environment that supports vicarious learning

    The SECURE collaboration model

    Get PDF
    The SECURE project has shown how trust can be made computationally tractable while retaining a reasonable connection with human and social notions of trust. SECURE has produced a well-founded theory of trust that has been tested and refined through use in real software such as collaborative spam filtering and electronic purse. The software comprises the SECURE kernel with extensions for policy specification by application developers. It has yet to be applied to large-scale, multi-domain distributed systems taking different application contexts into account. The project has not considered privacy in evidence distribution, a crucial issue for many application domains, including public services such as healthcare and police. The SECURE collaboration model has similarities with the trust domain concept, embodying the interaction set of a principal, but SECURE is primarily concerned with pseudonymous entities rather than domain-structured systems

    Data processing method for a weak, moving telemetry signal

    Get PDF
    Method of processing data from a spacecraft, where the carrier has a low signal-to-noise ratio and wide unpredictable frequency shifts, consists of analogue recording of the noisy signal along with a high-frequency tone that is used as a clock to trigger a digitizer

    An improved bound for the rigidity of linearly constrained frameworks

    Get PDF
    We consider the problem of characterising the generic rigidity of bar-joint frameworks in Rd in which each vertex is constrained to lie in a given a ne subspace. The special case when d = 2 was previously solved by I. Streinu and L. Theran in 2010 and the case when each vertex is constrained to lie in an a ne subspace of dimension t, and d t(t 1) was solved by Cruickshank, Guler and the rst two authors in 2019. We extend the latter result by showing that the given characterisation holds whenever d 2t

    Shifting a Quantum Wire through a Disordered Crystal: Observation of Conductance Fluctuations in Real Space

    Full text link
    A quantum wire is spatially displaced by suitable electric fields with respect to the scatterers inside a semiconductor crystal. As a function of the wire position, the low-temperature resistance shows reproducible fluctuations. Their characteristic temperature scale is a few hundred millikelvin, indicating a phase-coherent effect. Each fluctuation corresponds to a single scatterer entering or leaving the wire. This way, scattering centers can be counted one by one.Comment: 4 pages, 3 figure

    NLOAD : an interactive, web-based modeling tool for nitrogen management in estuaries

    Get PDF
    Author Posting. © Ecological Society of America, 2007. This article is posted here by permission of Ecological Society of America for personal use, not for redistribution. The definitive version was published in Ecological Applications 17, Supple. (2007): S17–S30, doi:10.1890/05-1460.1.Eutrophication of estuaries is an increasing global concern that requires development of new tools to identify causes, quantify conditions, and propose management options that address this environmental problem. Since eutrophication is often associated with increased inputs of land-derived nitrogen to estuaries, we developed NLOAD, a user-friendly, web-based tool that brings together six different published models that predict nitrogen loading to estuaries and two models that estimate nitrogen concentrations in coastal waters. Here we describe each of the models, demonstrate how NLOAD is designed to function, and then use the models in NLOAD to predict nitrogen loads to Barnegat Bay, New Jersey (USA). The four models that we used to estimate nitrogen loads to Barnegat Bay, when adjusted, all had similar results that matched well with measured values and indicated that Barnegat Bay receives roughly 26 kg N·ha−1·yr−1. Atmospheric deposition was the dominant source of nitrogen to Barnegat Bay, followed by fertilizer nitrogen. Wastewater in Barnegat Bay is diverted to an offshore outfall and contributes no nitrogen to the system. The NLOAD tool has an additional feature that allows managers to assess the effectiveness of a variety of management options to reduce nitrogen loads. We demonstrate this feature of NLOAD through simulations in which fertilizer inputs to the Barnegat Bay watershed are reduced. Even modest cutbacks in the use of fertilizers on agricultural fields and lawns can be shown to reduce the amount of N entering Barnegat Bay.Support for the NLOAD tool came from the Cooperative Institute for Coastal and Estuarine Environmental Technologies (CICEET, CICEET-UNH grants #02-610 and #04-833). Additional funding was received from Environmental Defense

    Acute inhibition of MEK suppresses congenital melanocytic nevus syndrome in a murine model driven by activated NRAS and Wnt signaling

    Get PDF
    Congenital melanocytic nevus (CMN) syndrome is the association of pigmented melanocytic nevi with extra-cutaneous features, classically melanotic cells within the central nervous system, most frequently caused by a mutation of NRAS codon 61. This condition is currently untreatable and carries a significant risk of melanoma within the skin, brain, or leptomeninges. We have previously proposed a key role for Wnt signaling in the formation of melanocytic nevi, suggesting that activated Wnt signaling may be synergistic with activated NRAS in the pathogenesis of CMN syndrome. Some familial pre-disposition suggests a germ-line contribution to CMN syndrome, as does variability of neurological phenotypes in individuals with similar cutaneous phenotypes. Accordingly, we performed exome sequencing of germ-line DNA from patients with CMN to reveal rare or undescribed Wnt-signaling alterations. A murine model harboring activated NRASQ61K and Wnt signaling in melanocytes exhibited striking features of CMN syndrome, in particular neurological involvement. In the first model of treatment for this condition, these congenital, and previously assumed permanent, features were profoundly suppressed by acute post-natal treatment with a MEK inhibitor. These data suggest that activated NRAS and aberrant Wnt signaling conspire to drive CMN syndrome. Post-natal MEK inhibition is a potential candidate therapy for patients with this debilitating condition
    corecore