3,518 research outputs found
On trust and privacy in context-aware systems
Recent advances in networking, handheld computing and sensors technologies have led to the emergence of context-aware systems. The vast amounts of personal information collected by such systems has led to growing concerns about the privacy of their users. Users concerned about their private information are likely to refuse participation in such systems. Therefore, it is quite clear that for any context-aware system to be acceptable by the users, mechanisms for controlling access to personal information are a necessity. According to Alan Westin "privacy is the claim of individuals, groups, or institutions to determine for themselves when, how and to what extent information is communicated to others"1. Within this context we can classify users as either information owners or information receivers. It is also acknowledged that information owners are willing to disclose personal information if this disclosure is potentially beneficial. So, the acceptance of any context-aware system depends on the provision of mechanisms for fine-grained control of the disclosure of personal information incorporating an explicit notion of benefit
Privacy, security, and trust issues in smart environments
Recent advances in networking, handheld computing and sensor technologies have driven forward research towards the realisation of Mark Weiser's dream of calm and ubiquitous computing (variously called pervasive computing, ambient computing, active spaces, the disappearing computer or context-aware computing). In turn, this has led to the emergence of smart environments as one significant facet of research in this domain. A smart environment, or space, is a region of the real world that is extensively equipped with sensors, actuators and computing components [1]. In effect the smart space becomes a part of a larger information system: with all actions within the space potentially affecting the underlying computer applications, which may themselves affect the space through the actuators. Such smart environments have tremendous potential within many application areas to improve the utility of a space. Consider the potential offered by a smart environment that prolongs the time an elderly or infirm person can live an independent life or the potential offered by a smart environment that supports vicarious learning
The SECURE collaboration model
The SECURE project has shown how trust can be made computationally tractable while retaining a reasonable connection with human and social notions of trust. SECURE has produced a well-founded theory of trust that has been tested and refined through use in real software such as collaborative spam filtering and electronic purse. The software comprises the SECURE kernel with extensions for policy specification by application developers. It has yet to be applied to large-scale, multi-domain distributed systems taking different application contexts into account. The project has not considered privacy in evidence distribution, a crucial issue for many application domains, including public services such as healthcare and police. The SECURE collaboration model has similarities with the trust domain concept, embodying the interaction set of a principal, but SECURE is primarily concerned with pseudonymous entities rather than domain-structured systems
Data processing method for a weak, moving telemetry signal
Method of processing data from a spacecraft, where the carrier has a low signal-to-noise ratio and wide unpredictable frequency shifts, consists of analogue recording of the noisy signal along with a high-frequency tone that is used as a clock to trigger a digitizer
An improved bound for the rigidity of linearly constrained frameworks
We consider the problem of characterising the generic rigidity of bar-joint
frameworks in Rd in which each vertex is constrained to lie in a given a ne subspace.
The special case when d = 2 was previously solved by I. Streinu and L. Theran in 2010
and the case when each vertex is constrained to lie in an a ne subspace of dimension t,
and d t(t 1) was solved by Cruickshank, Guler and the rst two authors in 2019. We
extend the latter result by showing that the given characterisation holds whenever d 2t
Shifting a Quantum Wire through a Disordered Crystal: Observation of Conductance Fluctuations in Real Space
A quantum wire is spatially displaced by suitable electric fields with
respect to the scatterers inside a semiconductor crystal. As a function of the
wire position, the low-temperature resistance shows reproducible fluctuations.
Their characteristic temperature scale is a few hundred millikelvin, indicating
a phase-coherent effect. Each fluctuation corresponds to a single scatterer
entering or leaving the wire. This way, scattering centers can be counted one
by one.Comment: 4 pages, 3 figure
NLOAD : an interactive, web-based modeling tool for nitrogen management in estuaries
Author Posting. © Ecological Society of America, 2007. This article is posted here by permission of Ecological Society of America for personal use, not for redistribution. The definitive version was published in Ecological Applications 17, Supple. (2007): S17–S30, doi:10.1890/05-1460.1.Eutrophication of estuaries is an increasing global concern that requires development of new tools to identify causes, quantify conditions, and propose management options that address this environmental problem. Since eutrophication is often associated with increased inputs of land-derived nitrogen to estuaries, we developed NLOAD, a user-friendly, web-based tool that brings together six different published models that predict nitrogen loading to estuaries and two models that estimate nitrogen concentrations in coastal waters. Here we describe each of the models, demonstrate how NLOAD is designed to function, and then use the models in NLOAD to predict nitrogen loads to Barnegat Bay, New Jersey (USA). The four models that we used to estimate nitrogen loads to Barnegat Bay, when adjusted, all had similar results that matched well with measured values and indicated that Barnegat Bay receives roughly 26 kg N·ha−1·yr−1. Atmospheric deposition was the dominant source of nitrogen to Barnegat Bay, followed by fertilizer nitrogen. Wastewater in Barnegat Bay is diverted to an offshore outfall and contributes no nitrogen to the system. The NLOAD tool has an additional feature that allows managers to assess the effectiveness of a variety of management options to reduce nitrogen loads. We demonstrate this feature of NLOAD through simulations in which fertilizer inputs to the Barnegat Bay watershed are reduced. Even modest cutbacks in the use of fertilizers on agricultural fields and lawns can be shown to reduce the amount of N entering Barnegat Bay.Support for the NLOAD tool came from the Cooperative
Institute for Coastal and Estuarine Environmental Technologies
(CICEET, CICEET-UNH grants #02-610 and #04-833).
Additional funding was received from Environmental Defense
Acute inhibition of MEK suppresses congenital melanocytic nevus syndrome in a murine model driven by activated NRAS and Wnt signaling
Congenital melanocytic nevus (CMN) syndrome is the association of pigmented melanocytic nevi with extra-cutaneous features, classically melanotic cells within the central nervous system, most frequently caused by a mutation of NRAS codon 61. This condition is currently untreatable and carries a significant risk of melanoma within the skin, brain, or leptomeninges. We have previously proposed a key role for Wnt signaling in the formation of melanocytic nevi, suggesting that activated Wnt signaling may be synergistic with activated NRAS in the pathogenesis of CMN syndrome. Some familial pre-disposition suggests a germ-line contribution to CMN syndrome, as does variability of neurological phenotypes in individuals with similar cutaneous phenotypes. Accordingly, we performed exome sequencing of germ-line DNA from patients with CMN to reveal rare or undescribed Wnt-signaling alterations. A murine model harboring activated NRASQ61K and Wnt signaling in melanocytes exhibited striking features of CMN syndrome, in particular neurological involvement. In the first model of treatment for this condition, these congenital, and previously assumed permanent, features were profoundly suppressed by acute post-natal treatment with a MEK inhibitor. These data suggest that activated NRAS and aberrant Wnt signaling conspire to drive CMN syndrome. Post-natal MEK inhibition is a potential candidate therapy for patients with this debilitating condition
Recommended from our members
Effect of water-soluble polymers, polyethylene glycol and poly(vinylpyrrolidone),on the gelation of aqueous micellar solutions of Pluronic copolymer F127
The micellization of F127 (E98P67E98) in dilute aqueous solutions of polyethylene glycol (PEG6000 and
PEG35000) and poly(vinylpyrrolidone) (PVP K30 and PVP K90) is studied. The average hydrodynamic
radius (rh,app) obtained from the dynamic light scattering technique increased with increase in PEG concentration
but decreased on addition of PVP, results which are consistent with interaction of the micelles
with PEG and the formation of micelles clusters, but no such interaction occurs with PVP. Tube inversion
was used to determine the onset of gelation. The critical concentration of F127 for gelation increased on
addition of PEG and of PVP K30 but decreased on addition of PVP K90. Small-angle X-ray scattering
(SAXS) was used to show that the 30 wt% F127 gel structure (fcc) was independent of polymer type
and concentration, as was the d-spacing and so the micelle hard-sphere radius. The maximum elastic
modulus (G0
max) of 30 wt% F127 decreased from its value for water alone as PEG was added, but was little
changed by adding PVP. These results are consistent with the packed-micelles in the 30 wt% F127 gel
being effectively isolated from the polymer solution on the microscale while, especially for the PEG, being
mixed on the macroscale
- …