719 research outputs found
Eduardo Torroja y la International Association for Shell and Spatial Structures (IASS)
Eduardo Torroja’s legacy doesn’t limit to his innovative designs, or to his contributions to concrete structures and their codes development. Throw his life, he founded, or contributed to found, several associations, national and international, which as IASS (1959) are working nowadays leading the progress of civil and architectural construction.El legado de Eduardo Torroja no se limita a sus innovadores proyectos, o a sus aportaciones al cálculo y desarrollo del hormigón armado y pretensado. A lo largo de su vida, fundó, o contribuyó a fundar, diversas asociaciones, nacionales e internacionales que, como la IASS (1959), continúan vivas liderando el progreso de la construcción civil y arquitectónica
Page rank versus katz: is the centrality algorithm choice relevant to measure user influence in Twitter?
Microblogs, such as Twitter, have become an important socio-political analysis tool. One of the most important tasks in such analysis is the detection of relevant actors within a given topic through data mining, i.e., identifying who are the most influential participants discussing the topic. Even if there is no gold standard for such task, the adequacy of graph based centrality tools such as PageRank and Katz is well documented. In this paper, we present a case study based on a "London Riots'' Twitter database, where we show that Katz is not as adequate for the task of important actors detection since it fails to detect what we refer to as "indirect gloating'', the situation where an actor capitalizes on other actors referring to him.info:eu-repo/semantics/acceptedVersio
Strong HI Lyman- variations from the 11 Gyr-old host star Kepler-444: a planetary origin ?
Kepler-444 provides a unique opportunity to probe the atmospheric composition
and evolution of a compact system of exoplanets smaller than the Earth. Five
planets transit this bright K star at close orbital distances, but they are too
small for their putative lower atmosphere to be probed at optical/infrared
wavelengths. We used the Space Telescope Imaging Spectrograph instrument
onboard the Hubble Space Telescope to search for the signature of the planet's
upper atmospheres at six independent epochs in the Ly- line. We detect
significant flux variations during the transits of both Kepler-444e and f
(~20%), and also at a time when none of the known planets was transiting
(~40%). Variability in the transition region and corona of the host star might
be the source of these variations. Yet, their amplitude over short time scales
(~2-3 hours) is surprisingly strong for this old (11.2+-1.0Gyr) and apparently
quiet main-sequence star. Alternatively, we show that the in-transits
variations could be explained by absorption from neutral hydrogen exospheres
trailing the two outer planets (Kepler-444e and f). They would have to contain
substantial amounts of water to replenish such hydrogen exospheres, which would
reveal them as the first confirmed ocean-planets. The out-of-transit
variations, however, would require the presence of a yet-undetected Kepler-444g
at larger orbital distance, casting doubt on the planetary origin scenario.
Using HARPS-N observations in the sodium doublet, we derived the properties of
two Interstellar Medium clouds along the line-of-sight toward Kepler-444. This
allowed us to reconstruct the stellar Ly- line profile and to estimate
the XUV irradiation from the star, which would still allow for a moderate mass
loss from the outer planets after 11.2Gyr. Follow-up of the system at XUV
wavelengths will be required to assess this tantalizing possibility.Comment: Accepted for publication in A&A Name of the system added to the title
in most recent versio
Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them. This complex landscape has made it extremely difficult for security administrators to keep accurate and be effective in protecting their systems against cyber threats. In this paper, we describe our vision and scientific posture on how artificial intelligence techniques and a smart use of security knowledge may assist system administrators in better defending their networks. To that end, we put forward a research roadmap involving three complimentary axes, namely, (I) the use of FCA-based mechanisms for managing configuration vulnerabilities, (II) the exploitation of knowledge representation techniques for automated security reasoning, and (III) the design of a cyber threat intelligence mechanism as a CKDD process. Then, we describe a machine-assisted process for cyber threat analysis which provides a holistic perspective of how these three research axes are integrated together
- …