719 research outputs found

    Eduardo Torroja y la International Association for Shell and Spatial Structures (IASS)

    Get PDF
    Eduardo Torroja’s legacy doesn’t limit to his innovative designs, or to his contributions to concrete structures and their codes development. Throw his life, he founded, or contributed to found, several associations, national and international, which as IASS (1959) are working nowadays leading the progress of civil and architectural construction.El legado de Eduardo Torroja no se limita a sus innovadores proyectos, o a sus aportaciones al cálculo y desarrollo del hormigón armado y pretensado. A lo largo de su vida, fundó, o contribuyó a fundar, diversas asociaciones, nacionales e internacionales que, como la IASS (1959), continúan vivas liderando el progreso de la construcción civil y arquitectónica

    Page rank versus katz: is the centrality algorithm choice relevant to measure user influence in Twitter?

    Get PDF
    Microblogs, such as Twitter, have become an important socio-political analysis tool. One of the most important tasks in such analysis is the detection of relevant actors within a given topic through data mining, i.e., identifying who are the most influential participants discussing the topic. Even if there is no gold standard for such task, the adequacy of graph based centrality tools such as PageRank and Katz is well documented. In this paper, we present a case study based on a "London Riots'' Twitter database, where we show that Katz is not as adequate for the task of important actors detection since it fails to detect what we refer to as "indirect gloating'', the situation where an actor capitalizes on other actors referring to him.info:eu-repo/semantics/acceptedVersio

    Strong HI Lyman-α\alpha variations from the 11 Gyr-old host star Kepler-444: a planetary origin ?

    Full text link
    Kepler-444 provides a unique opportunity to probe the atmospheric composition and evolution of a compact system of exoplanets smaller than the Earth. Five planets transit this bright K star at close orbital distances, but they are too small for their putative lower atmosphere to be probed at optical/infrared wavelengths. We used the Space Telescope Imaging Spectrograph instrument onboard the Hubble Space Telescope to search for the signature of the planet's upper atmospheres at six independent epochs in the Ly-α\alpha line. We detect significant flux variations during the transits of both Kepler-444e and f (~20%), and also at a time when none of the known planets was transiting (~40%). Variability in the transition region and corona of the host star might be the source of these variations. Yet, their amplitude over short time scales (~2-3 hours) is surprisingly strong for this old (11.2+-1.0Gyr) and apparently quiet main-sequence star. Alternatively, we show that the in-transits variations could be explained by absorption from neutral hydrogen exospheres trailing the two outer planets (Kepler-444e and f). They would have to contain substantial amounts of water to replenish such hydrogen exospheres, which would reveal them as the first confirmed ocean-planets. The out-of-transit variations, however, would require the presence of a yet-undetected Kepler-444g at larger orbital distance, casting doubt on the planetary origin scenario. Using HARPS-N observations in the sodium doublet, we derived the properties of two Interstellar Medium clouds along the line-of-sight toward Kepler-444. This allowed us to reconstruct the stellar Ly-α\alpha line profile and to estimate the XUV irradiation from the star, which would still allow for a moderate mass loss from the outer planets after 11.2Gyr. Follow-up of the system at XUV wavelengths will be required to assess this tantalizing possibility.Comment: Accepted for publication in A&A Name of the system added to the title in most recent versio

    Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery

    Get PDF
    Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them. This complex landscape has made it extremely difficult for security administrators to keep accurate and be effective in protecting their systems against cyber threats. In this paper, we describe our vision and scientific posture on how artificial intelligence techniques and a smart use of security knowledge may assist system administrators in better defending their networks. To that end, we put forward a research roadmap involving three complimentary axes, namely, (I) the use of FCA-based mechanisms for managing configuration vulnerabilities, (II) the exploitation of knowledge representation techniques for automated security reasoning, and (III) the design of a cyber threat intelligence mechanism as a CKDD process. Then, we describe a machine-assisted process for cyber threat analysis which provides a holistic perspective of how these three research axes are integrated together
    corecore