3,967 research outputs found

    Guest editorial SACMAT 2009 and 2010

    Get PDF

    A multi-layer framework for personalized social tag-based applications

    Get PDF
    Recent years have seen an increasing diffusion of online communities giving their members the ability of specifying and sharing metadata concerning online resources. Such practice, also known as social or collaborative tagging, has the purpose of collecting and sharing opinions about Web resources and simplifying their retrieval. In this paper, we go one step further and show how tags can have more enhanced applications to be exploited for customizing Web content fruition. More precisely, we propose a multi-layer framework where data collected by social tagging communities are complemented with additional services. Such services provide users the ability of expressing their dis/agreement with existing tags, denoting the members they trust based on their characteristics and relationships, or specifying policies on which "quality" assessment of resources should be returned. Besides providing the formal specification of the proposed framework, we illustrate two case studies we have implemented and the experiments we have carried out in order to verify the feasibility of our approach

    Shearfree perfect fluids with solenoidal magnetic curvature and a gamma-law equation of state

    Full text link
    We show that shearfree perfect fluids obeying an equation of state p=(gamma -1) mu are non-rotating or non-expanding under the assumption that the spatial divergence of the magnetic part of the Weyl tensor is zero.Comment: 11 page

    SoNeUCON_{ABC}Pro: an access control model for social networks with translucent user provenance

    Get PDF
    Proceedings of: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017Web-Based Social Networks (WBSNs) are used by millions of people worldwide. While WBSNs provide many benefits, privacy preservation is a concern. The management of access control can help to assure data is accessed by authorized users. However, it is critical to provide sufficient flexibility so that a rich set of conditions may be imposed by users. In this paper we coin the term user provenance to refer to tracing users actions to supplement the authorisation decision when users request access. For example restricting access to a particular photograph to those which have “liked” the owners profile. However, such a tracing of actions has the potential to impact the privacy of users requesting access. To mitigate this potential privacy loss the concept of translucency is applied. This paper extends SoNeUCONABC model and presents SoNeUCONABCPro, an access control model which includes translucent user provenance. Entities and access control policies along with their enforcement procedure are formally defined. The evaluation demonstrates that the system satisfies the imposed goals and supports the feasibility of this model in different scenarios.This work was supported by the MINECO grants TIN2013-46469-R (SPINY: Security and Privacy in the Internet of You) and TIN2016-79095-C2-2-R (SMOG-DEV); by the CAM grant S2013/ICE-3095 (CIBERDINE: Cybersecurity, Data, and Risks); and by the Programa de Ayudas para la Movilidad of Carlos III University of Madrid, Spain (J. M. de Fuentes and L. Gonzalez-Manzano grants)

    A System to Filter Unwanted Messages from OSN User Walls

    Get PDF
    This paper proposes a system allowing OSN users to have a direct control on the messages posted on their walls. This is achieved through a flexible rule-based system, that allows users to customize the filtering criteria to be applied to their walls, and a Machine Learning based soft classifier automatically labeling messages in support of content-based filtering

    Quarkonium production in ultra-relativistic nuclear collisions: suppression vs. enhancement

    Get PDF
    After a brief review of the various scenarios for quarkonium production in ultra-relativistic nucleus-nucleus collisions we focus on the ingredients and assumptions underlying the statistical hadronization model. We then confront model predictions for J/ψ\psi phase space distributions with the most recent data from the RHIC accelerator. Analysis of the rapidity dependence of the J/ψ\psi nuclear modification factor yields first evidence for the production of J/ψ\psi mesons at the phase boundary. We conclude with predictions for charmonium production at the LHC.Comment: 8 pages, 6 figures, invited paper, Quark Matter 2006 conference, Shanghai, submitted to J. Phys.

    Measuring the Charged Particle Multiplicity with ALICE

    Full text link
    The charged particle multiplicity distribution is one of the first measurements that ALICE will be able to perform. The knowledge of this basic property at a new energy is needed to configure Monte Carlo generators correctly with the aim of understanding the background of other, especially rare, processes including new physics. It allows to study the scaling behaviour and to verify model predictions. The unfolding of the measurement is a non-trivial task due to the finite precision and acceptance of the detector. Solutions are based on chi2 minimization or iteratively using Bayes' theorem. Both approaches to unfold the spectrum are presented. Furthermore, the capabilities of the SPD fast OR trigger are shown that enable physics at very high multiplicities.Comment: Proceedings of poster presentation at Quark Matter 2008, 20th International Conference on Ultra-Relativistic Nucleus-Nucleus Collisions in Jaipur, India; to be published in Indian Journal of Physics; 4 pages, 4 figure

    Cross sections for geodesic flows and \alpha-continued fractions

    Full text link
    We adjust Arnoux's coding, in terms of regular continued fractions, of the geodesic flow on the modular surface to give a cross section on which the return map is a double cover of the natural extension for the \alpha-continued fractions, for each α\alpha in (0,1]. The argument is sufficiently robust to apply to the Rosen continued fractions and their recently introduced \alpha-variants.Comment: 20 pages, 2 figure
    • 

    corecore