250 research outputs found

    On Being Socialized Out of the Human Sexual Response in the Later Years

    Get PDF
    We now know, with the conclusive findings of the Masters and Johnson study of sex with elderly, that maintaining the regularity of sexual expression coupled with adequate physical well being and healthy mental orientation to the aging process will combine to provide a sexually stimulative marriage [and/or relationships]. This climate will, in turn, improve sexual tension and provide a capacity for sexual performance that frequently may extend to and beyond the 80-year age level (Masters and Johnson, 1968, p. 279). This acknowledgement has ended the long silence and may well herald the beginning of the throwing off of the shackles of sex repression. The consensus that sex stops at sixty is being challenged; knowledge and attitudes of the human sexual condition in late life are being affected and modified. Sex is being seen as a natural physiological function. Aging itself is not the cause of cessation of sexual activity. There is a growing acceptance of the fact that there is no time limit drawn by the advancing years of female sexuality and for the male too there is a capacity for sexual performance that frequently may extend beyond the eighty year age level (Rubin, 1966). The potential for erotic pleasure seems to begin with birth and does not need to end till death (Kaplan, 1974, p. 104). It appears that there is no limit to the sexual capacity of aging females and that changes of the male do not reduce the need for satisfactory expression

    Panda: Neighbor Discovery on a Power Harvesting Budget

    Full text link
    Object tracking applications are gaining popularity and will soon utilize Energy Harvesting (EH) low-power nodes that will consume power mostly for Neighbor Discovery (ND) (i.e., identifying nodes within communication range). Although ND protocols were developed for sensor networks, the challenges posed by emerging EH low-power transceivers were not addressed. Therefore, we design an ND protocol tailored for the characteristics of a representative EH prototype: the TI eZ430-RF2500-SEH. We present a generalized model of ND accounting for unique prototype characteristics (i.e., energy costs for transmission/reception, and transceiver state switching times/costs). Then, we present the Power Aware Neighbor Discovery Asynchronously (Panda) protocol in which nodes transition between the sleep, receive, and transmit states. We analyze \name and select its parameters to maximize the ND rate subject to a homogeneous power budget. We also present Panda-D, designed for non-homogeneous EH nodes. We perform extensive testbed evaluations using the prototypes and study various design tradeoffs. We demonstrate a small difference (less then 2%) between experimental and analytical results, thereby confirming the modeling assumptions. Moreover, we show that Panda improves the ND rate by up to 3x compared to related protocols. Finally, we show that Panda-D operates well under non-homogeneous power harvesting

    Theoretical Bounds on Control-Plane Self-Monitoring in Routing Protocols

    Get PDF
    Routing protocols rely on the cooperation of nodes in the network to both forward packets and to select the forwarding routes. There have been several instances in which an entire network's routing collapsed simply because a seemingly insignificant set of nodes reported erroneous routing information to their neighbors. It may have been possible for other nodes to trigger an automated response and prevent the problem by analyzing received routing information for inconsistencies that revealed the errors. Our theoretical study seeks to understand when nodes can detect the existence of errors in the implementation of route selection elsewhere in the network through monitoring their own routing states for inconsistencies. We start by constructing a methodology, called Strong-Detection, that helps answer the question. We then apply Strong-Detection to three classes of routing protocols: distance-vector, path-vector, and link-state. For each class, we derive low-complexity, self-monitoring algorithms that use the routing state created by these routing protocols to identify any detectable anomalies. These algorithms are then used to compare and contrast the self-monitoring power these various classes of protocols possess. We also study the trade-off between their state-information complexity and ability to identify routing anomalies

    Distributed Algorithms for Secure Multipath Routing in Attack-Resistant Networks

    Full text link

    Bandwidth-Sharing Schemes for Multiple Multi-Party Sessions

    Get PDF
    A recent means for enabling multicast in the Internet involves deploying network overlays where end-systems participate in the forwarding of data to other end-systems. The use of overlays not only permits individual sessions to simultaneously structure their communication trees atop unicast-only networks, but also gives the session greater flexibility when forming the topology of the forwarding tree. Even though multiple sessions are often expected to compete for the same network overlay resources, most work to date assumes that overlay protocols operate as though each session has isolated access to the available overlay resources. We consider two algorithms that build depth-bounded overlay trees where each node's outgoing bandwidth constrains the number of nodes to which it can directly forward data. One algorithm tries to cluster a node's available bandwidth within a single tree, the other tries to disperse the available bandwidth among multiple trees. We prove analytically that when node capacities are identical and session requirements are identical that a clustering approach will increase the number of sessions that can co-exist. However, simulation results reveal that in heterogeneous networking environments or in environments where session participants vary with time, the dispersing algorithm outperforms the clustering algorithm. These results can be used to guide future development of overlay protocols that must partition resources among multiple sessions

    Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces

    Get PDF
    Protocols for generic secure multi-party computation (MPC) come in two forms: they either represent the function being computed as a boolean circuit, or as an arithmetic circuit over a large field. Either type of protocol can be used for any function, but the choice of which type of protocol to use can have a significant impact on efficiency. The magnitude of the effect, however, has never been quantified. With this in mind, we implement the MPC protocol of Goldreich, Micali, and Wigderson, which uses a boolean representation and is secure against a semi-honest adversary corrupting any number of parties. We then consider applications of secure MPC in on-line marketplaces, where customers select resources advertised by providers and it is desired to ensure privacy to the extent possible. Problems here are more naturally formulated in terms of boolean circuits, and we study the performance of our MPC implementation relative to existing ones that use an arithmetic-circuit representation. Our protocol easily handles tens of customers/providers and thousands of resources, and outperforms existing implementations including FairplayMP, VIFF, and SEPIA
    • …
    corecore