850 research outputs found

    Ultrasound Imaging with Microbubbles

    Get PDF

    On the Unicity of Smartphone Applications

    Get PDF
    Prior works have shown that the list of apps installed by a user reveal a lot about user interests and behavior. These works rely on the semantics of the installed apps and show that various user traits could be learnt automatically using off-the-shelf machine-learning techniques. In this work, we focus on the re-identifiability issue and thoroughly study the unicity of smartphone apps on a dataset containing 54,893 Android users collected over a period of 7 months. Our study finds that any 4 apps installed by a user are enough (more than 95% times) for the re-identification of the user in our dataset. As the complete list of installed apps is unique for 99% of the users in our dataset, it can be easily used to track/profile the users by a service such as Twitter that has access to the whole list of installed apps of users. As our analyzed dataset is small as compared to the total population of Android users, we also study how unicity would vary with larger datasets. This work emphasizes the need of better privacy guards against collection, use and release of the list of installed apps.Comment: 10 pages, 9 Figures, Appeared at ACM CCS Workshop on Privacy in Electronic Society (WPES) 201

    Dovetail: Stronger Anonymity in Next-Generation Internet Routing

    Full text link
    Current low-latency anonymity systems use complex overlay networks to conceal a user's IP address, introducing significant latency and network efficiency penalties compared to normal Internet usage. Rather than obfuscating network identity through higher level protocols, we propose a more direct solution: a routing protocol that allows communication without exposing network identity, providing a strong foundation for Internet privacy, while allowing identity to be defined in those higher level protocols where it adds value. Given current research initiatives advocating "clean slate" Internet designs, an opportunity exists to design an internetwork layer routing protocol that decouples identity from network location and thereby simplifies the anonymity problem. Recently, Hsiao et al. proposed such a protocol (LAP), but it does not protect the user against a local eavesdropper or an untrusted ISP, which will not be acceptable for many users. Thus, we propose Dovetail, a next-generation Internet routing protocol that provides anonymity against an active attacker located at any single point within the network, including the user's ISP. A major design challenge is to provide this protection without including an application-layer proxy in data transmission. We address this challenge in path construction by using a matchmaker node (an end host) to overlap two path segments at a dovetail node (a router). The dovetail then trims away part of the path so that data transmission bypasses the matchmaker. Additional design features include the choice of many different paths through the network and the joining of path segments without requiring a trusted third party. We develop a systematic mechanism to measure the topological anonymity of our designs, and we demonstrate the privacy and efficiency of our proposal by simulation, using a model of the complete Internet at the AS-level

    Pasture condition guides for the Murchison River catchment

    Get PDF
    Knowledge of the pasture resource and its capabilities is essential to sustainable use of the rangelands. Rangeland managers must be able to recognise firstly the different pasture types, and secondly, the differences between present condition classes for each type. Both factors affect the stock carrying capacity, and appropriate pastoral management of a pasture. This guide has been produced for use by pastoralists to assist them to recognise and assess the condition of the perennial pasture resource of their own properties. The guide describes the condition states found in 10 of the most widespread pastures of the Murchison River catchment (Fig. 1). This region has been the subject of a detailed inventory and mapping, as part of the rangeland survey programme conducted in 1985-87 by the departments of Agriculture and Land Administration. Results of this survey provide the basis for this guide. The guide has been produced with funding support from the National Soil Conservation Programme as part of the Murchison Catchment Management Project

    Guidelines for Negotiating Scientific Collaboration

    Get PDF
    Whether it's sharing reagents with a laboratory on the other side of the world or working with the postdoc at the neighboring bench, some simple rules of collaboration might help

    Austerity, political control and supplier selection in English local government: implications for autonomy in multi-level systems

    Get PDF
    Analysis of 60,000 contracts awarded by English councils between 2015-19 reveals that austerity constraints are a key predictor of councils outsourcing services to for-profit suppliers, regardless of their political control. Conservative Party-controlled councils are also more likely to contract with for-profit suppliers, although we found no link between Labour-controlled councils and not-for-profit suppliers, nor evidence that political or budgetary factors influence whether councils contract with providers based in their own region. We argue that centrally imposed funding cuts, and a belief that for-profit suppliers represent a cheaper option, could be overriding Labour Party councils’ ideological preference for not-for-profit providers
    • …
    corecore