Search results for " Soft"

showing 10 items of 1710 documents

Efficient Protection for VDI Workstations

2019

Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…

021110 strategic defence & security studiesCPU power dissipationWorkstationComputer sciencebusiness.industry0211 other engineering and technologiesControl softwareSingle serverCloud computing02 engineering and technologycomputer.software_genreVirtualizationlaw.inventionlawControl system0202 electrical engineering electronic engineering information engineeringOperating system020201 artificial intelligence & image processingSingle-corebusinesscomputer2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
researchProduct

Self-validating bundles for flexible data access control

2016

Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…

021110 strategic defence & security studiesbundle information-centric security access policy bytecodeComputer sciencebusiness.industrySettore ING-INF/03 - Telecomunicazioni0211 other engineering and technologies020207 software engineeringAccess controlCloud computing02 engineering and technologyClient-sideComputer securitycomputer.software_genreMetadataData access0202 electrical engineering electronic engineering information engineeringData Protection Act 1998businesscomputerAccess structure
researchProduct

Towards a Security Competence of Software Developers

2020

Software growth has been explosive as people depend heavily on software on daily basis. Software development is a human-intensive effort, and developers' competence in software security is essential for secure software development. In addition, ubiquitous computing provides an added complexity to software security. Studies have treated security competences of software developers as a subsidiary of security engineers' competence instead of software engineers' competence, limiting the full knowledge of the security competences of software developers. This presents a crucial challenge for developers, educators, and users to maintain developers' competences in security. As a first step in pushi…

021110 strategic defence & security studiesohjelmistokehittäjätKnowledge managementbusiness.industryComputer scienceohjelmistotuotanto0211 other engineering and technologies020207 software engineering02 engineering and technologySoftwarekompetenssi0202 electrical engineering electronic engineering information engineeringammattitaitotietoturvaohjelmistokehitysbusinessCompetence (human resources)
researchProduct

Finding Software Bugs in Embedded Devices

2021

AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapt…

021110 strategic defence & security studiessulautettu tietotekniikkaComputer sciencebusiness.industryembedded devices0211 other engineering and technologies020207 software engineering02 engineering and technologysecurityField (computer science)Domain (software engineering)Embedded softwareSoftwareSoftware bugohjelmointivirheetSoftware deploymentEmbedded systemsoftware bugs0202 electrical engineering electronic engineering information engineeringtietoturvabusinessInternet of ThingsGeneral purpose software
researchProduct

Virtual and Augmented Reality Mirrors for Mental Health Treatment

2020

Virtual and Augmented Reality are technologies widely used in a variety of areas, including the medical sector. On the other hand, regular mirrors have been traditionally used as tools to aid in mental health treatment for a variety of diseases and disorders. Although it is possible to build Virtual and Augmented Reality experiences based on mirror metaphors, there are very few contributions of this kind in the medical sector. In this chapter, the great benefits that regular mirrors have brought for mental health treatment are addressed. In addition, a review on the state of the art in mirror-based Virtual and Augmented Reality applications is given, highlighting the potential benefits that…

03 medical and health sciences0302 clinical medicineApplied psychology0202 electrical engineering electronic engineering information engineering020207 software engineeringAugmented reality02 engineering and technologyPsychologyMental health treatment030217 neurology & neurosurgery
researchProduct

Epidemiology and Microbiology of Skin and Soft Tissue Infections: Preliminary Results of a National Registry

2018

Skin and soft tissue infections (SSTIs) represent a wide range of clinical conditions characterized by a considerable variety of clinical presentations and severity. Their aetiology can also vary, with numerous possible causative pathogens. While other authors previously published analyses on several types of SSTI and on restricted types of patients, we conducted a large nationwide surveillance programme on behalf of the Italian Society of Infectious and Tropical Diseases to assess the clinical and microbiological characteristics of the whole SSTI spectrum, from mild to severe life-threatening infections, in both inpatients and outpatients. Twenty-five Infectious Diseases (ID) Centres throu…

0301 basic medicineAdultMalemedicine.medical_specialtyAdolescentEpidemiology030106 microbiologySocio-culturaleregistryEpidemiology; microbiology; registry; skin and soft tissue infections; Oncology; Pharmacology; Pharmacology (medical); Infectious Diseases03 medical and health sciencesEpidemiology microbiology skin and soft tissue infections registryYoung Adult0302 clinical medicineskin and soft tissue infectionEpidemiologymedicineHumansPharmacology (medical)RegistriesSkin Diseases InfectiousAgedAged 80 and overPharmacologybusiness.industrySoft Tissue Infectionsmicrobiologyfood and beveragesSoft tissueMiddle AgedDermatologyskin and soft tissue infectionsInfectious DiseasesItalyOncology030220 oncology & carcinogenesisEtiologyFemaleNational registrybusiness
researchProduct

Dry selection and wet evaluation for the rational discovery of new anthelmintics

2017

Helminths infections remain a major problem in medical and public health. In this report, atom-based 2D bilinear indices, a TOMOCOMD-CARDD (QuBiLs-MAS module) molecular descriptor family and linear discriminant analysis (LDA) were used to find models that differentiate among anthelmintic and non-anthelmintic compounds. Two classification models obtained by using non-stochastic and stochastic 2D bilinear indices, classified correctly 86.64% and 84.66%, respectively, in the training set. Equation 1(2) correctly classified 141(135) out of 165 [85.45%(81.82%)] compounds in external validation set. Another LDA models were performed in order to get the most likely mechanism of action of anthelmin…

0301 basic medicineBiophysicsNon-stochastic and stochastic atom-based bilinear indicesBilinear interpolationLDA-based QSAR modelQuBiLs-MAS module01 natural sciencesSet (abstract data type)03 medical and health sciencesMolecular descriptorStatisticsPhysical and Theoretical ChemistryMolecular BiologySelection (genetic algorithm)MathematicsFree and open source softwareTraining setTOMOCOMD-CARDD softwareExternal validationAnthelmintic activityAtom (order theory)Computational creeningCondensed Matter PhysicsLinear discriminant analysis0104 chemical sciencesIndazole010404 medicinal & biomolecular chemistry030104 developmental biologyLead generationMolecular Physics
researchProduct

Collective behavior of quorum-sensing run-and-tumble particles in confinement

2016

We study a generic model for quorum-sensing bacteria in circular confinement. Every bacterium produces signaling molecules, the local concentration of which triggers a response when a certain threshold is reached. If this response lowers the motility then an aggregation of bacteria occurs, which differs fundamentally from standard motility-induced phase separation due to the long-ranged nature of the concentration of signal molecules. We analyze this phenomenon analytically and by numerical simulations employing two different protocols leading to stationary cluster and ring morphologies, respectively.

0301 basic medicineCollective behaviorGeneral Physics and AstronomyFOS: Physical sciencesNanotechnologyCondensed Matter - Soft Condensed MatterBacterial Physiological Phenomena01 natural sciencesSignalModels BiologicalQuantitative Biology::Cell BehaviorQuantitative Biology::Subcellular Processes03 medical and health sciences0103 physical sciencesCell Behavior (q-bio.CB)Cluster (physics)Physics - Biological Physics010306 general physicsCondensed Matter - Statistical MechanicsPhysicsStatistical Mechanics (cond-mat.stat-mech)ChemotaxisQuorum SensingQuorum sensing030104 developmental biologyChemical physicsBiological Physics (physics.bio-ph)FOS: Biological sciencesQuantitative Biology - Cell BehaviorSoft Condensed Matter (cond-mat.soft)
researchProduct

Cohesive Model for the Simulation of Crack Initiation and Propagation in Mixed-Mode I/II in Composite Materials

2019

A cohesive element able to connect and simulate crack growth between independently modeled finite element subdomains with non-matching meshes is proposed and validated. The approach is based on penalty constraints and has several advantages over conventional FE techniques in disconnecting two regions of a model during crack growth. The most important is the ability to release portion of the interface that are smaller than the local finite element length. Thus, the growth of delamination is not limited to advancing by releasing nodes of the FE model, which is a limitation common to the methods found in the literature. Furthermore, it is possible to vary the penalty parameter within the cohes…

0301 basic medicineCommercial softwareCohesive elementMaterials science030102 biochemistry & molecular biologyInterface (computing)Delamination02 engineering and technologyFinite element . Cohesive element . Penalty method . Composite materials . Delamination . Mixed-mode propagation021001 nanoscience & nanotechnologyMixed modeFinite element method03 medical and health sciencesSettore ING-IND/14 - Progettazione Meccanica E Costruzione Di MacchineCeramics and CompositesPenalty methodPolygon meshComposite material0210 nano-technology
researchProduct

On the Use of Binary Trees for DNA Hydroxymethylation Analysis

2017

DNA methylation (mC) and hydroxymethylation (hmC) can have a significant effect on normal human development, health and disease status. Hydroxymethylation studies require specific treatment of DNA, as well as software tools for their analysis. In this paper, we propose a parallel software tool for analyzing the DNA hydroxymethylation data obtained by TAB-seq. The software is based on the use of binary trees for searching the different occurrences of methylation and hydroxymethylation in DNA samples. The binary trees allow to efficiently store and access the information about the methylation of each methylated/hydroxymethylated cytosines in the samples. Evaluation results shows that the perf…

0301 basic medicineDNA Hydroxymethylation020203 distributed computingBinary treebusiness.industryComputer science02 engineering and technologyMethylationComputational biologySupercomputer03 medical and health scienceschemistry.chemical_compound030104 developmental biologySoftwareParallel softwarechemistryDNA methylation0202 electrical engineering electronic engineering information engineeringheterocyclic compoundsbusinessDNA
researchProduct