Search results for " Soft"
showing 10 items of 1710 documents
Efficient Protection for VDI Workstations
2019
Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…
Self-validating bundles for flexible data access control
2016
Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…
Towards a Security Competence of Software Developers
2020
Software growth has been explosive as people depend heavily on software on daily basis. Software development is a human-intensive effort, and developers' competence in software security is essential for secure software development. In addition, ubiquitous computing provides an added complexity to software security. Studies have treated security competences of software developers as a subsidiary of security engineers' competence instead of software engineers' competence, limiting the full knowledge of the security competences of software developers. This presents a crucial challenge for developers, educators, and users to maintain developers' competences in security. As a first step in pushi…
Finding Software Bugs in Embedded Devices
2021
AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapt…
Virtual and Augmented Reality Mirrors for Mental Health Treatment
2020
Virtual and Augmented Reality are technologies widely used in a variety of areas, including the medical sector. On the other hand, regular mirrors have been traditionally used as tools to aid in mental health treatment for a variety of diseases and disorders. Although it is possible to build Virtual and Augmented Reality experiences based on mirror metaphors, there are very few contributions of this kind in the medical sector. In this chapter, the great benefits that regular mirrors have brought for mental health treatment are addressed. In addition, a review on the state of the art in mirror-based Virtual and Augmented Reality applications is given, highlighting the potential benefits that…
Epidemiology and Microbiology of Skin and Soft Tissue Infections: Preliminary Results of a National Registry
2018
Skin and soft tissue infections (SSTIs) represent a wide range of clinical conditions characterized by a considerable variety of clinical presentations and severity. Their aetiology can also vary, with numerous possible causative pathogens. While other authors previously published analyses on several types of SSTI and on restricted types of patients, we conducted a large nationwide surveillance programme on behalf of the Italian Society of Infectious and Tropical Diseases to assess the clinical and microbiological characteristics of the whole SSTI spectrum, from mild to severe life-threatening infections, in both inpatients and outpatients. Twenty-five Infectious Diseases (ID) Centres throu…
Dry selection and wet evaluation for the rational discovery of new anthelmintics
2017
Helminths infections remain a major problem in medical and public health. In this report, atom-based 2D bilinear indices, a TOMOCOMD-CARDD (QuBiLs-MAS module) molecular descriptor family and linear discriminant analysis (LDA) were used to find models that differentiate among anthelmintic and non-anthelmintic compounds. Two classification models obtained by using non-stochastic and stochastic 2D bilinear indices, classified correctly 86.64% and 84.66%, respectively, in the training set. Equation 1(2) correctly classified 141(135) out of 165 [85.45%(81.82%)] compounds in external validation set. Another LDA models were performed in order to get the most likely mechanism of action of anthelmin…
Collective behavior of quorum-sensing run-and-tumble particles in confinement
2016
We study a generic model for quorum-sensing bacteria in circular confinement. Every bacterium produces signaling molecules, the local concentration of which triggers a response when a certain threshold is reached. If this response lowers the motility then an aggregation of bacteria occurs, which differs fundamentally from standard motility-induced phase separation due to the long-ranged nature of the concentration of signal molecules. We analyze this phenomenon analytically and by numerical simulations employing two different protocols leading to stationary cluster and ring morphologies, respectively.
Cohesive Model for the Simulation of Crack Initiation and Propagation in Mixed-Mode I/II in Composite Materials
2019
A cohesive element able to connect and simulate crack growth between independently modeled finite element subdomains with non-matching meshes is proposed and validated. The approach is based on penalty constraints and has several advantages over conventional FE techniques in disconnecting two regions of a model during crack growth. The most important is the ability to release portion of the interface that are smaller than the local finite element length. Thus, the growth of delamination is not limited to advancing by releasing nodes of the FE model, which is a limitation common to the methods found in the literature. Furthermore, it is possible to vary the penalty parameter within the cohes…
On the Use of Binary Trees for DNA Hydroxymethylation Analysis
2017
DNA methylation (mC) and hydroxymethylation (hmC) can have a significant effect on normal human development, health and disease status. Hydroxymethylation studies require specific treatment of DNA, as well as software tools for their analysis. In this paper, we propose a parallel software tool for analyzing the DNA hydroxymethylation data obtained by TAB-seq. The software is based on the use of binary trees for searching the different occurrences of methylation and hydroxymethylation in DNA samples. The binary trees allow to efficiently store and access the information about the methylation of each methylated/hydroxymethylated cytosines in the samples. Evaluation results shows that the perf…