Search results for " programmi"

showing 10 items of 1629 documents

Yet Another New Variant of Szász–Mirakyan Operator

2021

In this paper, we construct a new variant of the classical Szász–Mirakyan operators, Mn, which fixes the functions 1 and eax,x≥0,a∈R. For these operators, we provide a quantitative Voronovskaya-type result. The uniform weighted convergence of Mn and a direct quantitative estimate are obtained. The symmetry of the properties of the classical Szász–Mirakyan operator and of the properties of the new sequence is investigated. Our results improve and extend similar ones on this topic, established in the last decade by many authors.

SequencePure mathematicsPhysics and Astronomy (miscellaneous)weighted approximationGeneral MathematicsUniform convergenceMathematicsofComputing_GENERALEAX modeuniform convergenceExponential functionOperator (computer programming)Chemistry (miscellaneous)Convergence (routing)Computer Science (miscellaneous)QA1-939Szász–Mirakyan operatorsexponential functionsSymmetry (geometry)Yet anotherMathematicsMathematicsSymmetry
researchProduct

Lightweight BWT Construction for Very Large String Collections

2011

A modern DNA sequencing machine can generate a billion or more sequence fragments in a matter of days. The many uses of the BWT in compression and indexing are well known, but the computational demands of creating the BWT of datasets this large have prevented its applications from being widely explored in this context. We address this obstacle by presenting two algorithms capable of computing the BWT of very large string collections. The algorithms are lightweight in that the first needs O(m log m) bits of memory to process m strings and the memory requirements of the second are constant with respect to m. We evaluate our algorithms on collections of up to 1 billion strings and compare thei…

SequenceTheoretical computer scienceConstant (computer programming)BWTtext indexesComputer scienceString (computer science)Search engine indexingProcess (computing)Context (language use)next-generation sequencingAlphabetBWT; text indexes; next-generation sequencing
researchProduct

Lightweight algorithms for constructing and inverting the BWT of string collections

2013

Recent progress in the field of \{DNA\} sequencing motivates us to consider the problem of computing the Burrows‚ÄìWheeler transform (BWT) of a collection of strings. A human genome sequencing experiment might yield a billion or more sequences, each 100 characters in length. Such a dataset can now be generated in just a few days on a single sequencing machine. Many algorithms and data structures for compression and indexing of text have the \{BWT\} at their heart, and it would be of great interest to explore their applications to sequence collections such as these. However, computing the \{BWT\} for 100 billion characters or more of data remains a computational challenge. In this work we ad…

SequenceTheoretical computer scienceSettore INF/01 - InformaticaGeneral Computer ScienceComputer scienceString (computer science)Search engine indexingProcess (computing)Data_CODINGANDINFORMATIONTHEORYData structureField (computer science)Theoretical Computer ScienceBWTConstant (computer programming)Text indexeBWT; Text indexes; Next-generation sequencingText indexesNext-generation sequencingAlphabetAlgorithmAuxiliary memoryTheoretical Computer Science
researchProduct

Privacy Enhanced Device Access

2012

In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.

Service (business)AuthenticationIntegrated access deviceComputer scienceAuthentication protocolNetwork Access DeviceNetwork block deviceCryptographic protocolComputer securitycomputer.software_genreProtocol (object-oriented programming)computer
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct

Experimental Performance Evaluation of Cloud-Based Analytics-as-a-Service

2016

An increasing number of Analytics-as-a-Service solutions has recently seen the light, in the landscape of cloud-based services. These services allow flexible composition of compute and storage components, that create powerful data ingestion and processing pipelines. This work is a first attempt at an experimental evaluation of analytic application performance executed using a wide range of storage service configurations. We present an intuitive notion of data locality, that we use as a proxy to rank different service compositions in terms of expected performance. Through an empirical analysis, we dissect the performance achieved by analytic workloads and unveil problems due to the impedance…

Service (business)FOS: Computer and information sciencesDistributed databaseComputer sciencebusiness.industryReliability (computer networking)Distributed computingRank (computer programming)020206 networking & telecommunicationsCloud computing02 engineering and technologyData modelingperformance evaluationstorageComputer Science - Distributed Parallel and Cluster ComputingAnalytics0202 electrical engineering electronic engineering information engineeringDistributed Parallel and Cluster Computing (cs.DC)business
researchProduct

MAGICPL: A Generic Process Description Language for Distributed Pseudonymization Scenarios

2021

Abstract Objectives Pseudonymization is an important aspect of projects dealing with sensitive patient data. Most projects build their own specialized, hard-coded, solutions. However, these overlap in many aspects of their functionality. As any re-implementation binds resources, we would like to propose a solution that facilitates and encourages the reuse of existing components. Methods We analyzed already-established data protection concepts to gain an insight into their common features and the ways in which their components were linked together. We found that we could represent these pseudonymization processes with a simple descriptive language, which we have called MAGICPL, plus a relati…

Service (systems architecture)Biomedical ResearchComputer scienceProcess (engineering)computer.internet_protocolHealth InformaticsReuse03 medical and health sciences0302 clinical medicineHealth Information ManagementComponent (UML)Humans030212 general & internal medicinePseudonymizationComputer SecurityLanguageAdvanced and Specialized NursingClass (computer programming)Application programming interfacebusiness.industry030220 oncology & carcinogenesisSoftware engineeringbusinesscomputerConfidentialitySoftwareXMLMethods of Information in Medicine
researchProduct

Performance evaluation of differentiated access mechanisms effectiveness in 802.11 networks

2005

The IEEE 802.11e draft specification aims to extend the original 802.11 MAC protocol by introducing priority mechanisms able to manage bandwidth and resource allocation according to the QoS needs of real-time applications. Different strategies based on MAC parameter diversifications, such as contention window limits, contention window updating factor and silence monitoring time, can be pursued in order to provide service differentiation, also in the case of distributed access. In this paper, we investigate on the behaviour of each differentiation possibility under different load conditions and traffic requirements. Our results show that the most powerful mechanisms which provide service dif…

Service (systems architecture)Order (exchange)business.industryComputer scienceQuality of serviceWireless lanBandwidth (computing)Resource allocationWindow (computing)businessProtocol (object-oriented programming)Computer network
researchProduct

Mobile agents and grid computing

2004

Publisher Summary This chapter describes mobile agents as an effective solution for grid service provision. A short overview is first introduced on the grid paradigm and the most known research activities in the field. Then, mobile agents are discussed and a comparison with the remote procedure call (RPC) method is made as far as the most effective solution to minimize network overload and fault occurrences is concerned. The common feature of all grid architectures is a coordinated and controlled resource sharing between the members of a dynamic multi-institutional virtual community. Community members agree on a set of sharing rules and permissions, by which resources to be shared and membe…

Service (systems architecture)Semantic gridGrid computingComputer scienceRemote procedure callDistributed computingInteroperabilityGridcomputer.software_genreProtocol (object-oriented programming)computerShared resource
researchProduct

Improvement of a Service Level Negotiation Protocol using Formal Verification

2013

International audience; The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of the open medium of these technologies. In this context, we need to guarantee both quality of service and security for mobile users communications. In this paper, we present a protocol for service level negotiation which covers both quality of service and security and assigns a profile to each user in order to optimize and a…

Service delivery frameworkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Service Level02 engineering and technologyNegotiation protocolComputer securitycomputer.software_genre[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringProtocol (object-oriented programming)Formal verificationPROMELAcomputer.programming_language060201 languages & linguistics[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryWireless networkQuality of service06 humanities and the artsFormal verificationSecurity servicePromelaSPINService level0602 languages and literature020201 artificial intelligence & image processingThe InternetMobile telephonyFSM modelbusinesscomputerComputer network
researchProduct