Search results for "Access"

showing 10 items of 1232 documents

Optimal Resource Allocation in Multi-Hop Networks: Contention vs. Scheduling

2014

CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is actually the most used method in ad-hoc networks for transmitting on a contending medium, even if it shows poor performance in presence of hidden nodes. To increase performance, we propose an algorithm that combines CSMA and TDMA (Time Division Multiple Access) approaches. The adopted solution consists of grouping contending nodes in non-interfering subsets and granting a different numbers of time slots to different groups, while using the CSMA to manage medium access among nodes belonging to the same subset. An optimization procedure to assign the time slots to each subset of nodes and to find an equilibrium between contention …

resource allocation; multi hop neworksSettore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryDistributed computingMulti-frequency time division multiple accessComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessresource allocationComputer Science Applications1707 Computer Vision and Pattern Recognitionmulti hop neworksHop (networking)Carrier-sense multiple accessScheduling (computing)resource allocation multi hop neworksComputer Networks and CommunicationSettore ING-INF/04 - AutomaticaControl and Systems EngineeringChannel access methodbusinessInformation SystemsComputer network
researchProduct

Accessibilità e fruibilità dei centri storici: un’opportunità per il Restauro

2020

L’eguaglianza di tutti, nel rispetto delle diversità, è un diritto costituzionale e contempla anche il diritto di tutti alla trasmissione di quei valori dell’architettura storica, riconosciuti e tutelati dal restauro. Valori che sono patrimonio collettivo, da conservare, trasmettere e fruire sia per le generazioni future che per quelle attuali. È difficile, quindi, pensare ad “una legge, o ad una teoria che voglia tutelare il monumento e non le persone, ad una cultura che prescinda dall’uso nel senso più ampio del termine”. Difatti, a distanza di trent’anni dall’emanazione in Italia della legge 41 del 1986, per l’introduzione dei Piani di Eliminazione delle Barriere Architettoniche (PEBA) e…

restauro accessibilità centro storico normativa tecnologie informaticheSettore ICAR/19 - Restauro
researchProduct

New centrality in UNESCO buffer-zones: two Mediterranean case studies. Per una nuova centralità delle buffer-zones UNESCO: due casi studio nel Medite…

2022

The paper presents an interdisciplinary reflection on the potential for sustainable development of communities and their cultural landscapes expressed by UNESCO Buffer Zones in the Mediterranean, with the intention of transforming their widespread perception as mere tools of protection and urban planning into concrete integrated proposals for protection and enhancement, and also taking into account the role of museums in promoting the understanding of cultural heritage and the maturation of an awareness of the value of such actions. With reference to the 2004 guidelines UNESCO and starting from the evaluation of some management plans, such as that of the Arab-Norman itinerary in Palermo and…

restoration museography Buffer Zones enhancement of cultural heritage physical and cultural accessibilitySettore ICAR/19 - Restauro
researchProduct

A "best practice" for inclusive art cities: the case study of the I-Access project

2022

The essay aims to illustrate the results of the I-Access Interreg Italia Malta 2016-20 project, conducted by a partnership led by the Department of Architecture, University of Palermo, with the scientific coordination of Renata Prescia. The project involved the Vucciria district in Palermo and the Bijcceria district in Valletta. Within the range of products that have been created (including database, web platform, mobile apps, protocol), in this essay we want to illustrate the actions implemented to facilitate both physical and cultural accessibility, from the integrated points of view between restoration and exhibition design. They are actions for overcoming of architectural barriers, cult…

restoration physical and cultural accessibility exhibition designSettore ICAR/16 - Architettura Degli Interni E AllestimentoSettore ICAR/19 - Restauro
researchProduct

Access to European Institutions

2022

In this publication, I talk about the right of access to European institutions

right of access to european institutionUNESCO::CIENCIAS JURÍDICAS Y DERECHO::Derecho internacionalcitizenship of the european unioneuropean union
researchProduct

Il principio dell’insindacabilità della valutazione del merito creditizio alla prova dei miniprestiti emergenziali integralmente coperti da garanzia …

2022

Article 13, lett. m), of law decree n. 23/2020 introduced some measures in order to expand firm’s access to credit and counter the negative effects of COVID-19 pandemic. After providing an historical view of the italian legislation in the field of pubblic credit, the two authors argue that the aforementioned article, which in their view introduce a right to credit, is not an isolated case, given that the legislator had already introduced limits to the private autonomy of banks in presence of public subsidies. Moreover, according to the authors the duty to make credit and the limits and restrictive conditions for access to credit provided for by law exclude civil or criminal liability for un…

right to credit.Settore IUS/05 - Diritto Dell'Economiacovid-19 pandemicprivate autonomyaccess to credit
researchProduct

Diamo i numeri

2021

Resoconto sugli accessi alla rivista Archivio Antropologico Mediterraneo dal 2018 a oggi in Open Access

rivista archivio antropologico mediterraneo open access numero accessiSettore M-DEA/01 - Discipline Demoetnoantropologiche
researchProduct

The Institution of Security Agent: A Comparative Study of Polish and French Laws

2022

In many continental legal systems it was often problematic to grant a security right to an entity separate from the holder(s) of the secured receivables. Such arrangement was especially desired by the parties in complex lending structures with many creditors. To solve this problem various legal solutions have been created in different countries. In Poland and in France the special institution of a security agent has been introduced. Aim of this article is to compare those two regulations. The conclusion is that the French provisions better deals with the challenges posed by the entity separation problem. Security agent, collective security arrangements, entity separation, unity principle, s…

security rightsaccessoriness of security rightsSecurity agentcollective security arrangementsbond issueLawsecurity interestentity separationunity principlesyndicated loan
researchProduct

Opportunistic Synchronization for Improving IEEE 802.15.4 MAC Performance in Chain Topologies

2010

The most effective solution for energy saving in low-rate wireless sensor networks is maintaining each node in a doze state as long as possible. In order to guarantee network connectivity, the intervals at which the network sensors are turned on and off have to be coordinated. Therefore, synchronization is a very critical function for sensor networks. In this paper, we analyze the IEEE 802.15.4 MAC performance in sensor networks deployed in a chain topology. For this topology, critical inefficiencies can arise in case of multi-hop packet deliveries. We evaluate the impact of different synchronization schemes on the network performance, both in terms of network throughput and in terms of ene…

sensor networks medium access control energy savingSettore ING-INF/04 - AutomaticaSettore ING-INF/03 - Telecomunicazioni
researchProduct

L’intervento delle sezioni Unite nel dibattito sul reato di accesso abusivo ad un sistema informatico di cui all’art. 615 ter c.p.

2012

Con sentenza depositata il 7 febbraio 2012 le Sezioni Unite si sono pronunciate sul dibattito che riguarda la configurabilità del reato previsto ex art. 615 ter c.p. nel caso in un cui un soggetto legittimamente autorizzato ad accedere al sistema informatico o telematico vi operi per il conseguimento di finalità illecite. Da lungo tempo su questo tema si sono sviluppati due opposti orientamenti giurisprudenziali. Il primo giunge ad ammettere l’illecito sulla base dell’analogia con la fattispecie di violazione di domicilio e la valorizzazione delle finalità sottese alla condotta del soggetto agente. Il secondo, invece, focalizza l’attenzione sul dato letterale e sul momento consumativo del d…

sezioni unite cassazione accesso abusivo sistema informatico sistema telematico art. 615 ter c.p. codice penale italiaSettore IUS/17 - Diritto Penale
researchProduct