Search results for "Access"

showing 10 items of 1232 documents

CVS: Using VLANs to Counteract the Effect of Topology Changes in Quasi-Static Mesh Access Networks

2006

Mesh networks are candidate to play the role of switched Ethernet LANs over extended areas and with a sensibly higher flexibility. Actually, mesh networks can exploit both Ethernet and wireless technologies, e.g. Wi-Fi and/or free-space optical links, to provide a high degree of redundancy in an access network, and to provide users with powerful means to connect with each other. By using such technologies, the mesh topology remains stable for hours, so that the mesh topology can be considered quasi-static. However, large meshes require a heavy overhead in the network control plane as for the management of end-to-end paths, which can change due to mobility of users and due to occasional fail…

EthernetAccess networkWireless mesh networkComputer scienceVirtual LANbusiness.industryDistributed computingMesh networkingLocal area networkShared meshNetwork topologyTopologylaw.inventionlawWirelessSwitched meshbusinessActive networkingComputer networkThe Sixth IEEE International Conference on Computer and Information Technology (CIT'06)
researchProduct

On some conceptualizations of Europe in press discourse: an approach from access semantics

2016

This paper is concerned with the semantic potential of the lexical item . Its aim is to analyze and classify different conceptualizations of the lexical item as manifested in a corpus of headlines retrieved from the . Specifically, the study is based on 217 headlines derived from a corpus of approximately one million words of news items retrieved from the from May 2004 through December 2009. The analysis is grounded in the LCCM Theory, a theory of lexical representation and semantic composition developed by Evans (for example, Evans 2006, 2009).

Europeaccess semanticsconceptualization
researchProduct

Not Worth the Net Worth? The Democratic Dilemmas of Privileged Access to Information

2017

In this article, we discuss the democratic conditions for parliamentary oversight in EU foreign affairs. Our point of departure is two Interinstitutional Agreements (IIAs) between the Council and the European Parliament (EP), which provide the latter with access to sensitive documents. To shed light on this issue, we ask to what extent these contribute to the democratic accountability in EU foreign policy? It is argued that the IIAs have strengthened the EP’s role in EU foreign affairs by giving it access to information to which it was previously denied. This does not mean, however, that this increase in power equals a strengthening of the EP as a democratic accountability forum. First of a…

European ParliamentparliamentPublic AdministrationSociology and Political ScienceEuropean PoliticsParliamentmedia_common.quotation_subjectPolitikwissenschaft0211 other engineering and technologies02 engineering and technologyEuropapolitikPublic administrationInformation policyPower (social and political)secrecylcsh:Political science (General)Political science050602 political science & public administrationmedia_common.cataloged_instancePrivileged accessEuropean UnionAußenpolitikEuropean unionlcsh:JA1-92Political scienceEuropaparlamentmedia_commoninformation policytransparency021110 strategic defence & security studies05 social sciencesParlamentKontrolledemocratic accountabilitydemocratic accountability; secrecyTransparency (behavior)Democracy0506 political scienceTransparenzforeign policyForeign policyddc:320EUInformationspolitikcontrolIndraStra Global
researchProduct

A Push Forward Construction and the Comprehensive Factorization for Internal Crossed Modules

2014

In a semi-abelian category, we give a categorical construction of the push forward of an internal pre-crossed module, generalizing the pushout of a short exact sequence in abelian categories. The main properties of the push forward are discussed. A simplified version is given for action accessible categories, providing examples in the categories of rings and Lie algebras. We show that push forwards can be used to obtain the crossed module version of the comprehensive factorization for internal groupoids.

Exact sequenceAlgebra and Number TheoryGeneral Computer ScienceSemi-abelian categoryAccessible categoryPushoutCrossed moduleCrossed modulecrossed module push forward comprehensive factorizationTheoretical Computer ScienceAlgebraSettore MAT/02 - AlgebraComprehensive factorizationFactorizationMathematics::Category TheoryLie algebraPush forwardAbelian groupComprehensive factorization; Crossed module; Push forward; Semi-abelian categoryCategorical variableMathematicsApplied Categorical Structures
researchProduct

The efficacy of single suture for exit site wound closure and stabilization of hemodialysis central tunneled catheter

2021

Introduction: The majority of the end-stage renal disease patients begin hemodialysis with the central tunneled catheter as a permanent or bridge vascular access. The procedure of central tunneled catheter insertion can be complicated by exit site bleeding, prolonged tunnel healing, and infection. The study aimed at evaluating whether the catheter exit site wound closing with a single-suture method is equally effective as the double suture method, which is most frequently applied. The assumption was that the single-suture method, which is less traumatizing for the skin, could offer an advantage for the patients with “paper” skin, that is, elderly, after long-term immunosuppressive treatment…

Exit sitemedicine.medical_specialtyMedicine (General)central tunneled hemodialysis catheterscomplicationsbusiness.industrymedicine.medical_treatment030232 urology & nephrologyVascular accessvascular accessGeneral Medicine030204 cardiovascular system & hematologySurgery03 medical and health sciences0302 clinical medicineR5-920Suture (anatomy)HemodialysismedicineWound closureHemodialysisOriginal Research ArticlebusinessTunneled catheterSAGE Open Medicine
researchProduct

Cautionnement. Défaut de déclaration par le créancier dans le délai réglementaire, Déclaration par la seule caution, Extinction de plein droit de la …

1991

International audience

Extinction de la créanceObligation accessoire[SHS.DROIT]Humanities and Social Sciences/Law[SHS.DROIT] Humanities and Social Sciences/LawRedressement et liquidation judiciairesCAUTIONNEMENTComputingMilieux_MISCELLANEOUSOpposabilité des exceptions
researchProduct

Constrained Role Mining

2013

Role Based Access Control (RBAC) is a very popular access control model, for long time investigated and widely deployed in the security architecture of different enterprises. To implement RBAC, roles have to be firstly identified within the considered organization. Usually the process of (automatically) defining the roles in a bottom up way, starting from the permissions assigned to each user, is called {\it role mining}. In literature, the role mining problem has been formally analyzed and several techniques have been proposed in order to obtain a set of valid roles. Recently, the problem of defining different kind of constraints on the number and the size of the roles included in the resu…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityProcess (engineering)business.industryComputer scienceDistributed computingVertex coverAccess controlTop-down and bottom-up designEnterprise information security architecturecomputer.software_genreSet (abstract data type)Order (exchange)Role-based access controlData miningbusinessCryptography and Security (cs.CR)computer
researchProduct

Investigating Low Level Protocols for Wireless Body Sensor Networks

2016

The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate Quality of Service (QoS) such as low delay and high scalability. This paper investigates Medium Access Control (MAC) protocols used in WBAN, and compares their performance in a high traffic environment. Such scenario can be induced in case of emergency for example, where physiological data collected from all sensors on human body should be sent simultaneously to take appropria…

FOS: Computer and information sciencesComputer scienceComputer Science - Information TheoryTime division multiple accessAccess control[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Body area network0202 electrical engineering electronic engineering information engineeringWirelessProtocol (science)business.industryInformation Theory (cs.IT)Quality of service020208 electrical & electronic engineeringComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science - Distributed Parallel and Cluster Computing[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Scalability[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Distributed Parallel and Cluster Computing (cs.DC)[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer network
researchProduct

Impact of LTE’s Periodic Interference on Heterogeneous Wi-Fi Transmissions

2018

The problem of Wi-Fi and LTE coexistence has been significantly debated in the last years, with the emergence of LTE extensions enabling the utilization of unlicensed spectrum for carrier aggregation. Rather than focusing on the problem of resource sharing between the two technologies, in this paper, we study the effects of LTE's structured transmissions on the Wi-Fi random access protocol. We show how the scheduling of periodic LTE transmissions modifies the behavior of 802.11's distributed coordination function (DCF), leading to a degradation of Wi-Fi performance, both in terms of channel utilization efficiency and in terms of channel access fairness. We also discuss the applicability and…

FOS: Computer and information sciencesComputer scienceThroughput02 engineering and technologyDistributed coordination functionSpectrum managementAnalytical modelScheduling (computing)Computer Science - Networking and Internet ArchitectureC.2.0C.2.50202 electrical engineering electronic engineering information engineeringLong Term EvolutionWireless fidelityElectrical and Electronic EngineeringProbabilitySensorNetworking and Internet Architecture (cs.NI)business.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsComputer Science Applications1707 Computer Vision and Pattern RecognitionThroughput91A06 91A10 91A80Computer Science ApplicationsShared resourceModeling and SimulationbusinessC.2.0; C.2.5InterferenceRandom accessComputer networkCommunication channel
researchProduct

Parity Oblivious d-Level Random Access Codes and Class of Noncontextuality Inequalities

2016

One of the fundamental results in quantum foundations is the Kochen-Specker no-go theorem. For the quantum theory, the no-go theorem excludes the possibility of a class of hidden variable models where value attribution is context independent. Recently, the notion of contextuality has been generalized for different operational procedures and it has been shown that preparation contextuality of mixed quantum states can be a useful resource in an information-processing task called parity-oblivious multiplexing. Here, we introduce a new class of information processing tasks, namely d-level parity oblivious random access codes and obtain bounds on the success probabilities of performing such task…

FOS: Computer and information sciencesExistential quantificationComputer Science - Information TheoryFOS: Physical sciences01 natural sciences010305 fluids & plasmasTheoretical Computer ScienceQuantum state0103 physical sciencesElectrical and Electronic Engineering010306 general physicsQuantumMathematicsQuantum computerDiscrete mathematicsQuantum PhysicsInformation Theory (cs.IT)Statistical and Nonlinear PhysicsParity (physics)Electronic Optical and Magnetic MaterialsKochen–Specker theoremModeling and SimulationSignal ProcessingOnticQuantum Physics (quant-ph)Random access
researchProduct