Search results for "Access"
showing 10 items of 1232 documents
CVS: Using VLANs to Counteract the Effect of Topology Changes in Quasi-Static Mesh Access Networks
2006
Mesh networks are candidate to play the role of switched Ethernet LANs over extended areas and with a sensibly higher flexibility. Actually, mesh networks can exploit both Ethernet and wireless technologies, e.g. Wi-Fi and/or free-space optical links, to provide a high degree of redundancy in an access network, and to provide users with powerful means to connect with each other. By using such technologies, the mesh topology remains stable for hours, so that the mesh topology can be considered quasi-static. However, large meshes require a heavy overhead in the network control plane as for the management of end-to-end paths, which can change due to mobility of users and due to occasional fail…
On some conceptualizations of Europe in press discourse: an approach from access semantics
2016
This paper is concerned with the semantic potential of the lexical item . Its aim is to analyze and classify different conceptualizations of the lexical item as manifested in a corpus of headlines retrieved from the . Specifically, the study is based on 217 headlines derived from a corpus of approximately one million words of news items retrieved from the from May 2004 through December 2009. The analysis is grounded in the LCCM Theory, a theory of lexical representation and semantic composition developed by Evans (for example, Evans 2006, 2009).
Not Worth the Net Worth? The Democratic Dilemmas of Privileged Access to Information
2017
In this article, we discuss the democratic conditions for parliamentary oversight in EU foreign affairs. Our point of departure is two Interinstitutional Agreements (IIAs) between the Council and the European Parliament (EP), which provide the latter with access to sensitive documents. To shed light on this issue, we ask to what extent these contribute to the democratic accountability in EU foreign policy? It is argued that the IIAs have strengthened the EP’s role in EU foreign affairs by giving it access to information to which it was previously denied. This does not mean, however, that this increase in power equals a strengthening of the EP as a democratic accountability forum. First of a…
A Push Forward Construction and the Comprehensive Factorization for Internal Crossed Modules
2014
In a semi-abelian category, we give a categorical construction of the push forward of an internal pre-crossed module, generalizing the pushout of a short exact sequence in abelian categories. The main properties of the push forward are discussed. A simplified version is given for action accessible categories, providing examples in the categories of rings and Lie algebras. We show that push forwards can be used to obtain the crossed module version of the comprehensive factorization for internal groupoids.
The efficacy of single suture for exit site wound closure and stabilization of hemodialysis central tunneled catheter
2021
Introduction: The majority of the end-stage renal disease patients begin hemodialysis with the central tunneled catheter as a permanent or bridge vascular access. The procedure of central tunneled catheter insertion can be complicated by exit site bleeding, prolonged tunnel healing, and infection. The study aimed at evaluating whether the catheter exit site wound closing with a single-suture method is equally effective as the double suture method, which is most frequently applied. The assumption was that the single-suture method, which is less traumatizing for the skin, could offer an advantage for the patients with “paper” skin, that is, elderly, after long-term immunosuppressive treatment…
Cautionnement. Défaut de déclaration par le créancier dans le délai réglementaire, Déclaration par la seule caution, Extinction de plein droit de la …
1991
International audience
Constrained Role Mining
2013
Role Based Access Control (RBAC) is a very popular access control model, for long time investigated and widely deployed in the security architecture of different enterprises. To implement RBAC, roles have to be firstly identified within the considered organization. Usually the process of (automatically) defining the roles in a bottom up way, starting from the permissions assigned to each user, is called {\it role mining}. In literature, the role mining problem has been formally analyzed and several techniques have been proposed in order to obtain a set of valid roles. Recently, the problem of defining different kind of constraints on the number and the size of the roles included in the resu…
Investigating Low Level Protocols for Wireless Body Sensor Networks
2016
The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate Quality of Service (QoS) such as low delay and high scalability. This paper investigates Medium Access Control (MAC) protocols used in WBAN, and compares their performance in a high traffic environment. Such scenario can be induced in case of emergency for example, where physiological data collected from all sensors on human body should be sent simultaneously to take appropria…
Impact of LTE’s Periodic Interference on Heterogeneous Wi-Fi Transmissions
2018
The problem of Wi-Fi and LTE coexistence has been significantly debated in the last years, with the emergence of LTE extensions enabling the utilization of unlicensed spectrum for carrier aggregation. Rather than focusing on the problem of resource sharing between the two technologies, in this paper, we study the effects of LTE's structured transmissions on the Wi-Fi random access protocol. We show how the scheduling of periodic LTE transmissions modifies the behavior of 802.11's distributed coordination function (DCF), leading to a degradation of Wi-Fi performance, both in terms of channel utilization efficiency and in terms of channel access fairness. We also discuss the applicability and…
Parity Oblivious d-Level Random Access Codes and Class of Noncontextuality Inequalities
2016
One of the fundamental results in quantum foundations is the Kochen-Specker no-go theorem. For the quantum theory, the no-go theorem excludes the possibility of a class of hidden variable models where value attribution is context independent. Recently, the notion of contextuality has been generalized for different operational procedures and it has been shown that preparation contextuality of mixed quantum states can be a useful resource in an information-processing task called parity-oblivious multiplexing. Here, we introduce a new class of information processing tasks, namely d-level parity oblivious random access codes and obtain bounds on the success probabilities of performing such task…