Search results for "Cure"

showing 10 items of 518 documents

A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography

2015

International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless sensor networks WSNsSimple power analysisSecure data aggregationHomomorphic encryptionCryptographyEncryptionHomomorphic encryptionPublic-key cryptography[SPI]Engineering Sciences [physics]Key distribution in wireless sensor networksStateful firewallHardware and ArchitectureOverhead (computing)businessSecurity levelWireless sensor networkSoftwareComputer networkAd Hoc Networks
researchProduct

Logical Key Hierarchy for Group Management in Distributed Online Social Networks

2016

Distributed Online Social Networks (DOSNs) have recently been proposed to shift the control over user data from a unique entity to the users of the DOSN themselves. In this paper, we focus our attention on the problem of privacy preserving content sharing to a large group of users of the DOSNs. Several solutions, based on cryptographic techniques, have been recently proposed. The main challenge here is the definition of a scalable and decentralized approach that: i) minimizes the re-encryption of the contents published in a group when the composition of the group changes and ii) enables a fast distribution of the cryptographic keys to all the members (n) of a group, each time a new user is …

Computer scienceComputer Networks and CommunicationsCryptography02 engineering and technologyEncryptionSet (abstract data type)Public-key cryptography0202 electrical engineering electronic engineering information engineeringMathematics (all)Distributed Online Social Network; Privacy; Secure Group communicationFocus (computing)Social networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)020206 networking & telecommunicationsComputer Science Applications1707 Computer Vision and Pattern RecognitionSecure Group communicationDistributed Online Social NetworkPrivacyScalabilitySignal ProcessingKey (cryptography)020201 artificial intelligence & image processingbusinessSoftwareComputer network
researchProduct

Efficient and Accurate OTU Clustering with GPU-Based Sequence Alignment and Dynamic Dendrogram Cutting.

2015

De novo clustering is a popular technique to perform taxonomic profiling of a microbial community by grouping 16S rRNA amplicon reads into operational taxonomic units (OTUs). In this work, we introduce a new dendrogram-based OTU clustering pipeline called CRiSPy. The key idea used in CRiSPy to improve clustering accuracy is the application of an anomaly detection technique to obtain a dynamic distance cutoff instead of using the de facto value of 97 percent sequence similarity as in most existing OTU clustering pipelines. This technique works by detecting an abrupt change in the merging heights of a dendrogram. To produce the output dendrograms, CRiSPy employs the OTU hierarchical clusterin…

Computer scienceCorrelation clusteringSingle-linkage clusteringMolecular Sequence DataMachine learningcomputer.software_genrePattern Recognition AutomatedCURE data clustering algorithmRNA Ribosomal 16SGeneticsComputer GraphicsCluster analysisBase Sequencebusiness.industryApplied MathematicsDendrogramHigh-Throughput Nucleotide SequencingPattern recognitionSignal Processing Computer-AssistedEquipment DesignHierarchical clusteringEquipment Failure AnalysisRNA BacterialCanopy clustering algorithmArtificial intelligenceHierarchical clustering of networksbusinesscomputerSequence AlignmentAlgorithmsBiotechnologyIEEE/ACM transactions on computational biology and bioinformatics
researchProduct

Experimental evaluation of privacy-preserving aggregation schemes on planetlab

2015

New pervasive technologies often reveal many sen- sitive information about users’ habits, seriously compromising the privacy and sometimes even the personal security of people. To cope with this problem, researchers have developed the idea of privacy-preserving data mining which refers to the possibility of releasing aggregate information about the data provided by multiple users, without any information leakage about individual data. These techniques have different privacy levels and communication costs, but all of them can suffer when some users’ data becomes inaccessible during the operation of the privacy preserving protocols. It is thus interesting to validate the applicability of such…

Computer sciencePrivacy softwareSettore ING-INF/03 - TelecomunicazioniAggregate (data warehouse)aggregationComputer securitycomputer.software_genreprivacySecret sharingInformation sensitivityPlanetLabInformation leakageSecure multi-party computationcomputer
researchProduct

An asynchronous covert channel using spam

2012

AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…

Computer scienceRetransmissionCovert channelAsynchronous covert channelData lossComputer securitycomputer.software_genreSecure communicationModelling and SimulationCommunication sourceRaptor codeStegosystemSpam steganographybusiness.industryE-mail steganographyComputational MathematicsComputational Theory and MathematicsAsynchronous communicationRaptor codesSecure communicationModeling and SimulationKey (cryptography)businessAsynchronous covert channel; E-mail steganography; Raptor codes; Secure communication; Spam steganography; Stegosystem; Modeling and Simulation; Computational Theory and Mathematics; Computational MathematicscomputerComputer networkComputers & Mathematics with Applications
researchProduct

Milestones of complex computing facility assembling

2015

IMCS UL continues its enduring development of research e-infrastructure, participates in international projects such as GEANT, GN2, GN3, GN3+, GN4, BalticGRID, BG II and EGI-InSPIRE, has involved in CLARIN and ELIXIR ESFRI ERIC activities. Currently IMCS UL maintains Scientific Cloud unified computing facility realized as ½ PTB SAN storage (IBM DS4700 with servers); provides collocation, hosting and virtualization services. As well it operates as a node for online correlation data streaming services from Irbene radio telescope in real time, HPC resources' disposal for computing tasks, usage of Big data extracted from data storage for modeling and also for graphic data processing. In the sam…

Computer sciencebusiness.industryBig dataCloud computingVirtualizationcomputer.software_genreWorld Wide WebEngineering managementProcurementServermedia_common.cataloged_instanceElixir (programming language)European unionbusinesscomputermedia_commoncomputer.programming_language2015 Conference Grid, Cloud & High Performance Computing in Science (ROLCG)
researchProduct

Clustering categorical data: A stability analysis framework

2011

Clustering to identify inherent structure is an important first step in data exploration. The k-means algorithm is a popular choice, but K-means is not generally appropriate for categorical data. A specific extension of k-means for categorical data is the k-modes algorithm. Both of these partition clustering methods are sensitive to the initialization of prototypes, which creates the difficulty of selecting the best solution for a given problem. In addition, selecting the number of clusters can be an issue. Further, the k-modes method is especially prone to instability when presented with ‘noisy’ data, since the calculation of the mode lacks the smoothing effect inherent in the calculation …

Computer sciencebusiness.industrySingle-linkage clusteringCorrelation clusteringConstrained clusteringcomputer.software_genreMachine learningDetermining the number of clusters in a data setData stream clusteringCURE data clustering algorithmConsensus clusteringData miningArtificial intelligenceCluster analysisbusinesscomputer2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)
researchProduct

Il consenso informato ai trattamenti sanitari sui minori e decisioni di fine vita. Riflessioni comparatistiche

2019

The essay deals with the informed consent to allow or to refuse medical treatment for pediatric patients, in a comparative law perspective. The first part focuses on the principle of personal autonomy and the rights to health and to life for patiens who lack capacity, as enshrined in Italian legislation. In determining care and treatment in relation to their child, parents have to take into account the physical and mental well-being, life and dignity of the person, as fully as possible (art. 3, L. 219/2017). The second part of the paper investigates the consequences of parents' refusal to interrupt or continue life-sustaining treatment in relation to infants suffering from serious and incur…

Consenso informatoInformed ConsentResponsabilità genitorialeEuthanasiaConsent to Medical TreatmentBiodirittoBest interest of the childSettore IUS/02 - Diritto Privato ComparatoRefusal of Medical TreatmentEutanasiaDiritto comparatoSettore IUS/01 - Diritto PrivatoComparative LawHuman DignityChildren's RightRifiuto CureDiritti del minoreComparative Human Rights Law
researchProduct

Seneca on the Mother Cow: Poetic Models and Natural Philosophy in the Consolation to Marcia

2020

Seneca’s Consolation to Marcia embraces the orthodox Stoic view that, when unduly protracted, grief reflects a logical misunderstanding of the natural world, human life, and the limits of the self. Seneca is aware that persuading Marcia to leave her false beliefs is the only way to reawaken her interest in communal life, family reciprocity, and constructive memory. He conceives his consolatory writing as an intellectually engaging didactic work tailored to the needs and disposition of his addressee. The main purpose of the present paper is to show that in this and several other respects the Consolation to Marcia makes a conscious move towards the different but evidently related genre of did…

Consolation to Marciaphilosophical anthropologyStoicismDe Rerum Naturaanimal argumentSenecaSettore L-FIL-LET/04 - Lingua E Letteratura Latinaconsolation literatureEpicureanismPeripatetic philosophytherapy of griefFastiLucretiuOvid
researchProduct

Determination of disproportionate tenders in public procurement

2013

[EN] Public procurement is one of the fundamental pillars of the construction sector and the understanding of its statutory regulation is one of the keys to success. The government regulates the concept of disproportionate tenders to avoid deals that are too low, something which could jeopardise the execution of the work or cause problems during implementation such as conflicting prices, project modifications and delays. The criteria for determining the disproportionality of the offers are numerous and each contracting authority determines which to use in each process by carrying out a comparative analysis. The results show that the formulas of disproportionality based on a percentage of th…

Construction managementFinanceGovernmentCall for bidsActuarial sciencebusiness.industryContract managementContractor selectionTenderingProcurementWork (electrical)Statutory lawSpainEconomicsBid pricebusinessPROYECTOS DE INGENIERIAConstruction managementContract Management
researchProduct