Search results for "Cure"
showing 10 items of 518 documents
A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
2015
International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…
Logical Key Hierarchy for Group Management in Distributed Online Social Networks
2016
Distributed Online Social Networks (DOSNs) have recently been proposed to shift the control over user data from a unique entity to the users of the DOSN themselves. In this paper, we focus our attention on the problem of privacy preserving content sharing to a large group of users of the DOSNs. Several solutions, based on cryptographic techniques, have been recently proposed. The main challenge here is the definition of a scalable and decentralized approach that: i) minimizes the re-encryption of the contents published in a group when the composition of the group changes and ii) enables a fast distribution of the cryptographic keys to all the members (n) of a group, each time a new user is …
Efficient and Accurate OTU Clustering with GPU-Based Sequence Alignment and Dynamic Dendrogram Cutting.
2015
De novo clustering is a popular technique to perform taxonomic profiling of a microbial community by grouping 16S rRNA amplicon reads into operational taxonomic units (OTUs). In this work, we introduce a new dendrogram-based OTU clustering pipeline called CRiSPy. The key idea used in CRiSPy to improve clustering accuracy is the application of an anomaly detection technique to obtain a dynamic distance cutoff instead of using the de facto value of 97 percent sequence similarity as in most existing OTU clustering pipelines. This technique works by detecting an abrupt change in the merging heights of a dendrogram. To produce the output dendrograms, CRiSPy employs the OTU hierarchical clusterin…
Experimental evaluation of privacy-preserving aggregation schemes on planetlab
2015
New pervasive technologies often reveal many sen- sitive information about users’ habits, seriously compromising the privacy and sometimes even the personal security of people. To cope with this problem, researchers have developed the idea of privacy-preserving data mining which refers to the possibility of releasing aggregate information about the data provided by multiple users, without any information leakage about individual data. These techniques have different privacy levels and communication costs, but all of them can suffer when some users’ data becomes inaccessible during the operation of the privacy preserving protocols. It is thus interesting to validate the applicability of such…
An asynchronous covert channel using spam
2012
AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…
Milestones of complex computing facility assembling
2015
IMCS UL continues its enduring development of research e-infrastructure, participates in international projects such as GEANT, GN2, GN3, GN3+, GN4, BalticGRID, BG II and EGI-InSPIRE, has involved in CLARIN and ELIXIR ESFRI ERIC activities. Currently IMCS UL maintains Scientific Cloud unified computing facility realized as ½ PTB SAN storage (IBM DS4700 with servers); provides collocation, hosting and virtualization services. As well it operates as a node for online correlation data streaming services from Irbene radio telescope in real time, HPC resources' disposal for computing tasks, usage of Big data extracted from data storage for modeling and also for graphic data processing. In the sam…
Clustering categorical data: A stability analysis framework
2011
Clustering to identify inherent structure is an important first step in data exploration. The k-means algorithm is a popular choice, but K-means is not generally appropriate for categorical data. A specific extension of k-means for categorical data is the k-modes algorithm. Both of these partition clustering methods are sensitive to the initialization of prototypes, which creates the difficulty of selecting the best solution for a given problem. In addition, selecting the number of clusters can be an issue. Further, the k-modes method is especially prone to instability when presented with ‘noisy’ data, since the calculation of the mode lacks the smoothing effect inherent in the calculation …
Il consenso informato ai trattamenti sanitari sui minori e decisioni di fine vita. Riflessioni comparatistiche
2019
The essay deals with the informed consent to allow or to refuse medical treatment for pediatric patients, in a comparative law perspective. The first part focuses on the principle of personal autonomy and the rights to health and to life for patiens who lack capacity, as enshrined in Italian legislation. In determining care and treatment in relation to their child, parents have to take into account the physical and mental well-being, life and dignity of the person, as fully as possible (art. 3, L. 219/2017). The second part of the paper investigates the consequences of parents' refusal to interrupt or continue life-sustaining treatment in relation to infants suffering from serious and incur…
Seneca on the Mother Cow: Poetic Models and Natural Philosophy in the Consolation to Marcia
2020
Seneca’s Consolation to Marcia embraces the orthodox Stoic view that, when unduly protracted, grief reflects a logical misunderstanding of the natural world, human life, and the limits of the self. Seneca is aware that persuading Marcia to leave her false beliefs is the only way to reawaken her interest in communal life, family reciprocity, and constructive memory. He conceives his consolatory writing as an intellectually engaging didactic work tailored to the needs and disposition of his addressee. The main purpose of the present paper is to show that in this and several other respects the Consolation to Marcia makes a conscious move towards the different but evidently related genre of did…
Determination of disproportionate tenders in public procurement
2013
[EN] Public procurement is one of the fundamental pillars of the construction sector and the understanding of its statutory regulation is one of the keys to success. The government regulates the concept of disproportionate tenders to avoid deals that are too low, something which could jeopardise the execution of the work or cause problems during implementation such as conflicting prices, project modifications and delays. The criteria for determining the disproportionality of the offers are numerous and each contracting authority determines which to use in each process by carrying out a comparative analysis. The results show that the formulas of disproportionality based on a percentage of th…