Search results for "Formations"

showing 10 items of 680 documents

A novel scheme for privacy preserving in RBAC

2013

Role Based Access Control (RBAC) Model has been proved to be quite useful and has drawn a lot of research interest over the last fifteen years. In this paper we discuss general context-aware RBAC model. We analyze potential privacy threats associated with use of context-aware RBAC and propose a novel scheme that provides privacy-preserving for access models based on RBAC.

Privacy preservingScheme (programming language)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSInformation privacySoftware_OPERATINGSYSTEMSComputer scienceAuthorizationRole-based access controlComputer securitycomputer.software_genrecomputercomputer.programming_language2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS)
researchProduct

The Politics of Privacy - a Useful Tautology

2020

While communication and media studies tend to define privacy with reference to data security, current processes of datafication and commodification substantially transform ways of how people act in increasingly dense communicative networks. This begs for advancing research on the flow of individual and organizational information considering its relational, contextual and, in consequence, political dimensions. Privacy, understood as the control over the flow of individual or group information in relation to communicative actions of others, frames the articles assembled in this thematic issue. These contributions focus on theoretical challenges of contemporary communication and media privacy …

Privatsphärepolitical factorspolitische FaktorenKommunikationsforschungagency; datafication; media practicesMedienkulturInternet privacymedia practicesData security050801 communication & media studiesMedia Politics Information Politics Media LawprivacyMedienpolitik Informationspolitik Medienrechtddc:070lcsh:Communication. Mass mediaPolitics0508 media and communications050602 political science & public administrationSociologydata securitydataficationNews media journalism publishingcommunication researchCommodificationDataficationbusiness.industryCommunication05 social sciencesTautology (grammar)data exchangelcsh:P87-960506 political scienceDatenaustauschagencymedia culturePublizistische Medien JournalismusVerlagswesenpoliticsbusinessDatensicherheit
researchProduct

The importance of management innovation and consultant services on ERP implementation success

2011

Enterprise resource planning (ERP) implementation has been an important activity for improving efficiency. However, an ERP system is a critical investment that can significantly affect future performance of a company. Many ERP projects report an unusually high failure rate. This study empirically investigates the involvement of management consultants in ERP implementation success. The results from our field survey of 134 ERP end-users in Spanish ceramic tile companies show that ERP implementation success significantly depends on the quality of consultant services. The results also indicate the importance of internal management throughout the learning process. Overall, these findings contrib…

Process managementbusiness.industryEnd userProcess (engineering)Strategy and Managementmedia_common.quotation_subjectInvestment (macroeconomics)Affect (psychology)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSManagement of Technology and InnovationOrganizational learningInformation systemQuality (business)Operations managementbusinessEnterprise resource planningmedia_commonThe Service Industries Journal
researchProduct

Information Infrastructures for eHealth

2017

This chapter provides an introductory overview of healthcare information systems, followed by a more detailed discussion on two types of core components in a public eHealth infrastructure: e-prescription solutions and governmental patient-oriented platforms. E-prescription solutions support the electronic flow of information for prescribed medications between prescribers, pharmacies and insurers that handle related payments. E-prescription solutions aim for cost containment, enhancement of patient safety, control over doctors’ prescription patterns and process quality assurance. Governmental platforms for patient- or citizen-oriented eHealth services typically offer patients access to gener…

Process managementbusiness.industrymedia_common.quotation_subjectControl (management)PaymentInformationSystems_GENERALPatient safetyHealth careeHealthInformation systemBusinessMedical prescriptionTransformation processeshealth care economics and organizationsmedia_common
researchProduct

From matrix clause to discourse marker: the grammaticalization of Hauptsache

2021

[EN] This paper has a double purpose. On the one hand, it intends to prove the existence of a discourse marker (DM) Hauptsache. This element preserves the core conceptual meaning of the homonymous noun, but differs from it with regard to its morphosyntactic and semantic features as well as to its discourse-organizing, information structuring, and modal functions. On the other hand, the emergence of Hauptsache as a discourse particle is explained on the grounds of a grammaticalization process similar to the ones described for the prototypical German DMs. Evidence drawn from a corpus of German and Austrian parliamentary protocols will show in which ways the six fundamental processes implied i…

Projecting constructions050101 languages & linguisticsLinguistics and LanguagePhilosophy05 social sciences050109 social psychologyGrammatikalisierungProjektorkonstruktionenConstruction GrammarLanguage and LinguisticsDiscourse markerAlemany parlatDiskursmarker0501 psychology and cognitive sciencesKonstruktionsgrammatikGrammaticalizationInformationsstrukturHumanitiesInformation structure
researchProduct

Domain Generation Algorithm Detection Using Machine Learning Methods

2018

A botnet is a network of private computers infected with malicious software and controlled as a group without the knowledge of the owners. Botnets are used by cybercriminals for various malicious activities, such as stealing sensitive data, sending spam, launching Distributed Denial of Service (DDoS) attacks, etc. A Command and Control (C&C) server sends commands to the compromised hosts to execute those malicious activities. In order to avoid detection, recent botnets such as Conficker, Zeus, and Cryptolocker apply a technique called Domain-Fluxing or Domain Name Generation Algorithms (DGA), in which the infected bot periodically generates and tries to resolve a large number of pseudorando…

Pseudorandom number generatorDomain generation algorithmAlphanumericComputer sciencebusiness.industryDomain Name SystemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBotnetDenial-of-service attackMachine learningcomputer.software_genreComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSCryptoLockerMalwareArtificial intelligencebusinesscomputer
researchProduct

Social robots and therapeutic adherence: a new challenge in pediatric asthma?

2020

Social Robots are used in different contexts and, in healthcare, they are better known as Socially Assistive Robots. In the context of asthma, the use of Socially Assistive Robots has the potential to increase motivation and engagement to treatment. Other positive roles proposed for Socially Assistive Robots are to provide education, training regarding treatments, and feedback to patients. This review evaluates emerging interventions for improving treatment adherence in pediatric asthma, focusing on the possible future role of social robots in the clinical practice.

Pulmonary and Respiratory MedicineTreatment adherenceApplied psychologySocial InteractionPsychological interventionHuman-Robot interactionContext (language use)Pediatric asthma.Human–robot interaction03 medical and health sciencesSettore MED/38 - Pediatria Generale E Specialistica0302 clinical medicineTherapeutic Adherence030225 pediatricsHealth careHumansMedicineChildPediatric asthmaSocial robotPediatric asthmabusiness.industrytechnology industry and agricultureRoboticsAsthmaSocial Assistive RobotTreatment Adherence and Compliancebody regionssurgical procedures operative030228 respiratory systemTherapeutic adherencePediatrics Perinatology and Child HealthSocial Assistive RobotsInformationSystems_MISCELLANEOUSbusinesshuman activities
researchProduct

Formations of finite monoids and formal languages: Eilenberg’s variety theorem revisited

2014

International audience; We present an extension of Eilenberg's variety theorem, a well-known result connecting algebra to formal languages. We prove that there is a bijective correspondence between formations of finite monoids and certain classes of languages, the formations of languages. Our result permits to treat classes of finite monoids which are not necessarily closed under taking submonoids, contrary to the original theory. We also prove a similar result for ordered monoids.; Nous présentons une extension du théorème des variétés d'Eilenberg, un résultat célèbre reliant l'algèbre à la théorie des langages formels. Nous montrons qu'il existe une correspondance bijective entre les form…

Pure mathematicsApplied MathematicsGeneral MathematicsACM: F.: Theory of Computation/F.4: MATHEMATICAL LOGIC AND FORMAL LANGUAGES/F.4.3: Formal Languages[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Abstract family of languagesFormationRegular languagesCone (formal languages)regular languagePumping lemma for regular languagesAlgebravarietyRegular languageÁlgebraMSC 68Q70 20D10 20F17 20M25Mathematics::Category TheoryFormal languageVariety (universal algebra)SemigroupsGroup formationsAutomata theoryMathematics
researchProduct

Hypergestures in Complex Time: Creative Performance Between Symbolic and Physical Reality

2015

Musical performance and composition imply hypergestural transformation from symbolic to physical reality and vice versa. But most scores require movements at infinite physical speed that can only be performed approximately by trained musicians. To formally solve this divide between symbolic notation and physical realization, we introduce complex time (\(\mathbb {C}\)-time) in music. In this way, infinite physical speed is “absorbed” by a finite imaginary speed. Gestures thus comprise thought (in imaginary time) and physical realization (in real time) as a world-sheet motion in space-time, corresponding to ideas from physical string theory. Transformation from imaginary to real time gives us…

Pure mathematicsEuler-Lagrange equationSettore FIS/02 - Fisica Teorica Modelli E Metodi MatematiciSettore INF/01 - InformaticaInformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.HCI)Complex timeString theoryMeasure (mathematics)Imaginary timeTransformation (music)Motion (physics)AlgebraSettore MAT/02 - AlgebraComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONComplex time; Euler-lagrange equation; Hypergestures; Performance theory; String theory; World-sheets of space-timeString theoryWorld-sheets of space-timePerformance theoryHypergesturesRealization (systems)The ImaginaryGestureMathematics
researchProduct

Formations of Monoids, Congruences, and Formal Languages

2015

The main goal in this paper is to use a dual equivalence in automata theory started in [25] and developed in [3] to prove a general version of the Eilenberg-type theorem presented in [4]. Our principal results confirm the existence of a bijective correspondence between three concepts; formations of monoids, formations of languages and formations of congruences. The result does not require finiteness on monoids, nor regularity on languages nor finite index conditions on congruences. We relate our work to other results in the field and we include applications to non-r-disjunctive languages, Reiterman s equational description of pseudovarieties and varieties of monoids.

Pure mathematicsGeneral Computer ScienceApplied MathematicsData ScienceCWI Technical Report reportFormationsLlenguatges de programacióAbstract family of languagesCongruence relationlcsh:QA75.5-76.95Formal languagesMathematics::Category TheoryFormal languageComputingMethodologies_DOCUMENTANDTEXTPROCESSINGBijectionAutomata theorylcsh:Electronic computers. Computer scienceÀlgebraEquivalence (formal languages)SemigroupsMATEMATICA APLICADAAlgorithmAutomata theoryMathematicsScientific Annals of Computer Science
researchProduct