Search results for "Formations"
showing 10 items of 680 documents
A novel scheme for privacy preserving in RBAC
2013
Role Based Access Control (RBAC) Model has been proved to be quite useful and has drawn a lot of research interest over the last fifteen years. In this paper we discuss general context-aware RBAC model. We analyze potential privacy threats associated with use of context-aware RBAC and propose a novel scheme that provides privacy-preserving for access models based on RBAC.
The Politics of Privacy - a Useful Tautology
2020
While communication and media studies tend to define privacy with reference to data security, current processes of datafication and commodification substantially transform ways of how people act in increasingly dense communicative networks. This begs for advancing research on the flow of individual and organizational information considering its relational, contextual and, in consequence, political dimensions. Privacy, understood as the control over the flow of individual or group information in relation to communicative actions of others, frames the articles assembled in this thematic issue. These contributions focus on theoretical challenges of contemporary communication and media privacy …
The importance of management innovation and consultant services on ERP implementation success
2011
Enterprise resource planning (ERP) implementation has been an important activity for improving efficiency. However, an ERP system is a critical investment that can significantly affect future performance of a company. Many ERP projects report an unusually high failure rate. This study empirically investigates the involvement of management consultants in ERP implementation success. The results from our field survey of 134 ERP end-users in Spanish ceramic tile companies show that ERP implementation success significantly depends on the quality of consultant services. The results also indicate the importance of internal management throughout the learning process. Overall, these findings contrib…
Information Infrastructures for eHealth
2017
This chapter provides an introductory overview of healthcare information systems, followed by a more detailed discussion on two types of core components in a public eHealth infrastructure: e-prescription solutions and governmental patient-oriented platforms. E-prescription solutions support the electronic flow of information for prescribed medications between prescribers, pharmacies and insurers that handle related payments. E-prescription solutions aim for cost containment, enhancement of patient safety, control over doctors’ prescription patterns and process quality assurance. Governmental platforms for patient- or citizen-oriented eHealth services typically offer patients access to gener…
From matrix clause to discourse marker: the grammaticalization of Hauptsache
2021
[EN] This paper has a double purpose. On the one hand, it intends to prove the existence of a discourse marker (DM) Hauptsache. This element preserves the core conceptual meaning of the homonymous noun, but differs from it with regard to its morphosyntactic and semantic features as well as to its discourse-organizing, information structuring, and modal functions. On the other hand, the emergence of Hauptsache as a discourse particle is explained on the grounds of a grammaticalization process similar to the ones described for the prototypical German DMs. Evidence drawn from a corpus of German and Austrian parliamentary protocols will show in which ways the six fundamental processes implied i…
Domain Generation Algorithm Detection Using Machine Learning Methods
2018
A botnet is a network of private computers infected with malicious software and controlled as a group without the knowledge of the owners. Botnets are used by cybercriminals for various malicious activities, such as stealing sensitive data, sending spam, launching Distributed Denial of Service (DDoS) attacks, etc. A Command and Control (C&C) server sends commands to the compromised hosts to execute those malicious activities. In order to avoid detection, recent botnets such as Conficker, Zeus, and Cryptolocker apply a technique called Domain-Fluxing or Domain Name Generation Algorithms (DGA), in which the infected bot periodically generates and tries to resolve a large number of pseudorando…
Social robots and therapeutic adherence: a new challenge in pediatric asthma?
2020
Social Robots are used in different contexts and, in healthcare, they are better known as Socially Assistive Robots. In the context of asthma, the use of Socially Assistive Robots has the potential to increase motivation and engagement to treatment. Other positive roles proposed for Socially Assistive Robots are to provide education, training regarding treatments, and feedback to patients. This review evaluates emerging interventions for improving treatment adherence in pediatric asthma, focusing on the possible future role of social robots in the clinical practice.
Formations of finite monoids and formal languages: Eilenberg’s variety theorem revisited
2014
International audience; We present an extension of Eilenberg's variety theorem, a well-known result connecting algebra to formal languages. We prove that there is a bijective correspondence between formations of finite monoids and certain classes of languages, the formations of languages. Our result permits to treat classes of finite monoids which are not necessarily closed under taking submonoids, contrary to the original theory. We also prove a similar result for ordered monoids.; Nous présentons une extension du théorème des variétés d'Eilenberg, un résultat célèbre reliant l'algèbre à la théorie des langages formels. Nous montrons qu'il existe une correspondance bijective entre les form…
Hypergestures in Complex Time: Creative Performance Between Symbolic and Physical Reality
2015
Musical performance and composition imply hypergestural transformation from symbolic to physical reality and vice versa. But most scores require movements at infinite physical speed that can only be performed approximately by trained musicians. To formally solve this divide between symbolic notation and physical realization, we introduce complex time (\(\mathbb {C}\)-time) in music. In this way, infinite physical speed is “absorbed” by a finite imaginary speed. Gestures thus comprise thought (in imaginary time) and physical realization (in real time) as a world-sheet motion in space-time, corresponding to ideas from physical string theory. Transformation from imaginary to real time gives us…
Formations of Monoids, Congruences, and Formal Languages
2015
The main goal in this paper is to use a dual equivalence in automata theory started in [25] and developed in [3] to prove a general version of the Eilenberg-type theorem presented in [4]. Our principal results confirm the existence of a bijective correspondence between three concepts; formations of monoids, formations of languages and formations of congruences. The result does not require finiteness on monoids, nor regularity on languages nor finite index conditions on congruences. We relate our work to other results in the field and we include applications to non-r-disjunctive languages, Reiterman s equational description of pseudovarieties and varieties of monoids.