Search results for "Object-oriented programming"

showing 10 items of 282 documents

Meta-analysis of time perception and temporal processing in schizophrenia: Differential effects on precision and accuracy

2016

Numerous studies have reported that time perception and temporal processing are impaired in schizophrenia. In a meta-analytical review, we differentiate between time perception (judgments of time intervals) and basic temporal processing (e.g., judgments of temporal order) as well as between effects on accuracy (deviation of estimates from the veridical value) and precision (variability of judgments). In a meta-regression approach, we also included the specific tasks and the different time interval ranges as covariates. We considered 68 publications of the past 65years, and meta-analyzed data from 957 patients with schizophrenia and 1060 healthy control participants. Independent of tasks and…

Schizophrenia (object-oriented programming)05 social sciencesCognitionTime perceptionbehavioral disciplines and activities050105 experimental psychologyDevelopmental psychologyJudgment03 medical and health sciencesPsychiatry and Mental healthClinical PsychologyInterval (music)Variable (computer science)0302 clinical medicineMeta-analysisTime PerceptionCovariateHumansSchizophrenic Psychology0501 psychology and cognitive sciencesMeta-regressionPsychology030217 neurology & neurosurgeryCognitive psychologyClinical Psychology Review
researchProduct

'Love comes first, and it is ahead of any different political partisanism': How political polarizations compare to other forms of discrimination in B…

2021

Background: Affective polarization and stigma toward individuals with schizophrenia and toward immigrants in Argentina are not new despite its importance and dissemination. However, no research has been conducted taking into consideration political partisanship and attitudes toward these groups. Aims: Political polarization and attitudes toward socialization across party lines are studied in conjunction with attitudes toward immigrants and toward individuals with schizophrenia. Method: Individuals from Buenos Aires ( n = 712) were surveyed for their political partisanship and their attitudes toward Peruvian and Bolivian immigrants, people with schizophrenia and partisans from the opposing p…

Schizophrenia (object-oriented programming)media_common.quotation_subject05 social sciencesPolarization (politics)ImmigrationSocial StigmaArgentinaStigma (botany)030227 psychiatry0506 political science03 medical and health sciencesPsychiatry and Mental healthPolitics0302 clinical medicineAttitude050602 political science & public administrationSchizophreniaHumansPsychologyChildSocial psychologymedia_commonThe International journal of social psychiatry
researchProduct

A Geographical Self-Organizing Approach for Vehicular Networks

2012

Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and to existing infrastructure. However, their industrialization faces some challenges: (i) high mobility, (ii) frequently partitioned network, (iii) geographically constrained topology, and (iv) scalability. Therefore, in contrast to traditional networks, vehicular network protocols focus on both achieving adequate QoS level and reducing overhead. Achieving these tw…

Self-organizationVehicular ad hoc network[SPI] Engineering Sciences [physics]Computer sciencebusiness.industryQuality of serviceself-organizationvirtual backboneperformance evaluationScalabilityKey (cryptography)Overhead (computing)vehicular networksElectrical and Electronic EngineeringCommunications protocolbusinessProtocol (object-oriented programming)analytical study.clusteringComputer networkJournal of Communications
researchProduct

PROLISEAN: A New Security Protocol for Programmable Matter

2021

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…

Self-reconfiguring modular robot0209 industrial biotechnologySecurity AlgorithmsComputer Networks and CommunicationsComputer scienceDistributed computingHash functionSecurity Protocol02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]EncryptionLightweight Cryptography[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automationComponent (UML)0202 electrical engineering electronic engineering information engineeringModular RobotsProgrammable MatterProtocol (object-oriented programming)IOTbusiness.industry020206 networking & telecommunicationsCryptographic protocolSupercomputer[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationProgrammable matter[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Amoebots[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessDistributed Computing
researchProduct

Privacy Enhanced Device Access

2012

In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.

Service (business)AuthenticationIntegrated access deviceComputer scienceAuthentication protocolNetwork Access DeviceNetwork block deviceCryptographic protocolComputer securitycomputer.software_genreProtocol (object-oriented programming)computer
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct

Performance evaluation of differentiated access mechanisms effectiveness in 802.11 networks

2005

The IEEE 802.11e draft specification aims to extend the original 802.11 MAC protocol by introducing priority mechanisms able to manage bandwidth and resource allocation according to the QoS needs of real-time applications. Different strategies based on MAC parameter diversifications, such as contention window limits, contention window updating factor and silence monitoring time, can be pursued in order to provide service differentiation, also in the case of distributed access. In this paper, we investigate on the behaviour of each differentiation possibility under different load conditions and traffic requirements. Our results show that the most powerful mechanisms which provide service dif…

Service (systems architecture)Order (exchange)business.industryComputer scienceQuality of serviceWireless lanBandwidth (computing)Resource allocationWindow (computing)businessProtocol (object-oriented programming)Computer network
researchProduct

Mobile agents and grid computing

2004

Publisher Summary This chapter describes mobile agents as an effective solution for grid service provision. A short overview is first introduced on the grid paradigm and the most known research activities in the field. Then, mobile agents are discussed and a comparison with the remote procedure call (RPC) method is made as far as the most effective solution to minimize network overload and fault occurrences is concerned. The common feature of all grid architectures is a coordinated and controlled resource sharing between the members of a dynamic multi-institutional virtual community. Community members agree on a set of sharing rules and permissions, by which resources to be shared and membe…

Service (systems architecture)Semantic gridGrid computingComputer scienceRemote procedure callDistributed computingInteroperabilityGridcomputer.software_genreProtocol (object-oriented programming)computerShared resource
researchProduct

Improvement of a Service Level Negotiation Protocol using Formal Verification

2013

International audience; The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of the open medium of these technologies. In this context, we need to guarantee both quality of service and security for mobile users communications. In this paper, we present a protocol for service level negotiation which covers both quality of service and security and assigns a profile to each user in order to optimize and a…

Service delivery frameworkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Service Level02 engineering and technologyNegotiation protocolComputer securitycomputer.software_genre[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringProtocol (object-oriented programming)Formal verificationPROMELAcomputer.programming_language060201 languages & linguistics[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryWireless networkQuality of service06 humanities and the artsFormal verificationSecurity servicePromelaSPINService level0602 languages and literature020201 artificial intelligence & image processingThe InternetMobile telephonyFSM modelbusinesscomputerComputer network
researchProduct

A Case of Cooperative Sound Design

2016

In this design case study, protocol and linkographic analysis are applied to a task of cooperative vocal sketching, proposed in the scope of educational research activities. The understanding of the cognitive behaviors involved in sound creation is aimed at setting the ground for the development of rigorous, designerly evaluation practices tailored to sound design, all the way to the final interactive product. Relevant qualitative and quantitative information about the creative process informs the assessment and possibly improvement of sound design methods.

Settore INF/01 - InformaticaScope (project management)Computer scienceProcess (engineering)4. EducationSound design05 social sciences020207 software engineering02 engineering and technologyProduct sound designTask (project management)Design cognitionEducational researchDesign theoryHuman–computer interactionSonic interaction designSettore ICAR/13 - Disegno Industriale0202 electrical engineering electronic engineering information engineeringDesigntheory0501 psychology and cognitive sciencesSonic interaction designProtocol (object-oriented programming)Vocal sketching050107 human factorsProceedings of the 9th Nordic Conference on Human-Computer Interaction
researchProduct