Search results for "Overlay"

showing 10 items of 61 documents

A secret sharing scheme for anonymous DNS queries

2013

Since its adoption in the early 90's, several privacy concerns have emerged about the Domain Name System (DNS). By collecting the DNS queries performed by each user, it is possible to characterize habits, interests and other sensitive data of the users. Usually, users resolve their {\em url} requests by querying the DSN server belonging to their Internet Service Provider (ISP) and therefore they assume they can trust it. However, different DNS servers can be used, by revealing sensitive data to a partially untrusted entity that can collect and sell this data for several purposes (target advertising, user profiling, etc.). In this paper we address the possibility to integrate tools in the cu…

Name serverInformation privacyComputer scienceRound-robin DNSecret sharing schemeOverlay networkServersServernsupdateISPDNS spoofingPeer-to-peer computingDNS hijackingdomain name systemInternetdata privacyender anonymitybusiness.industrySettore ING-INF/03 - TelecomunicazioniDomain Name Systemquery processinguser privacyComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSmultiple nodeIP networkInternet service provideranonymous DNS queryPrivacyecurity of dataCryptographybusinessComputer networkDSN serverRadiation detector
researchProduct

On Constructing Persistent Identifiers with Persistent Resolution Targets

2016

Persistent Identifiers (PID) are the foundation referencing digital assets in scientific publications, books, and digital repositories. In its realization, PIDs contain metadata and resolving targets in form of URLs that point to data sets located on the network. In contrast to PIDs, the target URLs are typically changing over time; thus, PIDs need continuous maintenance -- an effort that is increasing tremendously with the advancement of e-Science and the advent of the Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are subject of PID assignment. This paper presents a new approach of embedding location independent targets into PIDs that allows the creation of maintena…

Networking and Internet Architecture (cs.NI)FOS: Computer and information scienceslcsh:T58.5-58.64lcsh:Information technologyComputer sciencebusiness.industryOverlay network020206 networking & telecommunications02 engineering and technologycomputer.file_formatMaintenance engineeringlcsh:QA75.5-76.95IdentifierMetadataComputer Science - Networking and Internet ArchitectureData accessEncoding (memory)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processinglcsh:Electronic computers. Computer sciencebusinessDisseminationBitTorrentcomputerComputer network
researchProduct

A comparison of the marginal adaptation of composite overlays fabricated with silicone and an intraoral scanner

2021

Background Intraoral scanners have been developing during last years. The aim of this study was to know if digital impressions achieve a marginal adaptation in overlays as well as conventional impressions with silicone. Material and methods Sixty-two extracted molars were selected. The samples were prepared for MOD overlays. The teeth were divided into two groups (n=31). Group 1: impressions were made with silicone (Express™ Impression, 3M ESPE) and overlays were manufactured with Sinfony composite (3M ESPE) by the laboratory technician. Group 2: impressions were taken with the scanner True Definition (TD, 3M ESPE) and under Lava Ultimate CAD/CAM Restorative composite (3M ESPE) were produce…

OrthodonticsMolarIntraoral scannerResearchComposite numberMagnificationAdaptation (eye)030206 dentistryOverlayImpressionOperative Dentistry and Endodontics03 medical and health scienceschemistry.chemical_compound0302 clinical medicineSiliconechemistryGeneral DentistryUNESCO:CIENCIAS MÉDICAS030217 neurology & neurosurgeryMathematicsJournal of Clinical and Experimental Dentistry
researchProduct

Privacy-Preserving Overgrid: Secure Data Collection for the Smart Grid

2020

In this paper, we present a privacy-preserving scheme for Overgrid, a fully distributed peer-to-peer (P2P) architecture designed to automatically control and implement distributed Demand Response (DR) schemes in a community of smart buildings with energy generation and storage capabilities. To monitor the power consumption of the buildings, while respecting the privacy of the users, we extend our previous Overgrid algorithms to provide privacy preserving data aggregation (PP-Overgrid). This new technique combines a distributed data aggregation scheme with the Secure Multi-Party Computation paradigm. First, we use the energy profiles of hundreds of buildings, classifying the amount of &ldquo

Overlay networksComputer scienceDistributed computingOverlay networkSmart grid02 engineering and technologylcsh:Chemical technologyBiochemistryArticlePeer to peerAnalytical ChemistryDemand response0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringSecret sharingInstrumentationOvergridBuilding automationP2P020203 distributed computingbusiness.industryDistributed; Gossiping; Overgrid; Overlay networks; P2P; Peer to peer; Privacy; Secret sharing; Smart grid020206 networking & telecommunicationsEnergy consumptionAtomic and Molecular Physics and OpticsRenewable energyDistributedElectricity generationSmart gridPrivacyGossipingbusinessSensors
researchProduct

Interest-based topology management in unstructured peer-to-peer networks

2012

P2Pverkkotopologiatiedonhakujärjestelmätneuroverkottiedonsiirtopeer-to-peer networksoverlay topologyvertaisverkotoptimointialgoritmittopology managementself-organizingsimulointitietoverkotresource discovery
researchProduct

Chalcogen adsorption and surface magnetism

2000

Abstract Investigations concerning the electronic and magnetic properties of oxygen and sulfur adsorbed on magnetized surfaces were carried out by means of angle and spin resolving photoelectron spectroscopy. Iron(110), a polycrystalline iron alloy, and an amorphous metallic glass (Fe 79 B 16 Si 5 ) served as ferromagnetic substrates. Exchange splittings of the O 2p and S 3p derived levels could be detected, demonstrating a magnetic coupling between the chemisorbate and iron. This observation presents a prerequisite for an induced magnetic moment within the adsorbate overlayer. For sulfur an adsorbate-induced structure only in the minority spin channel near the Fermi level was observed whic…

RadiationMaterials scienceAmorphous metalMagnetic momentCondensed matter physicsMagnetismAlloyInorganic chemistryFermi levelengineering.materialCondensed Matter PhysicsAtomic and Molecular Physics and OpticsElectronic Optical and Magnetic MaterialsOverlayerAmorphous solidCondensed Matter::Materials Sciencesymbols.namesakeFerromagnetismengineeringsymbolsPhysics::Chemical PhysicsPhysical and Theoretical ChemistrySpectroscopyJournal of Electron Spectroscopy and Related Phenomena
researchProduct

Small-diameter titanium Grade IV and titanium-zirconium implants in edentulous mandibles: three-year results from a double-blind, randomized controll…

2015

OBJECTIVE: The aim of this study was to compare crestal bone-level changes, soft tissue parameters and implant success and survival between small-diameter implants made of titanium/zirconium (TiZr) alloy or of Grade IV titanium (Ti) in edentulous mandibles restored with removable overdentures. MATERIALS AND METHODS: This was a randomized, controlled, double-blind, split-mouth multicenter clinical trial. Patients with edentulous mandibles received two Straumann bone-level implants (diameter 3.3 mm), one of Ti Grade IV (control) and one of TiZr (test), in the interforaminal region. Implants were loaded after 6-8 weeks and removable Locator-retained overdentures were placed within 2 weeks of l…

RoxolidMaleSmall diameterSLActive surfaceDentistrychemistry.chemical_elementMandibleCONVENTIONAL COMPLETE DENTURESlaw.inventionDouble blindRETROSPECTIVE EVALUATION IMPLANTDouble-Blind MethodRandomized controlled triallawMARGINAL BONE LOSSHumansJaw EdentulousMedicineMANDIBULAR 2-IMPLANT OVERDENTURES610 Medicine & healthAgedDental ImplantsTitaniumPATIENT SATISFACTIONTitanium/zirconiumSTRESS-DISTRIBUTIONbusiness.industryDental Implantation Endosseoustechnology industry and agricultureWITHIN-SUBJECT COMPARISONSSoft tissueDIFFERENT LOADING PROTOCOLSDenture Overlayequipment and suppliesTitanium zirconiumddc:617.6Treatment OutcomeDental Prosthesis DesignchemistryImplant typesedentulousFemaleZirconiumImplantFINITE-ELEMENT-ANALYSISOral SurgerybusinessDental AlloysTitaniumClinical Oral Implants Research
researchProduct

Small-diameter titanium grade IV and titanium-zirconium implants in edentulous mandibles: five-year results from a double-blind, randomized controlle…

2015

BACKGROUND The aim of this study was to compare the 5-year survival and success rates of 3.3 mm dental implants either made from titanium-zirconium (TiZr) alloy or from Grade IV titanium (Ti Grade IV) in mandibular implant-based removable overdentures. METHODS The core study had a follow-up period of 36 months and was designed as a randomized, controlled, double-blind, split-mouth multicenter clinical trial. Patients with edentulous mandibles received two Straumann Bone Level implants (diameter 3.3 mm, SLActive®), one of TiZr (test) and one of Ti Grade IV (control), in the interforaminal region. This follow-up study recruited patients from the core study and evaluated the plaque and sulcus …

RoxolidSmall diameterSplit-mouthDentistrychemistry.chemical_element610 Medicine & healthMandiblelaw.inventionTiZrDouble blindstomatognathic systemRandomized controlled trialDouble-Blind MethodlawOverdenturesAlloysMedicineHumansJaw Edentulous610 Medicine & healthGeneral DentistrySurvival rateOrthodonticsDental ImplantsTitaniumbusiness.industryDentistry(all)Ti Grade IVDental Implantation Endosseoustechnology industry and agricultureSLActiveequipment and suppliesDenture OverlayTitanium zirconiumddc:617.6stomatognathic diseaseschemistryDental Prosthesis DesignOral and maxillofacial surgeryImplantZirconiumbusinessTitaniumFollow-Up StudiesResearch Article
researchProduct

A Community-based Approach for Service-based Application Composition in an Ecosystem

2010

The design of composite applications by combining existing services with known semantics is an ongoing topic in current research. Several studies are aimed at providing service description models and standards, service discovery and matching etc. However, service composition in distributed dynamic environments such as P2P ecosystems has received little attention from research communities. In this paper we present a design framework for composing services, taking in particular into account different ways of building peercommunities based on network or services characteristics.

Service (business)Matching (statistics)Computer sciencecomputer.internet_protocolbusiness.industryEnvironmental resource managementService discoveryOverlay networkService-oriented architectureSemanticsData scienceEcosystemService-based Application CompositionbusinesscomputerComposition (language)
researchProduct

Trust enhancement of P2PSIP communication systems

2011

Today, peer-to-peer (P2P) session initiation protocol (SIP)-based communication systems have attracted much attention from both academia and industry. The decentralised nature of P2P might provide the distributed P2P communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g., privacy leaks, unpredictable availability, etc. In this paper, we investigate P2PSIP security issues and propose a subjective logic-based trust model that offers trust-based security services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, d…

Session Initiation ProtocolComputer Networks and CommunicationsComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSOverlayComputer securitycomputer.software_genreCommunications systemComputer Science ApplicationsDistributed hash tableNAT traversalConfidentialitySubjective logicChord (peer-to-peer)computerInternational Journal of Internet Technology and Secured Transactions
researchProduct