Search results for "Protocol"
showing 10 items of 1808 documents
A Dynamic Attribute-Based Authentication Scheme
2015
Attribute-based authentication (ABA) is an approach to authenticate users by their attributes, so that users can get authenticated anonymously and their privacy can be protected. In ABA schemes, required attributes are represented by attribute trees, which can be combined with signature schemes to construct ABA schemes. Most attribute trees are built from top to down and can not change with attribute requirement changes. In this paper, we propose an ABA scheme based on down-to-top built attribute trees or dynamic attribute trees, which can change when attribute requirements change. Therefore, the proposed dynamic ABA scheme is more efficient in a dynamic environment by avoiding regenerating…
Receiver-Initiated Data Collection in Wake-Up Radio Enabled mIoT Networks: Achieving Collision-Free Transmissions by Hashing and Partitioning
2021
To achieve ultra-low energy consumption and decade-long battery lifetime for Internet of Things (IoT) networks, wake-up radio (WuR) appears as an eminent solution. While keeping devices in deep sleep for most of the time, a WuR enabled IoT device can be woken up for data transmission at any time by a wake-up call (WuC). However, collisions happen among WuCs for transmitter-initiated data reporting and among data packets for receiver-initiated data collection . In this article, we propose three novel hashing-based schemes in order to achieve collision-free data transmissions for receiver-initiated data collection. We consider first a simple scenario where all devices in a region of interest …
Do Children Cooperate Conditionally? Adapting the Strategy Method for First-Graders
2018
We develop a public goods game (PGG) to measure cooperation and conditional cooperation in young children. Our design addresses several obstacles in adapting simultaneous and sequential PGGs to children who are not yet able to read or write, do not possess advanced abilities to calculate payoffs, and only have a very limited attention span at their disposal. It features the combination of haptic offline explanation, fully standardized audiovisual instructions, computerized choices based on touch-screens, and a suitable incentive scheme. Applying our experimental protocol to a sample of German first-graders, we find that already 6-year-olds cooperate conditionally and that the relative frequ…
Simple scheme for extracting work with a single bath
2019
We propose a simple protocol exploiting the thermalization of a storage bipartite system S to extract work from a resource system R. The protocol is based on a recent work definition involving only a single bath. A general description of the protocol is provided without specifying the characteristics of S. We quantify both the extracted work and the ideal efficiency of the process, also giving maximum bounds for them. Then, we apply the protocol to two cases: two interacting qubits and the Rabi model. In both cases, for very strong couplings, an extraction of work comparable with the bare energies of the subsystems of S is obtained and its peak is reached for finite values of the bath tempe…
Multi-cloud privacy preserving schemes for linear data mining
2015
This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…
1st International Experts' Meeting on Agitation: Conclusions Regarding the Current and Ideal Management Paradigm of Agitation
2018
Este artículo se encuentra disponible en la página web de la revista en la siguiente URL: https://www.frontiersin.org/articles/10.3389/fpsyt.2018.00054/full En este artículo científico participan los siguientes autores: Mario Amore, Guido Di Sciascio, Radu Ioan Florea, Marina Garriga, Gabriel Gonzalez, Kai G. Kahl, Per-Axel Karlsson, Jens Kuhn, Maria Margariti, Bruno Pacciardi, Konstantinos Papageorgiou, Maurizio Pompili, Fabrice Rivollier, Ángel Royuela, Gemma Safont, Joachim Scharfetter, Bo Skagen, Kazuhiro Tajima-Pozo y Pierre Vidailhet. Agitation is a heterogeneous concept without a uniformly accepted definition, however, it is generally considered as a state of cognitive and motor hype…
FACS-based protocol to assess cytotoxicity and clonogenic potential of colorectal cancer stem cells using a Wnt/β-catenin signaling pathway reporter
2021
Summary Cancer stem cells (CSCs) play a key role in tumor initiation and progression. A real-time tool to evaluate the activation of CSC-specific signaling pathways is crucial for the study of this cancer cell subset. Here, we present a protocol to monitor, in vitro, the activation of Wnt/β-catenin signaling pathway, which is considered a functional biomarker for colorectal CSCs (CR-CSCs). This flow-cytometry-based protocol allows it to isolate CR-CSCs and to evaluate their cytotoxicity upon anti-tumor treatments. For complete details on the use and execution of this protocol, please refer to Di Franco et al. (2021).
Autoritarismo global
2003
Protocol: Literature review on the psychometric properties of the short versions of the scales of social desirability in the answers to competency se…
2018
[EN] Research in business organization in general and talent management (in university or professional students) uses in many cases self-administered questionnaires as a source of data to assess people's competencies. In clinical psychology, it has been shown that self-evaluations of behaviors may present a bias of social desirability. However, even in this field of research it is not usual to measure its effect when taking data. Our work proposes a protocol to find a set of scales of social desirability (SD) with less than 20 items that are valid and reliable. We also intend to identify if SD scales are associated with the self-assessments of some transversal competences.
Telepsychology and Self-help: The Treatment of Fear of Public Speaking
2007
Abstract This work presents a self-help, Internet-based telepsychology program for the treatment of public speaking fears. The system is comprised of 3 parts: The assessment protocol gives the patient information about his or her problem (i.e., amount of interference it creates in his or her life, severity, degree of fear and avoidance). The system also includes a structured treatment protocol, organized into separate blocks, reflecting the patient’s progress. This ensures that the patient does not skip any steps in the treatment (something quite common in traditional self-help manuals), which provides more control over the process. The treatment protocol is a cognitive-behavioral program t…