Search results for "Protocol"

showing 10 items of 1808 documents

A Dynamic Attribute-Based Authentication Scheme

2015

Attribute-based authentication (ABA) is an approach to authenticate users by their attributes, so that users can get authenticated anonymously and their privacy can be protected. In ABA schemes, required attributes are represented by attribute trees, which can be combined with signature schemes to construct ABA schemes. Most attribute trees are built from top to down and can not change with attribute requirement changes. In this paper, we propose an ABA scheme based on down-to-top built attribute trees or dynamic attribute trees, which can change when attribute requirements change. Therefore, the proposed dynamic ABA scheme is more efficient in a dynamic environment by avoiding regenerating…

Scheme (programming language)AuthenticationComputer scienceComputerApplications_COMPUTERSINOTHERSYSTEMSConstruct (python library)computer.software_genreSignature (logic)Authentication protocolLightweight Extensible Authentication ProtocolData miningChallenge–response authenticationcomputerData Authentication Algorithmcomputer.programming_language
researchProduct

Receiver-Initiated Data Collection in Wake-Up Radio Enabled mIoT Networks: Achieving Collision-Free Transmissions by Hashing and Partitioning

2021

To achieve ultra-low energy consumption and decade-long battery lifetime for Internet of Things (IoT) networks, wake-up radio (WuR) appears as an eminent solution. While keeping devices in deep sleep for most of the time, a WuR enabled IoT device can be woken up for data transmission at any time by a wake-up call (WuC). However, collisions happen among WuCs for transmitter-initiated data reporting and among data packets for receiver-initiated data collection . In this article, we propose three novel hashing-based schemes in order to achieve collision-free data transmissions for receiver-initiated data collection. We consider first a simple scenario where all devices in a region of interest …

Scheme (programming language)Data collectionSIMPLE (military communications protocol)Computer Networks and CommunicationsRenewable Energy Sustainability and the Environmentbusiness.industryNetwork packetComputer scienceHash functionVDP::Technology: 500Energy consumptionUploadbusinesscomputercomputer.programming_languageComputer networkData transmission
researchProduct

Do Children Cooperate Conditionally? Adapting the Strategy Method for First-Graders

2018

We develop a public goods game (PGG) to measure cooperation and conditional cooperation in young children. Our design addresses several obstacles in adapting simultaneous and sequential PGGs to children who are not yet able to read or write, do not possess advanced abilities to calculate payoffs, and only have a very limited attention span at their disposal. It features the combination of haptic offline explanation, fully standardized audiovisual instructions, computerized choices based on touch-screens, and a suitable incentive scheme. Applying our experimental protocol to a sample of German first-graders, we find that already 6-year-olds cooperate conditionally and that the relative frequ…

Scheme (programming language)Protocol (science)IncentiveHuman–computer interactionComputer sciencePublic goods gameIn-group favoritismSample (statistics)computerAttention spancomputer.programming_languageHaptic technologySSRN Electronic Journal
researchProduct

Simple scheme for extracting work with a single bath

2019

We propose a simple protocol exploiting the thermalization of a storage bipartite system S to extract work from a resource system R. The protocol is based on a recent work definition involving only a single bath. A general description of the protocol is provided without specifying the characteristics of S. We quantify both the extracted work and the ideal efficiency of the process, also giving maximum bounds for them. Then, we apply the protocol to two cases: two interacting qubits and the Rabi model. In both cases, for very strong couplings, an extraction of work comparable with the bare energies of the subsystems of S is obtained and its peak is reached for finite values of the bath tempe…

Scheme (programming language)Work (thermodynamics)Ideal (set theory)Quantum ThermodynamicSettore FIS/02 - Fisica Teorica Modelli E Metodi MatematiciComputer scienceProcess (computing)Cavity QEDTopology01 natural sciencesSettore FIS/03 - Fisica Della Materia010305 fluids & plasmasEntanglement[PHYS.QPHY]Physics [physics]/Quantum Physics [quant-ph]Simple (abstract algebra)QubitTransfer (computing)0103 physical sciences010306 general physicscomputerProtocol (object-oriented programming)ComputingMilieux_MISCELLANEOUScomputer.programming_language
researchProduct

Multi-cloud privacy preserving schemes for linear data mining

2015

This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…

Scheme (programming language)privacy linear data miningSIMPLE (military communications protocol)Computer sciencebusiness.industryPrivacy softwareSettore ING-INF/03 - TelecomunicazioniCloud computingcomputer.software_genreSecret sharingComputer Networks and CommunicationFeature (machine learning)Overhead (computing)Data miningElectrical and Electronic EngineeringbusinesscomputerComputer networkcomputer.programming_language
researchProduct

1st International Experts' Meeting on Agitation: Conclusions Regarding the Current and Ideal Management Paradigm of Agitation

2018

Este artículo se encuentra disponible en la página web de la revista en la siguiente URL: https://www.frontiersin.org/articles/10.3389/fpsyt.2018.00054/full En este artículo científico participan los siguientes autores: Mario Amore, Guido Di Sciascio, Radu Ioan Florea, Marina Garriga, Gabriel Gonzalez, Kai G. Kahl, Per-Axel Karlsson, Jens Kuhn, Maria Margariti, Bruno Pacciardi, Konstantinos Papageorgiou, Maurizio Pompili, Fabrice Rivollier, Ángel Royuela, Gemma Safont, Joachim Scharfetter, Bo Skagen, Kazuhiro Tajima-Pozo y Pierre Vidailhet. Agitation is a heterogeneous concept without a uniformly accepted definition, however, it is generally considered as a state of cognitive and motor hype…

Schizophrenia - Treatment.Psychomotor agitationlcsh:RC435-571media_common.quotation_subjectPsychomotor disorders - Treatment.ReviewMotor HyperactivityPsicosis maníaco depresiva - Tratamiento.Esquizofrenia - Farmacoterapia.Psicomotricidad - Trastornos - Tratamiento.03 medical and health sciences0302 clinical medicinePromotion (rank)Bipolar disorder Clinical practice Management Psychomotor agitation Schizophrenia Psychiatry and Mental HealthNursinglcsh:Psychiatrymedicinebipolar disorder; clinical practice; management; psychomotor agitation; schizophreniaManic-depressive illness030212 general & internal medicineManic-Depressive illness - Treatment.media_commonPsychiatrybipolar disorderProtocol (science)Psicosis maníaco depresiva - Farmacoterapia.Trastorn bipolarHealth professionalsCognitionManic-Depressive illnes - Chemotherapy.clinical practice030227 psychiatryschizophreniaClinical PracticeSchizophrenia - Chemotherapy.Psychiatry and Mental healthpsychomotor agitationSchizophreniaEsquizofrèniaEsquizofrenia - Tratamiento.medicine.symptomEmotional arousalPsychologymanagement
researchProduct

FACS-based protocol to assess cytotoxicity and clonogenic potential of colorectal cancer stem cells using a Wnt/β-catenin signaling pathway reporter

2021

Summary Cancer stem cells (CSCs) play a key role in tumor initiation and progression. A real-time tool to evaluate the activation of CSC-specific signaling pathways is crucial for the study of this cancer cell subset. Here, we present a protocol to monitor, in vitro, the activation of Wnt/β-catenin signaling pathway, which is considered a functional biomarker for colorectal CSCs (CR-CSCs). This flow-cytometry-based protocol allows it to isolate CR-CSCs and to evaluate their cytotoxicity upon anti-tumor treatments. For complete details on the use and execution of this protocol, please refer to Di Franco et al. (2021).

Science (General)Colorectal cancerTumor initiationBiologyGeneral Biochemistry Genetics and Molecular BiologyQ1-390Cancer stem cellmedicineProtocolHumansFlow Cytometry/Mass CytometryClonogenic assayWnt Signaling PathwayCancerGeneral Immunology and MicrobiologyGeneral NeuroscienceStem CellsWnt signaling pathwayCancerCell Biologymedicine.diseaseFlow CytometryMolecular/Chemical ProbesCancer cellcolorectal cancers cancer stem cells FACS Wnt.Cell isolationCancer researchNeoplastic Stem CellsCell-based AssaysStem cellSettore MED/46 - Scienze Tecniche Di Medicina Di LaboratorioColorectal NeoplasmsSignal TransductionSTAR Protocols
researchProduct

Autoritarismo global

2003

Seguridad nacionalVidal-Beneyto JoséImperioMultinacionalesMonopolioProtocolo de KiotoPolíticaEconomíaAutoritarismoMediosPublicaciones: Obra periodística: Columnas y artículos de opiniónDoctrinaLiberalismoSistema políticoCasa BlancaEste-OesteDemocraciaBushDiosDirigismoEstados UnidosPúblico PrivadoNaciónFranquismoOpinión pública mundialDerechos HumanosGLOBALIZACIÓNReligiónEuropa
researchProduct

Protocol: Literature review on the psychometric properties of the short versions of the scales of social desirability in the answers to competency se…

2018

[EN] Research in business organization in general and talent management (in university or professional students) uses in many cases self-administered questionnaires as a source of data to assess people's competencies. In clinical psychology, it has been shown that self-evaluations of behaviors may present a bias of social desirability. However, even in this field of research it is not usual to measure its effect when taking data. Our work proposes a protocol to find a set of scales of social desirability (SD) with less than 20 items that are valid and reliable. We also intend to identify if SD scales are associated with the self-assessments of some transversal competences.

Self-assessment0209 industrial biotechnologylcsh:Management. Industrial managementlcsh:Personnel management. Employment managementSocial desirabilityScales02 engineering and technology020901 industrial engineering & automation0502 economics and businessProtocolCuestionariosSocial desirabilityLiterature reviewProtocolo05 social scienceslcsh:HF5549-5549.5Revisión de literaturaCompetencias transversalesVersiones cortaslcsh:HD28-70Short versionSoft skillsEscalasDeseabilidad socialPsychologyHumanities050203 business & management
researchProduct

Telepsychology and Self-help: The Treatment of Fear of Public Speaking

2007

Abstract This work presents a self-help, Internet-based telepsychology program for the treatment of public speaking fears. The system is comprised of 3 parts: The assessment protocol gives the patient information about his or her problem (i.e., amount of interference it creates in his or her life, severity, degree of fear and avoidance). The system also includes a structured treatment protocol, organized into separate blocks, reflecting the patient’s progress. This ensures that the patient does not skip any steps in the treatment (something quite common in traditional self-help manuals), which provides more control over the process. The treatment protocol is a cognitive-behavioral program t…

Self-helpProtocol (science)Clinical PsychologyPublic speakingPsychotherapistbusiness.industryControl (management)The InternetSequence learningClosure (psychology)businessPsychologyTreatment efficacyCognitive and Behavioral Practice
researchProduct