Search results for "Protocol"

showing 10 items of 1808 documents

L’incriminazione dello smuggling of migrants in Europa: una ricognizione comparatistica

2019

Il lavoro opera una ricognizione comparatistica di varie discipline del migrant smuggling: internazionale (Protocollo ONU), sovranazionale (UE Facilitation package) e nazionali (Italia, Portogallo, Spagna, Germania), a partire dai dati raccolti nel corso della ricerca "The New Era of Smuggling in the Mediterranean Sea" (2017-19), finanziata da PMI

Migrant smuggling - Facilitation package - UN Protocol against smuggling - State-centred paradigm - Migrant-centred paradigmSettore IUS/17 - Diritto Penale
researchProduct

Smuggled migrants as victims? Reflecting on the UN Protocol against migrant smuggling and on its implementation

2021

After outlining the UN Protocol’s general approach to migrant smuggling, the paper raises the question of whether and to what extent smuggled migrants can be said to be victims of this crime. The author argues that an affirmative answer is possible in at least three different senses: smuggled migrants can be victimized by states fighting against migrant smuggling and irregular immigration (secondary victimization); but, of course, they can also be victimized by smugglers (primary victimization), in two ways: first, if smuggling is so performed as to put their lives, physical integrity or dignity at risk; secondly, smugglers also victimize migrants by profiting of their vulnerable condition,…

Migrant smugglingSettore IUS/17 - Diritto PenaleSoM ProtocolDirective 2002/90/ECEU Facilitation package
researchProduct

Feasibility of the Internet Attachment-Based Compassion Therapy in the General Population: Protocol for an Open-Label Uncontrolled Pilot Trial

2020

Background Compassion-based interventions delivered over the internet are showing promising results for the promotion of psychological health and well-being. Several studies have highlighted their feasibility, acceptance, and preliminary efficacy. However, this is an incipient field of research, and to the best of our knowledge, there are no data available from Spanish-speaking countries. Objective The aim of this study is to investigate the feasibility, acceptance, and preliminary efficacy of the Internet Attachment–Based Compassion Therapy (iABCT), a web-based version of the Attachment-Based Compassion Therapy, in Spanish speakers from the general population. Methods This feasibility stu…

Mindfulnessanimal structures020205 medical informaticsSelf-criticismmeditationComputer applications to medicine. Medical informaticsPopulationR858-859.7Psychological interventioncompassion02 engineering and technologylaw.invention03 medical and health sciences0302 clinical medicineRandomized controlled triallawProtocol0202 electrical engineering electronic engineering information engineeringhappiness030212 general & internal medicineeducationeducation.field_of_studyMedical educationbusiness.industryfeasibility studiesself-criticismRUsabilityGeneral MedicineClinical trialPsicologiaMedicineinternetGeneral Health QuestionnairePsychologybusiness
researchProduct

Using MANET Protocols in Wireless Sensor and Actor Networks

2008

Although there are several routing protocols for wireless sensor and actor networks (WSAN), none of them have became standard. Now, there are several standard protocols for mobile ad hoc networks (MANET) that have been developed for devices with higher computing features than the sensor nodes. On the other hand, one of the main characteristics of the MANET protocols is their scalability. In this paper, we show the performance of a WSAN, when MANET protocols are used, for several topologies. We will discuss and evaluate which standard protocol is the best one depending on the number of nodes in the topology and depending on their mobility. Finally we will show their comparison. As far as we …

Mobile radioRouting protocolbusiness.industryComputer scienceWireless ad hoc networkDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile ad hoc networkNetwork topologyScalabilityWirelessbusinessWireless sensor networkComputer network2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008)
researchProduct

A MANET Autoconfiguration System based on Bluetooth Technology

2006

The availability of both Wi-Fi and Bluetooth technologies on currently available devices offers the possibility to combine both in order to make the most out of their capabilities. In this paper we propose using Bluetooth technology to solve the configuration problem of the terminals conforming an IEEE 802.11-based ad-hoc network. The main objective of mobile ad- hoc networks (MANETs) is to extend the connectivity range of nodes through packet forwarding, thereby avoiding the use of a fixed infrastructure. However, since configuration of nodes is a complex issue, we provide a fast and reliable solution to auto-configure MANET terminals. Our solution is adequate for the quick setup and deplo…

Mobile radioSIMPLE (military communications protocol)Computer sciencebusiness.industryWireless ad hoc networkDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPacket forwardingMobile ad hoc networklaw.inventionBluetoothIEEE 802.11Software deploymentlawbusinessComputer network2006 3rd International Symposium on Wireless Communication Systems
researchProduct

Complete Shadowing Modeling and its Effect on System Level Performance Evaluation

2008

Computer simulations are a common procedure for assessing the performance of new algorithms. To conduct a valid and accurate study, the models employed in such simulators need to be carefully selected. Regarding shadowing modeling, one-dimensional models are fairly commonplace in the literature. While simple and with low computational costs, these models can not produce correlated fading values for mobiles that are in nearby positions and, besides, do not include the cross-correlation effect. To overcome these limitations, this paper presents a bi-dimensional shadowing model which introduces both the spatial correlation and the cross-correlation present in real systems. Finally, the impact …

Mobile radioSpatial correlationComputer engineeringComputer sciencelawRadio access technologyRadio Link ProtocolTransmitterElectronic engineeringFadingShadow mappingUMTS frequency bandslaw.inventionVTC Spring 2008 - IEEE Vehicular Technology Conference
researchProduct

Group mobility impact over TCP and CBR traffic in mobile ad hoc networks

2004

We present an analysis of the effect that mobility models have over the performance of a mobile ad hoc network. We concentrate on group mobility because there is a growing attention on the development and evaluation of MANET's approach applied to personal area networks (PANs), especially based on Bluetooth technology. We investigate the effect that the mobility model has on the performance of CBR traffic and TCP traffic. We propose four different group mobility models and describe a mobility pattern generator called grcmob to be used with the ns-2 simulator. We perform a thorough evaluation of a MANET behavior using as a reference the behavior obtained with the random waypoint mobility mode…

Mobility modelVehicular ad hoc networkbusiness.industryComputer scienceWireless ad hoc networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computingMobile ad hoc networklaw.inventionBluetoothOptimized Link State Routing ProtocollawMobile telephonybusinessComputer network12th Euromicro Conference on Parallel, Distributed and Network-Based Processing, 2004. Proceedings.
researchProduct

Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther

2016

Scyther [1] is designed to check the security and vulnerabilities of security protocols. In this paper, we use Scyther to analyze two discrete logarithm problem (DLP) based group authentication protocols proposed in [2]. These two protocols are claimed to satisfy several security requirements, but only part of them have been checked because of the properties and limitations of Scyther. Some positive results have been gained and show that the protocols provide mutual authentication and implicit key authentication and are secure against impersonation attack. An important innovation in this paper is that we have extended the expressing ability of Scyther by giving some reasonable assumption du…

Model checkingAuthenticationTheoretical computer scienceComputer sciencebusiness.industry020206 networking & telecommunicationsCryptography02 engineering and technologyMutual authenticationCryptographic protocolComputer securitycomputer.software_genreKey authenticationDiscrete logarithmAuthentication protocol0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputer2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP)
researchProduct

Towards a Formal Analysis of MQtt Protocol in the Context of Communicating Vehicles

2017

International audience; The paper presents a formal approach to model, analyze, and verify a variant of Message Queue Telemetry Transport protocol (MQtt), dedicated to communicating vehicles (MQtt-CV) that send collected data to automotive infrastructures(subscribers). Our formal approach is based on Promela language and its system verification tool, the model checker SPIN. We propose a slight modification of MQtt protocol to reduce the big volume of data collected and sent by vehicles to infrastructures. Indeed, in the original version of MQtt protocol, when a broker receives data from publishers, it sends them directly to its subscribers without any filtration. As consequence, subscribers…

Model checkingComputer scienceDistributed computingAutomotive industryContext (language use)02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringProtocol (object-oriented programming)computer.programming_languageMQTTbusiness.industryVolume (computing)020206 networking & telecommunications020207 software engineering[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationPromela[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessMessage queuecomputerComputer network
researchProduct

Implementing an ATL model checker tool using relational algebra concepts

2014

Alternating-Time Temporal Logic (ATL) is a branching-time temporal logic that naturally describes computations of open systems. An open system interacts with its environment and its behavior depends on the state of the system as well as the behavior of the environment. ATL model-checking is a well-established technique for verifying that a formal model representing such a system satisfies a given property. In this paper we describe a new interactive model checker environment based on algebraic approach. Our tool is implemented in client-server paradigm. The client part allows an interactive construction of ATL models represented by concurrent game structures as directed multi-graphs. The se…

Model checkingSQLTheoretical computer scienceProgramming languageComputer sciencecomputer.internet_protocolRelational algebracomputer.software_genreOpen system (systems theory)Temporal logicWeb servicecomputerServer-sideXMLcomputer.programming_language2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
researchProduct