Search results for "SYSTEMS"

showing 10 items of 11952 documents

Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct

2020

Blockchain is a multiparty protocol to reach agreement on the order of events, and to record them consistently and immutably without centralized trust. In some cases, however, the blockchain can benefit from some controlled mutability. Examples include removing private information or unlawful content, and correcting protocol vulnerabilities which would otherwise require a hard fork. Two approaches to control the mutability are: moderation, where one or more designated administrators can use their private keys to approve a redaction, and voting, where miners can vote to endorse a suggested redaction. In this paper, we first present several attacks against existing redactable blockchain solut…

020203 distributed computingComputer sciencemedia_common.quotation_subject02 engineering and technologyConstruct (python library)RedactionComputer securitycomputer.software_genreDigital signatureOrder (exchange)020204 information systemsVoting0202 electrical engineering electronic engineering information engineeringFork (file system)Protocol (object-oriented programming)computerPrivate information retrievalmedia_common
researchProduct

Combining congested-flow isolation and injection throttling in HPC interconnection networks

2011

Existing congestion control mechanisms in interconnects can be divided into two general approaches. One is to throttle traffic injection at the sources that contribute to congestion, and the other is to isolate the congested traffic in specially designated resources. These two approaches have different, but non-overlapping weaknesses. In this paper we present in detail a method that combines injection throttling and congested-flow isolation. Through simulation studies we first demonstrate the respective flaws of the injection throttling and of flow isolation. Thereafter we show that our combined method extracts the best of both approaches in the sense that it gives fast reaction to congesti…

020203 distributed computingInterconnectionbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSFlow (psychology)020206 networking & telecommunications02 engineering and technologyBandwidth throttlingThrottleNetwork congestion0202 electrical engineering electronic engineering information engineeringIsolation (database systems)businessCombined methodComputer network
researchProduct

Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks

2016

Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…

020203 distributed computingVehicular ad hoc networkLocation privacyWireless ad hoc networkComputer sciencebusiness.industry[SPI] Engineering Sciences [physics]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPseudonyms distribution.020206 networking & telecommunications02 engineering and technologyPseudonymNetwork simulationIdentifier[SPI]Engineering Sciences [physics]Pseudonyms distribution0202 electrical engineering electronic engineering information engineeringSecurityComputingMilieux_COMPUTERSANDSOCIETYGeneral Earth and Planetary SciencesDistribution methodVANETsbusinessGeneral Environmental ScienceComputer network
researchProduct

Peer-to-Peer-Technologien — Einflüsse digitaler dezentraler Ressourcennutzung auf elektronische Märkte

2003

Peer-to-Peer-Systeme sind in jungerer Zeit hauptsachlich durch die verbreiteten und oft kritisierten Musiktauschborsen wie Napster1 oder Gnutella2 bekannt geworden. Oftmals wird „Peer-to-Peer“sogar mit dem Austausch von Musik- und Videodateien gleichgesetzt. Diese Reduzierung des Begriffs auf das blose Austauschen von Dateien (Filesharing) wird jedoch nicht dem Peer-to-Peer-Begriff und erst recht nicht dem Potenzial des Peer-to-Peer Computing gerecht. Filesharing darf insofern nur als eine spezielle Applikation gesehen werden, die sich mit Hilfe von Peer-to-Peer-Technologien bewaltigen lasst.

020204 information systems0202 electrical engineering electronic engineering information engineering020207 software engineering02 engineering and technology
researchProduct

Four steps to identify mechanisms of ICT4D: A critical realism-based methodology

2018

020204 information systemsCritical realism (philosophy of perception)0502 economics and business05 social sciences0202 electrical engineering electronic engineering information engineering02 engineering and technologySociology050203 business & managementInformation SystemsEpistemologyThe Electronic Journal of Information Systems in Developing Countries
researchProduct

Controversias en la transición del libro de texto en papel y electrónico a los contenidos digitales

2018

It is suggested that, given the economic and cultural scale that the book represents in our society, the layout of the paper and digital version will live together for a long time. Therefore, textbooks will suffer a very similar fate. The current change is focused on the transformation of textbooks in digital content with different formats and access routes. Through this process, we are studying the disputes that these changes cause, whereas they reflex the level of assimilation of the technological innovations on the part of citizens. By means of ethnographic strategies, we try to understand inductively how different educational agents are accepting such innovations. The centres that we ha…

020204 information systemsDigital contentPolitical science0502 economics and business05 social sciencesAssimilation (phonology)Ethnography0202 electrical engineering electronic engineering information engineeringMedia studies050211 marketing02 engineering and technologyNew mediaEducationRevista de Educación a Distancia (RED)
researchProduct

Usability and acceptability assessment of an empathic virtual agent to prevent major depression

2016

In Human-Computer Interaction, the adaptation of the content and the way of how this content is communicated to the users in interactive sessions is a critical issue to promote the acceptability and usability of any computational system. We present a user-adapted interactive platform to identify and provide an early intervention for symptoms of depression and suicide. In particular, we describe the work performed to assess users' system acceptability and usability. An empathic Virtual Agent is the main interface with the user, and it has been designed to generate the appropriate dialogues and emotions during the interactions according to the detected user's specific needs. This personalizat…

020205 medical informaticsPluralistic walkthroughComputer science02 engineering and technologyTheoretical Computer ScienceUsability lab03 medical and health sciences0302 clinical medicineArtificial IntelligenceHuman–computer interactionHeuristic evaluationacceptabilityemotional virtual agent0202 electrical engineering electronic engineering information engineeringAdaptation (computer science)Web usabilityInteractive systems engineeringbusiness.industryUser modelingUsabilityHuman-computer interaction030227 psychiatryuser-adapted sessionsusabilityComputational Theory and MathematicsControl and Systems EngineeringFISICA APLICADAbusiness
researchProduct

Cost-Effective eHealth System Based on a Multi-Sensor System-on-Chip Platform and Data Fusion in Cloud for Sport Activity Monitoring

2018

eHealth systems provide medical support to users and contribute to the development of mobile and quality health care. They also provide results on the prevention and follow-up of diseases by monitoring health-status indicators and methodical data gathering in patients. Telematic management of health services by means of the Internet of Things provides immediate support and it is cheaper than conventional physical presence methods. Currently, wireless communications and sensor networks allow a person or group to be monitored remotely. The aim of this paper is to develop and assess a system for monitoring physiological parameters to be applied in different scenarios, such as health or sports.…

020205 medical informaticsStandardizationComputer Networks and CommunicationsComputer sciencelcsh:TK7800-8360Cloud computing02 engineering and technologycomputer.software_genre01 natural sciencesNetwork simulationHealth servicesElectrònica mèdicasensor networksHealth care0202 electrical engineering electronic engineering information engineeringeHealthSalutTelematicsElectrical and Electronic Engineeringdata fusionData collectionMultimediabusiness.industry010401 analytical chemistrylcsh:ElectronicsSensor fusion0104 chemical sciencesHardware and ArchitectureControl and Systems EngineeringSignal ProcessingbiomonitoringeHealthbusinesssportcomputerWireless sensor networkCloudElectronics
researchProduct

Security Management in Health Care Information Systems — A Literature Review

2017

Health care information systems play an important role for communication across the organizational borders of health care services. The electronic health record represents the main entity in the management, exchange and storage of medical information. Health care organizations must adopt strategies for security and privacy risks associated with access to health care information systems, but on the other hand, the information needs to be accessible and readable for authorized health care professionals carrying out patient treatment. This paper presents a literature review on security management in health care information systems. The aim was to analyze descriptions and definitions of informa…

020205 medical informaticsbusiness.industryInternet privacyInformation needsAccess controlUsability02 engineering and technologyInformation securityPeer review03 medical and health sciences0302 clinical medicineHealth careHealth care information systems0202 electrical engineering electronic engineering information engineeringSecurity management030212 general & internal medicinebusiness2017 International Conference on Computational Science and Computational Intelligence (CSCI)
researchProduct

Developing a Serious Game for Nurse Education.

2018

Future nursing education is challenged to develop innovative and effective programs that align with current changes in health care and to educate nurses with a high level of clinical reasoning skills, evidence-based knowledge, and professional autonomy. Serious games (SGs) are computer-based simulations that combine knowledge and skills development with video game–playing aspects to enable active, experiential, situated, and problem-based learning. In a PhD project, a video-based SG was developed to teach nursing students nursing care for patients with chronic obstructive pulmonary disease in home health care and hospital settings. The current article summarizes the process of the SG devel…

020205 medical informaticsmedia_common.quotation_subjecteducationMEDLINEGerontological nursing02 engineering and technologyExperiential learningInformationSystems_GENERAL03 medical and health sciencesNursing carePulmonary Disease Chronic ObstructiveHealth care0202 electrical engineering electronic engineering information engineeringHumansComputer SimulationProfessional AutonomyNurse educationProgram DevelopmentEducation NursingGeneral Nursingmedia_commonMedical education030504 nursingbusiness.industryProblem-Based LearningHome Care ServicesHospitalizationProblem-based learningVideo GamesClinical Competence0305 other medical sciencebusinessPsychologyGerontologyAutonomyComputer-Assisted InstructionJournal of gerontological nursing
researchProduct