Search results for "SYSTEMS"
showing 10 items of 11952 documents
Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct
2020
Blockchain is a multiparty protocol to reach agreement on the order of events, and to record them consistently and immutably without centralized trust. In some cases, however, the blockchain can benefit from some controlled mutability. Examples include removing private information or unlawful content, and correcting protocol vulnerabilities which would otherwise require a hard fork. Two approaches to control the mutability are: moderation, where one or more designated administrators can use their private keys to approve a redaction, and voting, where miners can vote to endorse a suggested redaction. In this paper, we first present several attacks against existing redactable blockchain solut…
Combining congested-flow isolation and injection throttling in HPC interconnection networks
2011
Existing congestion control mechanisms in interconnects can be divided into two general approaches. One is to throttle traffic injection at the sources that contribute to congestion, and the other is to isolate the congested traffic in specially designated resources. These two approaches have different, but non-overlapping weaknesses. In this paper we present in detail a method that combines injection throttling and congested-flow isolation. Through simulation studies we first demonstrate the respective flaws of the injection throttling and of flow isolation. Thereafter we show that our combined method extracts the best of both approaches in the sense that it gives fast reaction to congesti…
Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks
2016
Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…
Peer-to-Peer-Technologien — Einflüsse digitaler dezentraler Ressourcennutzung auf elektronische Märkte
2003
Peer-to-Peer-Systeme sind in jungerer Zeit hauptsachlich durch die verbreiteten und oft kritisierten Musiktauschborsen wie Napster1 oder Gnutella2 bekannt geworden. Oftmals wird „Peer-to-Peer“sogar mit dem Austausch von Musik- und Videodateien gleichgesetzt. Diese Reduzierung des Begriffs auf das blose Austauschen von Dateien (Filesharing) wird jedoch nicht dem Peer-to-Peer-Begriff und erst recht nicht dem Potenzial des Peer-to-Peer Computing gerecht. Filesharing darf insofern nur als eine spezielle Applikation gesehen werden, die sich mit Hilfe von Peer-to-Peer-Technologien bewaltigen lasst.
Four steps to identify mechanisms of ICT4D: A critical realism-based methodology
2018
Controversias en la transición del libro de texto en papel y electrónico a los contenidos digitales
2018
It is suggested that, given the economic and cultural scale that the book represents in our society, the layout of the paper and digital version will live together for a long time. Therefore, textbooks will suffer a very similar fate. The current change is focused on the transformation of textbooks in digital content with different formats and access routes. Through this process, we are studying the disputes that these changes cause, whereas they reflex the level of assimilation of the technological innovations on the part of citizens. By means of ethnographic strategies, we try to understand inductively how different educational agents are accepting such innovations. The centres that we ha…
Usability and acceptability assessment of an empathic virtual agent to prevent major depression
2016
In Human-Computer Interaction, the adaptation of the content and the way of how this content is communicated to the users in interactive sessions is a critical issue to promote the acceptability and usability of any computational system. We present a user-adapted interactive platform to identify and provide an early intervention for symptoms of depression and suicide. In particular, we describe the work performed to assess users' system acceptability and usability. An empathic Virtual Agent is the main interface with the user, and it has been designed to generate the appropriate dialogues and emotions during the interactions according to the detected user's specific needs. This personalizat…
Cost-Effective eHealth System Based on a Multi-Sensor System-on-Chip Platform and Data Fusion in Cloud for Sport Activity Monitoring
2018
eHealth systems provide medical support to users and contribute to the development of mobile and quality health care. They also provide results on the prevention and follow-up of diseases by monitoring health-status indicators and methodical data gathering in patients. Telematic management of health services by means of the Internet of Things provides immediate support and it is cheaper than conventional physical presence methods. Currently, wireless communications and sensor networks allow a person or group to be monitored remotely. The aim of this paper is to develop and assess a system for monitoring physiological parameters to be applied in different scenarios, such as health or sports.…
Security Management in Health Care Information Systems — A Literature Review
2017
Health care information systems play an important role for communication across the organizational borders of health care services. The electronic health record represents the main entity in the management, exchange and storage of medical information. Health care organizations must adopt strategies for security and privacy risks associated with access to health care information systems, but on the other hand, the information needs to be accessible and readable for authorized health care professionals carrying out patient treatment. This paper presents a literature review on security management in health care information systems. The aim was to analyze descriptions and definitions of informa…
Developing a Serious Game for Nurse Education.
2018
Future nursing education is challenged to develop innovative and effective programs that align with current changes in health care and to educate nurses with a high level of clinical reasoning skills, evidence-based knowledge, and professional autonomy. Serious games (SGs) are computer-based simulations that combine knowledge and skills development with video game–playing aspects to enable active, experiential, situated, and problem-based learning. In a PhD project, a video-based SG was developed to teach nursing students nursing care for patients with chronic obstructive pulmonary disease in home health care and hospital settings. The current article summarizes the process of the SG devel…