Search results for "Security"

showing 10 items of 1693 documents

Scheduling independent stochastic tasks under deadline and budget constraints

2018

This article discusses scheduling strategies for the problem of maximizing the expected number of tasks that can be executed on a cloud platform within a given budget and under a deadline constraint. The execution times of tasks follow independent and identically distributed probability laws. The main questions are how many processors to enroll and whether and when to interrupt tasks that have been executing for some time. We provide complexity results and an asymptotically optimal strategy for the problem instance with discrete probability distributions and without deadline. We extend the latter strategy for the general case with continuous distributions and a deadline and we design an ef…

[INFO.INFO-CC]Computer Science [cs]/Computational Complexity [cs.CC]Mathematical optimizationOperations researchComputer science[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]Cloud computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyExpected valueTheoretical Computer ScienceScheduling (computing)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]deadline0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]schedulingComputer Science::Operating SystemsComputingMilieux_MISCELLANEOUSBudget constraint020203 distributed computingcloud platformindependent tasksbusiness.industry[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulationstochastic costAsymptotically optimal algorithmContinuous distributions[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Hardware and ArchitectureProbability distribution[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processingInterrupt[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessSoftwarebudget
researchProduct

THE IMAGE PROTECTOR A Flexible Security Rule Specification Toolkit

2011

International audience; The tremendous sharing of multimedia objects on the web shed the light on several privacy concerns related in essence to the safe publishing of end users' personal data. Providing techniques to protect multimedia objects faces several difficulties due to multimedia objects' heterogeneous and complex structure on one hand, and on the other hand, the wide range of information that could be used to describe their content. In this paper, we present a flexible security rule specification toolkit for multimedia objects. Our toolkit is based on a security model and a core ontology in which we populate the model's related information and multimedia objects data. To specify s…

[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Multimedia Security[SCCO.COMP] Cognitive science/Computer science[ SCCO.COMP ] Cognitive science/Computer science[SCCO.COMP]Cognitive science/Computer scienceContent ProtectionPrivacy Preserving Security Rules[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Security RulesPrivacy Preserving[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Automated detection of contextuality proofs with intermediate numbers of observables

2021

<div style=""&gt<font face="arial, helvetica"&gt<span style="font-size: 13px;"&gtQuantum contextuality takes an important place amongst the concepts of quantum computing that bring an advantage over its classical counterpart. For a large class of contextuality </span&gt</font&gt<span style="font-size: 13px; font-family: arial, helvetica;"&gtproofs, aka. observable-based proofs of the Kochen-Specker Theorem, we first formulate the</span&gt</div&gt<div style=""&gt<font face="arial, helvetica"&gt<span style="font-size: 13px;"&gtcontextuality property as the absence of solutions to a linear system. Then we explain why </span&gt</font&gt<span style="font-size: 13px; font-family: arial, helvetica…

[INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-DC] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC][INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and Simulation[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

A Route toward Protein Sequencing using Solid-State Nanopores Assisted by Machine Learning

2022

Solid-State Nanopores made of 2-D materials such as MoS2 have emerged as one of the most versatile sensors for single-biomolecule detection, which is essential for early disease diagnosis (biomarker detection). One of the most promising applications of SSN is DNA and protein sequencing, at a low cost and faster than the current standard methods. The detection principle relies on measuring the relatively small variations of ionic current as charged biomolecules immersed in an electrolyte traverse the nanopore, in response to an external voltage applied across the membrane. The passage of a biomolecule through the pore yields information about its structure and chemical properties, as demonst…

[INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-DC] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC][INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and Simulation[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Computer-assisted enumeration and classification of multi-qubit doilies

2022

For N ≥ 2, an N-qubit doily is a doily living in the N-qubit symplectic polar space. These doilies are related to operator-based proofs of quantum contextuality. Following and extending the strategy of [SdBHG21] that focused exclusively on three-qubit doilies, we first bring forth several formulas giving the number of both linear and quadratic doilies for any N &gt; 2. Then we present an effective algorithm for the generation of all N-qubit doilies. Using this algorithm for N = 4 and N = 5, we provide a classification of N-qubit doilies in terms of types of observables they feature and number of negative lines they are endowed with.

[INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-DC] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC][INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and Simulation[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

SECURE SOLUTION FOR MODERN SEMANTIC SCADA

2013

International audience; NOUS TRAVAILLONS SUR LA SECURITE DES SYSTEMES SCADA (SUPERVI-SORY CONTROL AND DATA AQUISITION) MODERNE EXPLOITANT DES EQUI-PEMENTS MODRNE AVEC DE L’INTELLIGENCE EMBARQUE COMME LES RTU (REMOTE TERMINAL UNIT), LES CAPTEURSINTELLIGENTS, LES ACTIONNEURS INTELLIGENTS, LES EQUIPEMENTS DE L’INSTRUMENTATION GAZIERE MODERNE COMME LES COMPTEURS NUME-RIQUE, LES CORECTEURS ELECTONIQUE, LES POMPES DOSEUSES AVEC CARTE ELECTRONIQUE, LES CHROMATOGRAPHES...ECT. AVEC LES AVANCES TECHNLOGIQUES DE L’INFORMATIQUE EMBARQUE COMME LES SERVICES WEB ET LES APPLICATION CONCU SELON LES ARCHITECTURES MODERNE (SOA- SERVICE ORIENTED ARCHITECTURE), LES ONTOLOGIES ET LE WEB SEMANTIQUE, LES BASES DE …

[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI][ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI](IT-SCADA) PLATFORMSCADASECURITY PROTOCOL
researchProduct

Authentication and authorization security solution for the internet of thing

2021

The Internet of Things (IoT) represents the interconnection between the Internet and physical objects, places and environments. However, this extensive connectivity of IoT can be hampered by malicious interventions from cyber attackers. Thus, ensuring security for users and IoT devices remains a challenge, especially authentication and authorization, which are essential building blocks of the security process. This is due to the unconventional IoT characteristics, including scalability, heterogeneity, interoperability, and dynamic changes, which make the existing security measures inadequate. Indeed, these characteristics bring up several security requirements to consider when defining a se…

[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]AuthenticationHôtel intelligent[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]SecurityAuthorizationSécuritéSmart HotelAuthentification
researchProduct

Dynamics of copper and zinc sedimentation in a lagooning system receiving landfill leachate.

2013

9 pages; International audience; This study characterises the sediment dredged from a lagooning system composed of a settling pond and three lagoons that receive leachates from a municipal solid waste (MSW) landfill in France. Organic carbon, carbonate, iron oxyhydroxides, copper (Cu) and zinc (Zn) concentrations were measured in the sediment collected from upstream to downstream in the lagooning system. In order to complete our investigation of sedimentation mechanisms, leachates were sampled in both dry (spring) and wet (winter) seasonal conditions. Precipitation of calcite and amorphous Fe-oxyhydroxides and sedimentation of organic matter occurred in the settling pond. Since different di…

[SDE.MCG]Environmental Sciences/Global Changes0211 other engineering and technologieschemistry.chemical_element02 engineering and technologyZinc010501 environmental sciences01 natural scienceschemistry.chemical_compoundSettlingTrace metalsEdge effect[SDU.STU.GC]Sciences of the Universe [physics]/Earth Sciences/GeochemistryChemical PrecipitationOrganic matterLeachateOrganic ChemicalsNitrogen CompoundsWaste Management and Disposal0105 earth and related environmental scienceschemistry.chemical_classificationTotal organic carbon021110 strategic defence & security studiesEnvironmental engineeringLeachateSedimentSedimentation[ SDU.STU.GC ] Sciences of the Universe [physics]/Earth Sciences/Geochemistry[SDE.ES]Environmental Sciences/Environmental and Society6. Clean waterLagooning system[ SDE.MCG ] Environmental Sciences/Global ChangesZincchemistryEnvironmental scienceCarbonateSedimentLandfill[ SDE.ES ] Environmental Sciences/Environmental and SocietyCopperWater Pollutants ChemicalWaste management (New York, N.Y.)
researchProduct

Towards human exploration of space: the THESEUS review series on cardiovascular, respiratory, and renal research priorities

2016

International audience; The THESEUS project (Towards Human Exploration of Space: aEUropean Strategy) was initiated within the seventh FrameworkProgramme by the European Commission. This project aimed toprovide a cross-cutting, life science-based roadmap for Europe’sstrategy towards human exploration of space, especially for deepspace missions and its relevance to applications on Earth. Toaddress these challenges, relevance of space research on thecardiovascular system, the lungs and kidneys, was discussed in anexpert group and its principal conclusions will be presented in thisarticle.

[SDE] Environmental SciencesEngineeringPhysics and Astronomy (miscellaneous)MathematicsofComputing_GENERALMedicine (miscellaneous)astronauts[SDV.MHEP.PSR]Life Sciences [q-bio]/Human health and pathology/Pulmonology and respiratory tractSpace exploration[ SDE ] Environmental SciencesDeep space missionsInformationSystems_GENERAL0302 clinical medicineblood-pressure[ SHS.INFO ] Humanities and Social Sciences/Library and information sciencesEuropean commissionSpace researchComputingMilieux_MISCELLANEOUSexercise[ SDV.MHEP.PHY ] Life Sciences [q-bio]/Human health and pathology/Tissues and Organs [q-bio.TO][ SDV.MHEP.CSC ] Life Sciences [q-bio]/Human health and pathology/Cardiology and cardiovascular systemAgricultural and Biological Sciences (miscellaneous)Expert groupcentral venous-pressureEditorial[SDE]Environmental SciencesEngineering ethics[ SDV.MHEP.HEG ] Life Sciences [q-bio]/Human health and pathology/Hépatology and GastroenterologyMaterials Science (miscellaneous)[SHS.INFO]Humanities and Social Sciences/Library and information sciencesBiochemistry Genetics and Molecular Biology (miscellaneous)GeneralLiterature_MISCELLANEOUS03 medical and health sciences[SDV.MHEP.CSC]Life Sciences [q-bio]/Human health and pathology/Cardiology and cardiovascular system[SDV.MHEP.PHY]Life Sciences [q-bio]/Human health and pathology/Tissues and Organs [q-bio.TO]long-duration spaceflightRelevance (information retrieval)heart-rateSimulationbusiness.industryPrincipal (computer security)[SDV.MHEP.HEG]Life Sciences [q-bio]/Human health and pathology/Hépatology and Gastroenterology030229 sport sciencesmicrogravity13. Climate actionSpace and Planetary Sciencestationfoot forcesorthostatic intolerancebusiness030217 neurology & neurosurgery[ SDV.MHEP.PSR ] Life Sciences [q-bio]/Human health and pathology/Pulmonology and respiratory tract
researchProduct

Changing European storm loss potentials under modified climate conditions according to ensemble simulations of the ECHAM5/MPI-OM1 GCM

2007

Abstract. A simple storm loss model is applied to an ensemble of ECHAM5/MPI-OM1 GCM simulations in order to estimate changes of insured loss potentials over Europe in the 21st century. Losses are computed based on the daily maximum wind speed for each grid point. The calibration of the loss model is performed using wind data from the ERA40-Reanalysis and German loss data. The obtained annual losses for the present climate conditions (20C, three realisations) reproduce the statistical features of the historical insurance loss data for Germany. The climate change experiments correspond to the SRES-Scenarios A1B and A2, and for each of them three realisations are considered. On average, insure…

[SDU.OCEAN]Sciences of the Universe [physics]/Ocean Atmosphere021110 strategic defence & security studies010504 meteorology & atmospheric sciences0211 other engineering and technologies[SDU.STU]Sciences of the Universe [physics]/Earth SciencesClimate changeStormGCM transcription factors02 engineering and technology01 natural sciencesWind speed13. Climate actionClimatologyGeneral Earth and Planetary SciencesEnvironmental science[SDU.ENVI]Sciences of the Universe [physics]/Continental interfaces environmentAnnual lossNorth seaMaximaIntensity (heat transfer)0105 earth and related environmental sciencesNatural Hazards and Earth System Sciences
researchProduct