Search results for "Security"

showing 10 items of 1693 documents

Brauer’s Height Zero Conjecture for principal blocks

2021

Abstract We prove the other half of Brauer’s Height Zero Conjecture in the case of principal blocks.

CombinatoricsConjectureApplied MathematicsGeneral Mathematics010102 general mathematics0103 physical sciencesPrincipal (computer security)Zero (complex analysis)010307 mathematical physics0101 mathematics01 natural sciencesMathematicsJournal für die reine und angewandte Mathematik (Crelles Journal)
researchProduct

POLYNOMIAL GROWTH OF THE*-CODIMENSIONS AND YOUNG DIAGRAMS

2001

Let A be an algebra with involution * over a field F of characteristic zero and Id(A, *) the ideal of the free algebra with involution of *-identities of A. By means of the representation theory of the hyperoctahedral group Z 2wrS n we give a characterization of Id(A, *) in case the sequence of its *-codimensions is polynomially bounded. We also exhibit an algebra G 2 with the following distinguished property: the sequence of *-codimensions of Id(G 2, *) is not polynomially bounded but the *-codimensions of any T-ideal U properly containing Id(G 2, *) are polynomially bounded.

CombinatoricsDiscrete mathematicsInvolution (mathematics)Filtered algebraAlgebra and Number TheoryMathematics::Commutative AlgebraFree algebraBounded functionHyperoctahedral groupRepresentation theoryComputer Science::Cryptography and SecurityMathematicsCommunications in Algebra
researchProduct

Nuevas directrices sobre el uso de los test: investigación, control de calidad y seguridad

2015

Contiene versión en inglés

Comisión Internacional de TestsResearchQuality controlGuidelinesPsicologíaUso de testDirectricesControl de calidadInvestigaciónSecurityInternational Test CommissionTest useSeguridad
researchProduct

Implementación y uso clínico de la radioterapia adaptativa. Informe del grupo de trabajo de radioterapia adaptativa de la Sociedad Española de Física…

2021

La radioterapia adaptativa (Adaptive Radiation Therapy, ART) se puede definir como la modificación del plan de tratamiento administrado a un paciente durante el curso de la radioterapia para tener en cuenta los cambios en la anatomía.
 La aplicación de ART supone un cambio en el proceso radioterápico que implica el uso de numerosos recursos adicionales, no estando implementada de forma general. Así, aun tratándose de una idea introducida hace más de 20 años, todavía a fecha de hoy son objeto de estudio muchos de los aspectos que definen la ART: la decisión de proceder a la nueva planificación del tratamiento, el momento óptimo para adaptar el plan, el umbral dosimétrico o anatómico que…

Commercial softwareComputer sciencebusiness.industryProcess (engineering)Principal (computer security)Ocean EngineeringIdentification (information)SoftwareKey (cryptography)Safety Risk Reliability and QualitySoftware engineeringbusinessRadiation treatment planningAdaptation (computer science)Revista de Física Médica
researchProduct

Linking Disaster Risk Reduction and Healthcare in Locations with Limited Accessibility: Challenges and Opportunities of Participatory Research

2020

Disaster risk reduction and healthcare support each other, including the mitigation of further harm after illness or injury. These connections are particularly relevant in locations which have permanent or temporary limited accessibility. In these circumstances, people are required to be self-sufficient in providing emergency and long-term healthcare with limited resources. Planning and preparing to mitigate further harm after illness or injury from disasters (disaster risk reduction) must include people living and working in locations with limited accessibility, meaning that participatory research can be used. The challenges and opportunities of enacting participatory research in such cont…

Community-Based Participatory ResearchDisaster risk reductionHealth Toxicology and MutagenesisQualitative evidence0211 other engineering and technologieslcsh:MedicineParticipatory action researchDisaster Planning02 engineering and technologydisaster risk reductionArticleDisasters03 medical and health sciences0302 clinical medicineHealth careHumans030212 general & internal medicineResearch question021110 strategic defence & security studiesRisk Managementbusiness.industrylcsh:RPrincipal (computer security)Public Health Environmental and Occupational HealthhealthcarePublic relationslimited accessibilityHarmVDP::Medisinske Fag: 700::Helsefag: 800participatory researchbusinessDelivery of Health CareMeaning (linguistics)International Journal of Environmental Research and Public Health
researchProduct

Coalition building in the UN Security Council

2014

Political coalitions in the international system are still understudied in International Relations theory. This article claims that the formation of and variations in coalitions in the international system are affected by changes in their bargaining power and bargaining environment related to the global leadership cycle and by long-term organisational changes of the international political system. Identifying the Security Council as the institution in which states are more likely to keep their systemic preferences at the institutional level, the article studies the presence, formation and change of coalitions in the international system by testing variations in the behaviour of the Securit…

CompetitionParticipationCompetition (economics)PoliticsLawPolitical economyPolitical Science and International RelationsSecurityInternational securityCoalition buildingCoalitionSecurity councilSociologySecurity CouncilInternational relations theoryGlobal changeSettore SPS/04 - Scienza Politica
researchProduct

Complex Networked Systems: Convergence Analysis, Dynamic Behaviour, and Security.

Complex networked systems are a modern reference framework through which very dierent systems from far disciplines, such as biology, computer science, physics, social science, and engineering, can be described. They arise in the great majority of modern technological applications. Examples of real complex networked systems include embedded systems, biological networks, large-scale systems such as power generation grids, transportation networks, water distribution systems, and social network. In the recent years, scientists and engineers have developed a variety of techniques, approaches, and models to better understand and predict the behaviour of these systems, even though several research…

Complex Network Data clustering Hegselmann-Krause model Consensus Security Attacks Line Network k-means Opinion Dynamics.Settore ING-INF/04 - Automatica
researchProduct

Hypervisor-based Protection of Code

2019

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…

Computer Networks and CommunicationsComputer science0211 other engineering and technologiesCryptography02 engineering and technologysecurityComputer securitycomputer.software_genreEncryptionkryptografiaObfuscationCode (cryptography)tietoturvavirtual machine monitorsSafety Risk Reliability and QualitySystem bustrusted platform moduleta113021110 strategic defence & security studiescode protectioncryptographybusiness.industryHypervisorVirtualizationObfuscation (software)businesscomputerIEEE Transactions on Information Forensics and Security
researchProduct

From user-generated data to data-driven innovation: A research agenda to understand user privacy in digital markets

2021

Abstract In recent years, strategies focused on data-driven innovation (DDI) have led to the emergence and development of new products and business models in the digital market. However, these advances have given rise to the development of sophisticated strategies for data management, predicting user behavior, or analyzing their actions. Accordingly, the large-scale analysis of user-generated data (UGD) has led to the emergence of user privacy concerns about how companies manage user data. Although there are some studies on data security, privacy protection, and data-driven strategies, a systematic review on the subject that would focus on both UGD and DDI as main concepts is lacking. There…

Computer Networks and CommunicationsComputer scienceData managementData security02 engineering and technologyLibrary and Information SciencesBusiness modelUser-generated dataLatent Dirichlet allocationData-drivensymbols.namesake020204 information systemsPrivacy concerns0502 economics and business0202 electrical engineering electronic engineering information engineeringUsers' privacyFocus (computing)Data-driven innovationbusiness.industry05 social sciencesObject (computer science)Data scienceSystematic reviewORGANIZACION DE EMPRESASsymbols050211 marketingbusinessInformation SystemsInternational Journal of Information Management
researchProduct

Information Integration Platform for Patient-Centric Healthcare Services: Design, Prototype and Dependability Aspects

2014

Published version of an article in the journal: Future Internet. Also available from the publisher at: http://dx.doi.org/10.3390/fi6010126 Open Access Technology innovations have pushed today’s healthcare sector to an unprecedented new level. Various portable and wearable medical and fitness devices are being sold in the consumer market to provide the self-empowerment of a healthier lifestyle to society. Many vendors provide additional cloud-based services for devices they manufacture, enabling the users to visualize, store and share the gathered information through the Internet. However, most of these services are integrated with the devices in a closed “silo” manner, where the devices can…

Computer Networks and CommunicationsComputer scienceInternet of Thingsavailabilityintegration platformWearable computerCloud computingsecuritycomputer.software_genreWorld Wide WebmiddlewareDependabilityscalabilitylcsh:T58.5-58.64lcsh:Information technologybusiness.industryRESTIntegration platformInternet of Things; integration platform; middleware; REST; publish/subscribe; availability; scalability; security; healthcarehealthcareVDP::Technology: 500::Information and communication technology: 550Middleware (distributed applications)Scalabilitypublish/subscribeThe InternetbusinesscomputerInformation integrationFuture Internet
researchProduct