Search results for "Security"
showing 10 items of 1693 documents
Brauer’s Height Zero Conjecture for principal blocks
2021
Abstract We prove the other half of Brauer’s Height Zero Conjecture in the case of principal blocks.
POLYNOMIAL GROWTH OF THE*-CODIMENSIONS AND YOUNG DIAGRAMS
2001
Let A be an algebra with involution * over a field F of characteristic zero and Id(A, *) the ideal of the free algebra with involution of *-identities of A. By means of the representation theory of the hyperoctahedral group Z 2wrS n we give a characterization of Id(A, *) in case the sequence of its *-codimensions is polynomially bounded. We also exhibit an algebra G 2 with the following distinguished property: the sequence of *-codimensions of Id(G 2, *) is not polynomially bounded but the *-codimensions of any T-ideal U properly containing Id(G 2, *) are polynomially bounded.
Nuevas directrices sobre el uso de los test: investigación, control de calidad y seguridad
2015
Contiene versión en inglés
Implementación y uso clínico de la radioterapia adaptativa. Informe del grupo de trabajo de radioterapia adaptativa de la Sociedad Española de Física…
2021
La radioterapia adaptativa (Adaptive Radiation Therapy, ART) se puede definir como la modificación del plan de tratamiento administrado a un paciente durante el curso de la radioterapia para tener en cuenta los cambios en la anatomía.
 La aplicación de ART supone un cambio en el proceso radioterápico que implica el uso de numerosos recursos adicionales, no estando implementada de forma general. Así, aun tratándose de una idea introducida hace más de 20 años, todavía a fecha de hoy son objeto de estudio muchos de los aspectos que definen la ART: la decisión de proceder a la nueva planificación del tratamiento, el momento óptimo para adaptar el plan, el umbral dosimétrico o anatómico que…
Linking Disaster Risk Reduction and Healthcare in Locations with Limited Accessibility: Challenges and Opportunities of Participatory Research
2020
Disaster risk reduction and healthcare support each other, including the mitigation of further harm after illness or injury. These connections are particularly relevant in locations which have permanent or temporary limited accessibility. In these circumstances, people are required to be self-sufficient in providing emergency and long-term healthcare with limited resources. Planning and preparing to mitigate further harm after illness or injury from disasters (disaster risk reduction) must include people living and working in locations with limited accessibility, meaning that participatory research can be used. The challenges and opportunities of enacting participatory research in such cont…
Coalition building in the UN Security Council
2014
Political coalitions in the international system are still understudied in International Relations theory. This article claims that the formation of and variations in coalitions in the international system are affected by changes in their bargaining power and bargaining environment related to the global leadership cycle and by long-term organisational changes of the international political system. Identifying the Security Council as the institution in which states are more likely to keep their systemic preferences at the institutional level, the article studies the presence, formation and change of coalitions in the international system by testing variations in the behaviour of the Securit…
Complex Networked Systems: Convergence Analysis, Dynamic Behaviour, and Security.
Complex networked systems are a modern reference framework through which very dierent systems from far disciplines, such as biology, computer science, physics, social science, and engineering, can be described. They arise in the great majority of modern technological applications. Examples of real complex networked systems include embedded systems, biological networks, large-scale systems such as power generation grids, transportation networks, water distribution systems, and social network. In the recent years, scientists and engineers have developed a variety of techniques, approaches, and models to better understand and predict the behaviour of these systems, even though several research…
Hypervisor-based Protection of Code
2019
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…
From user-generated data to data-driven innovation: A research agenda to understand user privacy in digital markets
2021
Abstract In recent years, strategies focused on data-driven innovation (DDI) have led to the emergence and development of new products and business models in the digital market. However, these advances have given rise to the development of sophisticated strategies for data management, predicting user behavior, or analyzing their actions. Accordingly, the large-scale analysis of user-generated data (UGD) has led to the emergence of user privacy concerns about how companies manage user data. Although there are some studies on data security, privacy protection, and data-driven strategies, a systematic review on the subject that would focus on both UGD and DDI as main concepts is lacking. There…
Information Integration Platform for Patient-Centric Healthcare Services: Design, Prototype and Dependability Aspects
2014
Published version of an article in the journal: Future Internet. Also available from the publisher at: http://dx.doi.org/10.3390/fi6010126 Open Access Technology innovations have pushed today’s healthcare sector to an unprecedented new level. Various portable and wearable medical and fitness devices are being sold in the consumer market to provide the self-empowerment of a healthier lifestyle to society. Many vendors provide additional cloud-based services for devices they manufacture, enabling the users to visualize, store and share the gathered information through the Internet. However, most of these services are integrated with the devices in a closed “silo” manner, where the devices can…