Search results for "Visioning"

showing 10 items of 35 documents

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

2016

In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of suc…

Information privacy020205 medical informaticsPrivacy by DesignComputer Networks and Communicationsbusiness.industryPrivacy softwareComputer scienceInternet privacyAccess controlProvisioning02 engineering and technologyLibrary and Information SciencesComputer securitycomputer.software_genreInformation sensitivityInformation and Communications Technology0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerPersonally identifiable informationInformation SystemsInternational Journal of Information Management
researchProduct

Evaluation of a behavioural response of Mediterranean coastal fishes to novel recreational feeding situation

2011

Fish may learn to associate food with human presence through recreational hand-feeding, a popular tourist activity. The conditional learning-e. g. when an organism learns by continuous exposure to one stimulus-of different coastal fish species exposed to novel feeding situations was evaluated. The latencies of learning response to the initiation of supplementary feeding were rapid and species-specific. However differences in the learning response between different fishes decreased over time, demonstrating that associating with others might incur costs especially for small-sized species, likely due to increased competition for food. Nevertheless some other fish species did not acquire any sp…

Mediterranean climateBehaviorConditional learningEcologymedia_common.quotation_subjectFish speciesCoastal fishAquatic ScienceBiologyCompetition (biology)FisheryFish feedingFish <Actinopterygii>Food provisioningContinuous exposureRecreationEcology Evolution Behavior and SystematicsOrganismmedia_common
researchProduct

What's New for QoS in IEEE 802.11?

2013

Two amendments to IEEE 802.11 have recently been published: 802.11aa and 802.11ae. Both enhance Quality of Service (QoS) provisioning in Wi-Fi networks by providing support for multicast transmission, enhanced audio video streaming, coping with inter-network interference, and improved prioritization of management frames. The proposed solutions either extend mechanisms already existing in the standard or introduce new ones. Therefore, it is important for researchers to understand the new functionalities. To this end we provide the first description of these latest mechanisms: we present the motivation behind them, explain their design principles, provide examples of usage, and comment on com…

MulticastComputer Networks and Communicationsbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniQuality of serviceQuality of ServiceProvisioningMobile QoSIEEE 802.11Hardware and ArchitectureReliable multicastIEEE 802.11e-2005Video streamingbusinessSoftwareWireless networkInformation SystemsComputer network
researchProduct

Managing a boreal forest landscape for providing timber, storing and sequestering carbon

2015

Human well-being highly depends on ecosystem services and this dependence is expected to increase in the future with increasing population and economic growth. Studies that investigate trade-offs between ecosystem services are urgently needed for informing policy-makers. We examine the trade-offs between a provisioning (revenues from timber selling) and regulating (carbon storage and sequestration) ecosystem services among seven alternative forest management regimes in a large boreal forest production landscape. First, we estimate the potential of the landscape to produce harvest revenues and store/sequester carbon across a 50-year time period. Then, we identify conflicts between harvest re…

Natural resource economicsta1172Geography Planning and DevelopmentForest managementPopulationforest managementClimate changeManagement Monitoring Policy and LawCarbon sequestrationEcosystem servicescarbon storage and sequestrationEconomicsProduction (economics)multiobjective optimizationeducationFinlandNature and Landscape ConservationGlobal and Planetary Changeeducation.field_of_studyEcologybusiness.industryEnvironmental resource managementProvisioning15. Life on landta4112Investment (macroeconomics)Agricultural and Biological Sciences (miscellaneous)climate change13. Climate actionecosystem service trade-offsta1181businessEcosystem Services
researchProduct

A CAPWAP-Compliant Solution for Radio Resource Management in Large-Scale 802.11 WLAN

2007

Recently, the impressive success of the IEEE 802.11 WLAN technology has dramatically changed the role of the wireless connectivity provisioning. Born as a wireless extension of small office or home networks, todays the WLANs are getting more and more popular as a large, even metropolitan, area networks. The deployment of large-scale WLANs has some critical issues, because of the lack of coordinated management functionalities among the network nodes. In this paper we briefly describe the CAPWAP architectural solution, for centralizing some control and maintenance functionalities in large scale WLAN, by guaranteeing the interoperability between network nodes provided by different vendors. We …

Network administratorSettore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryWireless networkNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedInteroperabilityProvisioningMetropolitan areaCAPWAPFrequency allocationWireless lanResource allocationWirelessRadio resource managementCentralized signal controlInteroperability Large scale systems Radio communication Resource allocationbusinessComputer networkIEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference
researchProduct

A CAPWAP Architecture for Automatic Frequency Planning in WLAN

2007

Recently, the impressive success of the IEEE 802.11 WLAN technology has dramatically changed the role of the wireless connectivity provisioning. Born as a wireless extension of small office or home networks, todays the WLANs are getting more and more popular as a large, even metropolitan, area networks. The deployment of large-scale WLANs has some critical issues, because of the lack of coordinated management functionalities among the network nodes. In this paper we briefly describe the CAPWAP architectural solution, for centralizing some control and maintenance functionalities in large scale WLAN, by guaranteeing the interoperability between network nodes provided by different vendors. We …

Network administratorWi-Fi arrayComputer sciencebusiness.industryWireless networkSettore ING-INF/03 - TelecomunicazioniNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedPhysical layerLocal area networkWireless WANProvisioningCAPWAPMetropolitan areaWireless lanWirelessAutomatic frequency Control operations Critical issues Home networks IEEE 802.11 WLAN International symposiumbusinessHeterogeneous networkMunicipal wireless networkComputer network
researchProduct

Patterns of nestling provisioning by a single‐prey loader bird, Great TitParus major

2009

Capsule Nestling provisioning rates depend on nestling age and number, and on time of season, but not on time of day. Aims To determine patterns of nestling provisioning, the effort made by the parents, and the factors which affect them. Methods Mechanical counters to determine food provisioning patterns in 229 Great Tit Parus major nests over 4 years. Results Feeding frequency per chick showed a linear increase with nestling age and total feeding frequency stabilized towards the end of the nestling period. The number of visits per nest increased linearly, while those per nestling decreased linearly with brood‐size. Feeding rates per nest declined throughout the breeding season parallel to …

ParusTime of dayNestEcologySeasonal breederZoologyProvisioningBiologybiology.organism_classificationEcology Evolution Behavior and SystematicsNature and Landscape ConservationPredationBird Study
researchProduct

Per-user availability for ultra-reliable communication in 5G: Concept and analysis

2018

Emerging 5G mobile networks envisage ultra-reliable communication (URC) as one of the major requirements for anytime anywhere communication. Although URC has recently attracted a lot of attention in the research community, existing work seems to rely on approaching reliability merely from a time domain perspective. However, both time and space domain parameters affect reliability and need to be investigated. This paper introduces a dependability theory based definition for per-user availability targeted at 5G networks. The advocated definition promotes both space and time domain components for URC provisioning. Furthermore, we perform reliability and availability analysis and simulations co…

Reliability theoryComputer scienceReliability (computer networking)Distributed computing05 social sciences050801 communication & media studies020206 networking & telecommunicationsProvisioning02 engineering and technologyDomain (software engineering)Theory based0508 media and communications0202 electrical engineering electronic engineering information engineeringDependability5G2018 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

2019

We propose an efficient anonymous, attribute-based credential scheme capable of provisioning multi-level credential delegations. It is integrated with a mechanism to revoke the anonymity of credentials for resolving access disputes and making users accountable for their actions. The proposed scheme has a lower end-user computational complexity in comparison to existing credential schemes with delegatability and has a comparable level of performance with the credential standards of U-Prove and Idemix. Furthermore, we demonstrate how the proposed scheme can be applied to a collaborative e-health environment to provide its users with the necessary anonymous access with delegation capabilities.

Scheme (programming language)Computational complexity theoryDelegationComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subject020206 networking & telecommunicationsProvisioning02 engineering and technologyComputer securitycomputer.software_genreCredentialComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYcomputermedia_commoncomputer.programming_languageAnonymityACM Transactions on Internet Technology
researchProduct

Attribute based access control scheme with controlled access delegation for collaborative E-health environments

2017

Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …

Scheme (programming language)Computer access controlDelegationRevocationComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subject020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineeringPhysical accessRole-based access controlSafety Risk Reliability and QualitybusinesscomputerSoftwaremedia_commoncomputer.programming_languageJournal of Information Security and Applications
researchProduct