Search results for "access"
showing 10 items of 1232 documents
Optimal Resource Allocation in Multi-Hop Networks: Contention vs. Scheduling
2014
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is actually the most used method in ad-hoc networks for transmitting on a contending medium, even if it shows poor performance in presence of hidden nodes. To increase performance, we propose an algorithm that combines CSMA and TDMA (Time Division Multiple Access) approaches. The adopted solution consists of grouping contending nodes in non-interfering subsets and granting a different numbers of time slots to different groups, while using the CSMA to manage medium access among nodes belonging to the same subset. An optimization procedure to assign the time slots to each subset of nodes and to find an equilibrium between contention …
Accessibilità e fruibilità dei centri storici: un’opportunità per il Restauro
2020
L’eguaglianza di tutti, nel rispetto delle diversità, è un diritto costituzionale e contempla anche il diritto di tutti alla trasmissione di quei valori dell’architettura storica, riconosciuti e tutelati dal restauro. Valori che sono patrimonio collettivo, da conservare, trasmettere e fruire sia per le generazioni future che per quelle attuali. È difficile, quindi, pensare ad “una legge, o ad una teoria che voglia tutelare il monumento e non le persone, ad una cultura che prescinda dall’uso nel senso più ampio del termine”. Difatti, a distanza di trent’anni dall’emanazione in Italia della legge 41 del 1986, per l’introduzione dei Piani di Eliminazione delle Barriere Architettoniche (PEBA) e…
New centrality in UNESCO buffer-zones: two Mediterranean case studies. Per una nuova centralità delle buffer-zones UNESCO: due casi studio nel Medite…
2022
The paper presents an interdisciplinary reflection on the potential for sustainable development of communities and their cultural landscapes expressed by UNESCO Buffer Zones in the Mediterranean, with the intention of transforming their widespread perception as mere tools of protection and urban planning into concrete integrated proposals for protection and enhancement, and also taking into account the role of museums in promoting the understanding of cultural heritage and the maturation of an awareness of the value of such actions. With reference to the 2004 guidelines UNESCO and starting from the evaluation of some management plans, such as that of the Arab-Norman itinerary in Palermo and…
A "best practice" for inclusive art cities: the case study of the I-Access project
2022
The essay aims to illustrate the results of the I-Access Interreg Italia Malta 2016-20 project, conducted by a partnership led by the Department of Architecture, University of Palermo, with the scientific coordination of Renata Prescia. The project involved the Vucciria district in Palermo and the Bijcceria district in Valletta. Within the range of products that have been created (including database, web platform, mobile apps, protocol), in this essay we want to illustrate the actions implemented to facilitate both physical and cultural accessibility, from the integrated points of view between restoration and exhibition design. They are actions for overcoming of architectural barriers, cult…
Access to European Institutions
2022
In this publication, I talk about the right of access to European institutions
Il principio dell’insindacabilità della valutazione del merito creditizio alla prova dei miniprestiti emergenziali integralmente coperti da garanzia …
2022
Article 13, lett. m), of law decree n. 23/2020 introduced some measures in order to expand firm’s access to credit and counter the negative effects of COVID-19 pandemic. After providing an historical view of the italian legislation in the field of pubblic credit, the two authors argue that the aforementioned article, which in their view introduce a right to credit, is not an isolated case, given that the legislator had already introduced limits to the private autonomy of banks in presence of public subsidies. Moreover, according to the authors the duty to make credit and the limits and restrictive conditions for access to credit provided for by law exclude civil or criminal liability for un…
Diamo i numeri
2021
Resoconto sugli accessi alla rivista Archivio Antropologico Mediterraneo dal 2018 a oggi in Open Access
The Institution of Security Agent: A Comparative Study of Polish and French Laws
2022
In many continental legal systems it was often problematic to grant a security right to an entity separate from the holder(s) of the secured receivables. Such arrangement was especially desired by the parties in complex lending structures with many creditors. To solve this problem various legal solutions have been created in different countries. In Poland and in France the special institution of a security agent has been introduced. Aim of this article is to compare those two regulations. The conclusion is that the French provisions better deals with the challenges posed by the entity separation problem. Security agent, collective security arrangements, entity separation, unity principle, s…
Opportunistic Synchronization for Improving IEEE 802.15.4 MAC Performance in Chain Topologies
2010
The most effective solution for energy saving in low-rate wireless sensor networks is maintaining each node in a doze state as long as possible. In order to guarantee network connectivity, the intervals at which the network sensors are turned on and off have to be coordinated. Therefore, synchronization is a very critical function for sensor networks. In this paper, we analyze the IEEE 802.15.4 MAC performance in sensor networks deployed in a chain topology. For this topology, critical inefficiencies can arise in case of multi-hop packet deliveries. We evaluate the impact of different synchronization schemes on the network performance, both in terms of network throughput and in terms of ene…
L’intervento delle sezioni Unite nel dibattito sul reato di accesso abusivo ad un sistema informatico di cui all’art. 615 ter c.p.
2012
Con sentenza depositata il 7 febbraio 2012 le Sezioni Unite si sono pronunciate sul dibattito che riguarda la configurabilità del reato previsto ex art. 615 ter c.p. nel caso in un cui un soggetto legittimamente autorizzato ad accedere al sistema informatico o telematico vi operi per il conseguimento di finalità illecite. Da lungo tempo su questo tema si sono sviluppati due opposti orientamenti giurisprudenziali. Il primo giunge ad ammettere l’illecito sulla base dell’analogia con la fattispecie di violazione di domicilio e la valorizzazione delle finalità sottese alla condotta del soggetto agente. Il secondo, invece, focalizza l’attenzione sul dato letterale e sul momento consumativo del d…