Search results for "sharing"
showing 10 items of 388 documents
VLBI-resolution radio-map algorithms: Performance analysis of different levels of data-sharing on multi-socket, multi-core architectures
2012
a b s t r a c t A broad area in astronomy focuses on simulating extragalactic objects based on Very Long Baseline Interferometry (VLBI) radio-maps. Several algorithms in this scope simulate what would be the observed radio-maps if emitted from a predefined extragalactic object. This work analyzes the performance and scaling of this kind of algorithms on multi-socket, multi-core architectures. In particular, we evaluate a sharing approach, a privatizing approach and a hybrid approach on systems with complex memory hierarchy that includes shared Last Level Cache (LLC). In addition, we investigate which manual processes can be systematized and then automated in future works. The experiments sh…
A GIS-Based Methodology for Evaluating the Increase in Multimodal Transport between Bicycle and Rail Transport Systems. A Case Study in Palermo
2021
Background: In a world where every municipality is pursuing the goals of more sustainable mobility, bicycles play a fundamental role in getting rid of private cars and travelling by an eco-friendly mode of transport. Additionally, private and shared bikes can be used as a feeder transit system, solving the problem of the first- and last-mile trips. Thanks to GIS (Geographic Information System) software, it is possible to evaluate the effectiveness of such a sustainable means of transport in future users’ modal choice. Methods: Running an accessibility analysis of cycling and rail transport services, the potential mobility demand attracted by these services and the possible multimodality bet…
Qualification Conditions for Calculus Rules of Coderivatives of Multivalued Mappings
1998
AbstractThis paper establishes by a general approach a full calculus for the limiting Fréchet and the approximate coderivatives of multivalued mappings. This approach allows us to produce several new verifiable qualification conditions for such calculus rules.
A secret sharing scheme for anonymous DNS queries
2013
Since its adoption in the early 90's, several privacy concerns have emerged about the Domain Name System (DNS). By collecting the DNS queries performed by each user, it is possible to characterize habits, interests and other sensitive data of the users. Usually, users resolve their {\em url} requests by querying the DSN server belonging to their Internet Service Provider (ISP) and therefore they assume they can trust it. However, different DNS servers can be used, by revealing sensitive data to a partially untrusted entity that can collect and sell this data for several purposes (target advertising, user profiling, etc.). In this paper we address the possibility to integrate tools in the cu…
Room-temperature performance of 3 mm-thick cadmium-zinc-telluride pixel detectors with sub-millimetre pixelization.
2020
Cadmium–zinc–telluride (CZT) pixel detectors represent a consolidated choice for the development of room-temperature spectroscopic X-ray imagers, finding important applications in medical imaging, often as detection modules of a variety of new SPECT and CT systems. Detectors with 3–5 mm thicknesses are able to efficiently detect X-rays up to 140 keV giving reasonable room-temperature energy resolution. In this work, the room-temperature performance of 3 mm-thick CZT pixel detectors, recently developed at IMEM/CNR of Parma (Italy), is presented. Sub-millimetre detector arrays with pixel pitch less than 500 µm were fabricated. The detectors are characterized by good room-temperature performan…
Room-Temperature X-ray response of cadmium-zinc-Telluride pixel detectors grown by the vertical Bridgman technique
2020
In this work, the spectroscopic performances of new cadmium–zinc–telluride (CZT) pixel detectors recently developed at IMEM-CNR of Parma (Italy) are presented. Sub-millimetre arrays with pixel pitch less than 500 µm, based on boron oxide encapsulated vertical Bridgman grown CZT crystals, were fabricated. Excellent room-temperature performance characterizes the detectors even at high-bias-voltage operation (9000 V cm−1), with energy resolutions (FWHM) of 4% (0.9 keV), 1.7% (1 keV) and 1.3% (1.6 keV) at 22.1, 59.5 and 122.1 keV, respectively. Charge-sharing investigations were performed with both uncollimated and collimated synchrotron X-ray beams with particular attention to the mitigation o…
Title: The Emergency Medicine Facing the Challenge of Open Science
2020
This article belongs to the Special Issue Data Reuse for Sustainable Development Goals.
Generalized person-by-person optimization in team problems with binary decisions
2008
In this paper, we extend the notion of person by person optimization to binary decision spaces. The novelty of our approach is the adaptation to a dynamic team context of notions borrowed from the pseudo-boolean optimization field as completely local-global or unimodal functions and sub- modularity. We also generalize the concept of pbp optimization to the case where the decision makers (DMs) make decisions sequentially in groups of m, we call it mbm optimization. The main contribution are certain sufficient conditions, verifiable in polynomial time, under which a pbp or an mbm optimization algorithm leads to the team-optimum. We also show that there exists a subclass of sub-modular team pr…
The ‘gig economy’: employee, self-employed or the need for a special employment regulation?
2017
The digital era has changed employment relationships dramatically, causing a considerable degree of legal uncertainty as to which rules apply in cyberspace. Technology is transforming business organisation in a way that makes employees – as subordinate workers – less necessary. New types of companies, based on the ‘on-demand economy’ or so-called ‘sharing economy’ and dedicated to connecting customers directly with individual service providers, are emerging. These companies conduct their entire core business through workers that they classify as self-employed. In this context, employment law is facing its greatest challenge, as it has to deal with a very different reality to the one existi…
Privacy-Preserving Overgrid: Secure Data Collection for the Smart Grid
2020
In this paper, we present a privacy-preserving scheme for Overgrid, a fully distributed peer-to-peer (P2P) architecture designed to automatically control and implement distributed Demand Response (DR) schemes in a community of smart buildings with energy generation and storage capabilities. To monitor the power consumption of the buildings, while respecting the privacy of the users, we extend our previous Overgrid algorithms to provide privacy preserving data aggregation (PP-Overgrid). This new technique combines a distributed data aggregation scheme with the Secure Multi-Party Computation paradigm. First, we use the energy profiles of hundreds of buildings, classifying the amount of &ldquo