Kooperativer Bibliotheksverbund

Berlin Brandenburg

and
and

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Language
Year
  • 11
    Language: English
    In: Int. J. of Internet Technology and Secured Transactions, 2010, Vol 2 Issue 1/2, pp 160 - 173
    Description: Advances in pervasive computing technology on the one hand, and the widespread use of mobile computing devices combined with improvements in embedded positioning capabilities on the other hand, testify the need for new mechanisms and applications to realise these innovative technologies with particular concern for users' privacy and consent. Although several researches on these new technologies and their privacy are ongoing, there is still a long path to realise all their benefits. This paper takes a special attention to location privacy in pervasive computing, as a particular type of information privacy. A hybrid mechanism for location privacy in pervasive computing is proposed.
    Keywords: pervasive computing; location privacy; information privacy; information security.
    ISSN: 1748-569X
    ISSN: 1748569X
    ISSN: 1748-5703
    ISSN: 17485703
    E-ISSN: 1748-5703
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Language: English
    In: Journal of the American College of Cardiology, 23 October 2012, Vol.60(17), pp.B221-B221
    Description: To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.jacc.2012.08.798 Byline: Mohsen Sharifi, Curt Bay, Suzanne Bentz, Mahshid Mehdipour, Pamela Eden, Sasan Nowroozi Author Affiliation: (1) Arizona Cardiovascular Consultants & A.T. Still University, Mesa, AZ (2) A.T.Still University, Mesa, AZ (3) Arizona Cardiovascular Consultants, Mesa, AZ
    Keywords: Medicine
    ISSN: 0735-1097
    E-ISSN: 1558-3597
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Language: English
    In: Journal of the American College of Cardiology, 21 March 2017, Vol.69(11), pp.2079-2079
    Description: To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/S0735-1097(17)35468-2 Byline: Mohsen Sharifi, Fatemeh Larijani, Ryan Wycliffe, Beth Loggins, Bethany Schroeder, Dana De Los Monteros, Wilbur Freeman Author Affiliation: Arizona Cardiovascular Consultants and Vein Clinic, Mesa, AZ, USA Article Note: (footnote) Poster Contributions Poster Hall, Hall C Saturday, March 18, 2017, 3:45 p.m.-4:30 p.m. Session Title: Vascular Medicine: Venous Disease Abstract Category: 41. Vascular Medicine: Venous Disease Presentation Number: 1256-362
    Keywords: Medicine
    ISSN: 0735-1097
    E-ISSN: 1558-3597
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    In: Security and Communication Networks, November 2013, Vol.6(11), pp.1310-1318
    Description: One of the benefits of virtualization technology is the provision of secure and isolated computing environments on a single physical machine. However, the use of virtual machines for this purpose often degrades the overall system performance that is due to emulation costs, for example, packet filtering on every virtual machine. To allow virtual machines to be favorably used as before for the provision of secure environments but with comparably less performance degradation, we propose a new architecture called Alamut in this paper for restructuring any typical network intrusion detection system (NIDS) to run in a Xen‐based virtual execution environment. In the proposed architecture, primitive mechanisms for implementing the security concerns of typical NIDSs such as signature matching are placed at the kernel level of driver domain (dom0), whereas security policies and management modules are kept in user space of that domain. Separation of mechanisms from policies allows network packets to be verified at the kernel level first hand more efficiently without requiring costly context switches to push them to user space for validation. In addition, system administrators can easily define new policies at user level and determine on which virtual machines these policies should be enforced. A proof‐of‐concept implementation of Alamut has been prototyped on the Xen hypervisor using Bro open‐source NIDS. Experimental results show approximately 3.5‐fold increase in the overall system performance when our prototype is run compared with when Bro is run. Results also show 19% improvement in network throughput. The comparison of Alamut with Snort with the same set of signatures and attacks shows that our prototyped NIDS has lower processor utilization and has captured more packets in heavy network loads. Copyright © 2013 John Wiley & Sons, Ltd. This paper presents Alamut, a new architecture for network intrusion detection systems (NIDSs) in support of Xen‐based virtualized environments. In the design of Alamut, the base primitive modules of an NIDS (Bro in our case) are moved to the kernel space of dom0, whereas the rest parts are kept at user space. Evaluation results show that Alamut outperforms Snort and user mode Bro.
    Keywords: Intrusion Detection System ; Virtualization Technology ; Security ; Performance ; Xen
    ISSN: 1939-0114
    E-ISSN: 1939-0122
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Language: English
    In: The Journal of Supercomputing, 2012, Vol.61(1), pp.46-66
    Description: There is growing demand on datacenters to serve more clients with reasonable response times, demanding more hardware resources, and higher energy consumption. Energy-aware datacenters have thus been amongst the forerunners to deploy virtualization technology to multiplex their physical machines (PMs) to as many virtual machines (VMs) as possible in order to utilize their hardware resources more effectively and save power. The achievement of this objective strongly depends on how smart VMs are consolidated. In this paper, we show that blind consolidation of VMs not only does not reduce the power consumption of datacenters but it can lead to energy wastage. We present four models, namely the target system model, the application model, the energy model, and the migration model, to identify the performance interferences between processor and disk utilizations and the costs of migrating VMs. We also present a consolidation fitness metric to evaluate the merit of consolidating a number of known VMs on a PM based on the processing and storage workloads of VMs. We then propose an energy-aware scheduling algorithm using a set of objective functions in terms of this consolidation fitness metric and presented power and migration models. The proposed scheduling algorithm assigns a set of VMs to a set of PMs in a way to minimize the total power consumption of PMs in the whole datacenter. Empirical results show nearly 24.9% power savings and nearly 1.2% performance degradation when the proposed scheduling algorithm is used compared to when other scheduling algorithms are used.
    Keywords: Power management ; Virtualization technology ; Workload characterization ; Cloud computing
    ISSN: 0920-8542
    E-ISSN: 1573-0484
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Language: English
    In: Computing, 2013, Vol.95(1), pp.67-88
    Description: Power efficiency is one of the main challenges in large-scale distributed systems such as datacenters, Grids, and Clouds. One can study the scheduling of applications in such large-scale distributed systems by representing applications as a set of precedence-constrained tasks and modeling them by a Directed Acyclic Graph. In this paper we address the problem of scheduling a set of tasks with precedence constraints on a heterogeneous set of Computing Resources (CRs) with the dual objective of minimizing the overall makespan and reducing the aggregate power consumption of CRs. Most of the related works in this area use Dynamic Voltage and Frequency Scaling (DVFS) approach to achieve these objectives. However, DVFS requires special hardware support that may not be available on all processors in large-scale distributed systems. In contrast, we propose a novel two-phase solution called PASTA that does not require any special hardware support. In its first phase, it uses a novel algorithm to select a subset of available CRs for running an application that can balance between lower overall power consumption of CRs and shorter makespan of application task schedules. In its second phase, it uses a low-complexity power-aware algorithm that creates a schedule for running application tasks on the selected CRs. We show that the overall time complexity of PASTA is $$O(p.v^{2})$$ where $$p$$ is the number of CRs and $$v$$ is the number of tasks. By using simulative experiments on real-world task graphs, we show that the makespan of schedules produced by PASTA are approximately 20 % longer than the ones produced by the well-known HEFT algorithm. However, the schedules produced by PASTA consume nearly 60 % less energy than those produced by HEFT. Empirical experiments on a physical test-bed confirm the power efficiency of PASTA in comparison with HEFT too.
    Keywords: DAG scheduling ; Energy-awareness ; High performance computing ; Heterogeneous computing resources
    ISSN: 0010-485X
    E-ISSN: 1436-5057
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Language: English
    In: Journal of Molecular Graphics and Modelling, September 2017, Vol.76, pp.152-160
    Description: Ion channels play a crucial role in the cardiovascular system. Our understanding of cardiac ion channel function has improved since their first discoveries. The flow of potassium, sodium and calcium ions across cardiomyocytes is vital for regular cardiac rhythm. Blockage of these channels, delays cardiac repolarization or tend to shorten repolarization and may induce arrhythmia. Detection of drug risk by channel blockade is considered essential for drug regulators. Advanced computational models can be used as an early screen for torsadogenic potential in drug candidates. New drug candidates that are determined to not cause blockage are more likely to pass successfully through preclinical trials and not be withdrawn later from the marketplace by manufacturer. Several different approved drugs, however, can cause a distinctive polymorphic ventricular arrhythmia known as torsade de pointes (TdP), which may lead to sudden death. The objective of the present study is to review the mechanisms and computational models used to assess the risk that a drug may TdP. There is strong evidence from multiple studies that blockage of the L-type calcium current reduces risk of TdP. Blockage of sodium channels slows cardiac action potential conduction, however, not all sodium channel blocking antiarrhythmic drugs produce a significant effect, while late sodium channel block reduces TdP. Interestingly, there are some drugs that block the hERG potassium channel and therefore cause QT prolongation, but they are not associated with TdP. Recent studies confirmed the necessity of studying multiple distinctionic ion channels which are responsible for cardiac related diseases or TdP, to obtain an improved clinical TdP risk prediction of compound interactions and also for designing drugs.
    Keywords: Artificial Neural Network ; Cardiac Arrhythmia ; Cardiotoxicity ; Cipa ; Herg ; Ion Channels ; Long Qt Syndrome ; Proarrhythmia ; Torsade de Pointes ; Tdp ; Chemistry
    ISSN: 1093-3263
    E-ISSN: 1873-4243
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Language: English
    In: Journal of Vascular Surgery, 2011, Vol.53(1), pp.147-149
    Description: A growing number of patients who are on systemic anticoagulation with warfarin require endovenous thermal ablation for reflux disease in the great saphenous vein (GSV). Little is known about the effects of anticoagulation on periprocedural bleeding and long-term closure rates of the treated veins. This study evaluated the effects of uninterrupted anticoagulation in patients undergoing endovenous thermal ablation. In this prospective observational study, 88 limbs of patients on warfarin (anticoagulation group [AG]) who underwent endovenous thermal ablation for GSV reflux disease were compared with 92 limbs in patients receiving no anticoagulation or antiplatelet agents (control group [CG]). Forty percent of AG patients were also receiving antiplatelet therapy. Periprocedural bleeding and closure rate at 1 year were evaluated. No major bleeding occurred in either group. Minor bleeding was noted in 8 of 88 procedures in the AG vs 4 of 92 in the CG ( = 0.24); all in patients receiving radiofrequency ablation. Four of the eight minor bleeds in the AG were noted in patients receiving “triple therapy” with warfarin, aspirin, and clopidogrel or ticlopidine. Triple therapy in the AG was associated with a higher risk of minor bleeding compared with the CG (relative risk, 13.0; 95% confidence interval, 4.10-41.19, 〈 .001). All treated venous segments remained closed at the 1-year follow-up in both groups. In this relatively small, nonrandomized study comparing endovenous thermal ablation in patients with and without warfarin, no differences were found in periprocedural risk of major bleeding or closure rate of the treated venous segments. Minor bleeding was increased in patients receiving triple therapy with warfarin, aspirin, and a thienopyridine who underwent radiofrequency ablation.
    Keywords: Medicine
    ISSN: 0741-5214
    E-ISSN: 1097-6809
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Language: English
    In: The Journal of Supercomputing, 2012, Vol.59(1), pp.548-567
    Description: Interprocess communication (IPC) is a well-known technique commonly used by programs running on homogeneous distributed systems. However, it cannot be used readily and efficiently by programs running on heterogeneous distributed systems. This is because it must be given a uniform interface either by a set of middleware or more efficiently properly ported to the kernel of all varieties of open source and closed source proprietary operating systems running on heterogeneous nodes of distributed systems. This is particularly problematic to achieve when the kernel code of closed source operating systems are inaccessible to third parties. We propose an alternative nonproprietary approach to enable the use of IPC in heterogeneous distributed systems by wrapping IPC calls from the kernel of closed source operating systems, and converting them into equivalent IPC calls that are efficiently implemented inside the kernel code of open source operating systems. To show the superiority of our approach, we developed a wrapper for converting MS-Windows IPC calls into equivalent Linux IPC calls and benched our approach on a hybrid computer cluster running both types of operating systems.
    Keywords: Hybrid cluster ; Wrapper ; Open source ; Closed source ; Interprocess communication (IPC) ; Kernel level ; User level ; Message ; Remote procedure call
    ISSN: 0920-8542
    E-ISSN: 1573-0484
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Language: English
    In: Wireless Sensor Network (WSN), Feb, 2010, Vol.2(2), p.123(6)
    Description: Wireless sensor actor networks are composed of sensor and actor nodes wherein sensor nodes outnumber resource-rich actor nodes. Sensor nodes gather information and send them to a central node (sink) and/or to actors for proper actions. The short lifetime of energy-constrained sensor nodes can endanger the proper operation of the whole network when they run out of power and partition the network. Energy harvesting as well as minimizing sensor energy consumption had already been studied. We propose a different approach for recharging sensor nodes by mobile actor nodes that use only local information. Sensor nodes send their energy status along with their sensed information to actors in their coverage. Based on this energy information, actors coordinate implicitly to decide on the timings and the ordering of recharges of low energy sensor nodes. Coordination between actors is achieved by swarm intelligence and the replenishment continues during local learning of actor nodes. The number of actors required to keep up such networks is identified through simulation using VisualSense. It is shown that defining the appropriate number of actor nodes is critical to the success of recharging strategies in prolonging the network lifetime. Keywords: Wireless Sensor Actor Networks, Coordination, Energy Harvesting, Swarm Intelligence
    Keywords: Electric Power Generation -- Methods ; Sensors -- Usage ; Wireless Sensor Networks -- Research ; Energy Consumption -- Control
    ISSN: 1945-3078
    Source: Cengage Learning, Inc.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages