Filters








30 Hits in 16.8 sec

Blind Guide

Daniel Vera Yánez, Diego Marcillo, Hugo Fernandes, João Barroso, António Pereira
2016 Proceedings of the 7th International Conference on Software Development and Technologies for Enhancing Accessibility and Fighting Info-exclusion - DSAI 2016  
At the end of this study, the authors developed design recommendations for a blind people guiding the robot. They hope that their study will inspire robotics researchers to make a prototype.  ...  Datagram Transport Layer Security (DTLS) can be used to secure the communication. DTLS provides authentication, confidentiality, data integrity and cryptographic.  ... 
doi:10.1145/3019943.3019993 dblp:conf/dsai/YanezMFBP16 fatcat:y5ud5x3thjgdfkgbtfquds2jhq

D2.1 Vision, State of the Art and Requirements Analysis

Striccoli Domenico
2019 Zenodo  
The main objectives of this deliverable are (i) to describe the project vision, the applicability scenarios, and demonstration use cases; (ii) to perform an analysis of the State of the Art and current  ...  market solutions; (iii) to identify and describe the technical and architectural requirements of the GUARD framework.  ...  TLS Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network.  ... 
doi:10.5281/zenodo.3564301 fatcat:lrb6r6zat5bk5oqwpwwlui3ztm

D2.1 Vision, State of the Art and Requirements Analysis

Striccoli Domenico
2019 Zenodo  
The main objectives of this deliverable are (i) to describe the project vision, the applicability scenarios, and demonstration use cases; (ii) to perform an analysis of the State of the Art and current  ...  market solutions; (iii) to identify and describe the technical and architectural requirements of the GUARD framework.  ...  Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network.  ... 
doi:10.5281/zenodo.4268474 fatcat:vtvogbwapzdc7nn6vms2cvdjou

D3.1 M-Sec Requirements Analysis – first version

Orfefs Voutyras, Antonis Litke, George Palaiokrassas, Koumoto Takafumi, Arturo Medela, Jin Nakasawa, Andres Iglesias, Vanessa Clemente, Aamir Bokhari, Kenji Tei, Mathieu Gallisot, Levent Gurgen (+2 others)
2020 Zenodo  
It is the input for the M-Sec specification and overall architecture as well as for the validation of the final system and its evaluation against the desired functionality.  ...  Requirements analysis plays an important role for the whole lifecycle of the M-Sec project.  ...  contributing to the overall design and specification of the M-Sec system and to Task "T3.3 Risks and security elements for a hyper-connected smart city" by supporting the further study and analysis of  ... 
doi:10.5281/zenodo.4009022 fatcat:snmrdnsbjva4rcvnpamcwyyrvm

The workshop on active internet measurements (AIMS) report

k. c. claffy, Marina Fomenkov, Ethan Katz-Bassett, Robert Beverly, Beverly A. Cox, Matthew Luckie
2009 Computer communication review  
Due to popular demand, we also dedicated half a day to large-scale active measurement (performance/topology) from mobile/cellular devices.  ...  cooperative solutions and coordinated strategies to address future data needs of the network and security operations and research communities.  ...  We thank all participants for their insights, feedback, and contributions of text to the report, and many thanks to Evi Nemeth for taking excellent notes at the meeting.  ... 
doi:10.1145/1629607.1629614 fatcat:phe3yyhogfanpcljf5ouccislu

Deliverable D3.7 Consolidated Projects Summary Report

Alasdair Reid, Matias Barberis Rami
2021 Zenodo  
The NGI Trust project aims to support the development of a human- centric Internet, by developing a stronger European ecosystem of researchers, innovators and technology developers in the field of privacy  ...  This report is part of a project that has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No.825618  ...  The baseline system is to be engineered and designed abiding to the principles of privacy by design. During the TRUSTRULES project, research was performed aiming to evaluate the possible  ... 
doi:10.5281/zenodo.5767430 fatcat:w2lxzgxktretjcv7h4xotz7xaq

LIPIcs : an Open-Access Series for International Conference Proceedings

Marc Herbstritt, Wolfgang Thomas
2016 ERCIM News  
To achieve this, however, they are highly-optimised for one specific task, and a huge amount of human effort is usually needed to design a DNN for a new task.  ...  Prior to our development, even the simplest case had no integral solution when we train a predictor on historic data and use the streaming API to give predictions with the trained model.  ...  This calls for approaching security in a holistic manner.  ... 
doi:10.18154/rwth-2018-223393 fatcat:ddo7qz65l5b7peuksw2amaoxai

Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project

Maria Pateraki, Manolis Lourakis, Leonidas Kallipolitis, Frank Werner, Petros Patias, Christos Pikridas
2019 Zenodo  
"Security by design" refers to the systematic collection and assessment of security goals, threats and countermeasures. Based on the results, a secure system is designed and implemented.  ...  There is also a critical need today for new cryptographic solutions, not only to secure the processing of sensitive data on cloud computing platforms but also to protect against future attacks from quantum  ...  them to continue their rehabilitation outside of the clinical environment [1] .  ... 
doi:10.5281/zenodo.4294256 fatcat:ovybcpqny5eppniw7hb5vcsevy

Tackling COVID-19 through Responsible AI Innovation: Five Steps in the Right Direction [article]

David Leslie
2020 arXiv   pre-print
These provide a practice-based path to responsible AI/ML design and discovery centered on open, accountable, equitable, and democratically governed processes and products.  ...  The need for researchers to act quickly and globally in tackling SARS-CoV-2 demands unprecedented practices of open research and responsible data sharing at a time when innovation ecosystems are hobbled  ...  As it developed into a longer and more academic article, which aimed to reach a general audience but remain pertinent for specialists, thoughtful and incisive input from four anonymous reviewers and the  ... 
arXiv:2008.06755v1 fatcat:6jpyvvytonh4rauhmkh3ndtfzy

Issue 29 Introduction: Computing the City

Armin Beverungen, Florian Sprenger
2017 Fibreculture Journal  
In focusing on the histories of how artistic and experimental developments in computational media have been appropriated for governance, and, by drawing a line from early urban development plans to today's  ...  The history of locative media as accounted for by Leorke serves as one precursor to the development of urban informatics (see Foth, 2009).  ...  Acknowledgements My thanks to two anonymous reviewers for their feedback on this article, even if we at times disagreed.  ... 
doi:10.15307/fcj.29.212.2017 fatcat:zoqi2hu5frhyxfmdsmqktyrxiq

The Future Internet convergence of IMS and ubiquitous smart environments: An IMS-based solution for energy efficiency

Paolo Bellavista, Giuseppe Cardone, Antonio Corradi, Luca Foschini
2012 Journal of Network and Computer Applications  
This thesis focuses on pervasive sensing systems to extract design guidelines as foundation of a comprehensive reference model for multi-tier Pervasive Sensing applications.  ...  , together with a direction for the design and deployment of future Pervasive Sensing applications.  ...  Most research efforts have studied the issues related to secure routing, exploring different solutions based on intensive usage of cryptographic primitives to validate MANET routing paths and to detect  ... 
doi:10.1016/j.jnca.2011.05.003 fatcat:3iprgfdvmjfxxey67qtflilnri

The Moral Character of Cryptographic Work

Phillip Rogaway
2015 unpublished
I call for a community-wide effort to develop more effective means to resist mass surveillance.  ...  For me, these questions came to a head with the Snowden disclosures of 2013.  ...  Acknowledgments My thanks go first to Mihir Bellare for countless discussions on the topic of this  ... 
fatcat:wl6iopkk4vda7nkvfdblc3hjnu

On improving privacy and security through user-informed design [article]

Marta Piekarska, Technische Universität Berlin, Technische Universität Berlin, Jean-Pierre Seifert
2018
It is "a state in which one is not observed or disturbed by other people". Or at least that is what Oxford Dictionary of Modern English provides us with.  ...  First, it is time to stop thinking of users as enemies. They are our allies and we need to collaborate with them to develop privacy tools that they need and find intuitive. We are all users.  ...  guidelines for the development process based on the results of the introductory study The concept of the introductory study and the key results of each step for the User-centric Design (UCD) process advertisement  ... 
doi:10.14279/depositonce-6718 fatcat:ww6dnavqvbeoznffqm3r7v4wey

Obstacles to wearable computing

Helen Oliver, Apollo-University Of Cambridge Repository, Jonathon Crowcroft, Richard Mortier
2021
This study uses a novel method of participatory design fiction (PDFi) to understand potential users of everyday wearable technology through storytelling.  ...  The participants each received a technology probe to wear in the wild for a year. They then updated their DFs as a way to reflect on the implications of the technology.  ...  Maria Wolters of the Design Informatics Programme at the University of Edinburgh for her enthusiastic connection with my ideas and for hosting the pilot workshops. Dr.  ... 
doi:10.17863/cam.78712 fatcat:ckzmccr4afh4npwrwnummx6pzm

Distributed, Low-Cost, Non-Expert Fine Dust Sensing with Smartphones

Matthias Budde
2019
Ein vielversprechender Ansatz um eine hohe räumliche und zeitliche Abdeckung zu erreichen ist dabei Participatory Sensing, also die verteilte Messung durch Endanwender unter Zuhilfenahme ihrer persönlichen  ...  Human-Computer-Interaction design for Participatory Sensing: On the basis of several small exploratory studies, a taxonomy of the errors made by non-expert users when measuring environmental phenomena  ...  scheme and research on the interaction design for participatory measurements contributed by non-expert users.  ... 
doi:10.5445/ir/1000092736 fatcat:5ckfesytgvd57cml33aea4f644
« Previous Showing results 1 — 15 out of 30 results