4,930 research outputs found
Libra, a Multi-hop Radio Network Bandwidth Market
Libra is a two-level market which assigns fractional shares of time to the transmitting nodes in local
regions of a multi-hop network. In Libra, users are assigned budgets by management and users assign
funding to services within their budget limits. The purpose is to prioritize users and also optimize network
utilization by preventing source nodes from injecting too much traffic into the network and thereby causing
downstream packet loss. All transmitting nodes sell capacity in the region surrounding them, and buy
capacity from their neighbors in order to be able to transmit. Streams buy capacity from each of the nodes
on their paths, thus streams that cross the same region compete directly for the bandwidth in that region.
Prices are adjusted incrementally on both levels
Protecting Private Data in the Cloud
Companies that process business critical and secret data are reluctant
to use utility and cloud computing for the risk that their data gets
stolen by rogue system administrators at the hosting company. We
describe a system organization that prevents host administrators from
directly accessing or installing eaves-dropping software on the
machine that holds the client's valuable data. Clients are monitored
via machine code probes that are inlined into the clients' programs at
runtime. The system enables the cloud provider to install and remove software
probes into the machine code without stopping the client's program, and
it prevents the provider from installing probes not granted by the
client
Personalized Decentralized Communication
Search engines, portals and topic-centered web sites are all
attempts to create more or less personalized web-services.
However, no single service can in general fulfill all needs
of a particular user, so users have to search and maintain
personal profiles at several locations. We propose an architecture where each person has his own information
management environment where all personalization is
made locally. Information is exchanged with other’s if it’s
of mutual interest that the information is published or received. We assume that users are self-interested, but that
there is some overlap in their interests.
Our recent work has focused on decentralized dissemination of information, specifically what we call decentralized recommender systems. We are investigating the behavior of such systems and have also done some preliminary work on the users’ information environment
Hypervisor Integrity Measurement Assistant
An attacker who has gained access to a computer may want to upload or modify configuration files, etc., and run arbitrary programs of his choice. We can severely restrict the power of the attacker by having a white-list of approved file checksums and preventing the kernel from loading loading any file with a bad checksum. The check may be placed in the kernel, but that requires a kernel that is prepared for it. The check may also be placed in a hypervisor which intercepts and prevents the kernel from loading a bad file.
We describe the implementation of and give performance results for two systems. In one the checksumming, or integrity measurement, and decision is performed by the hypervisor instead of the OS. In the other only the final integrity decision is done in the hypervisor. By moving the integrity check out from the VM kernel it becomes harder for the intruder to bypass the check.
We conclude that it is technically possible to put file integrity control into the hypervisor, both for kernels without and with pre-compiled support for integrity measurement
Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud
In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud users to run their own virtual machines (VMs) on available cloud computing resources. IaaS gives enterprises the possibility to outsource their process workloads with minimal effort and expense. However, one major problem with existing approaches of cloud leasing, is that the users can only get contractual guarantees regarding the integrity of the offered platforms. The fact that the IaaS user himself or herself cannot verify the provider promised cloud platform integrity, is a security risk which threatens to prevent the IaaS business in general. In this paper we address this issue and propose a novel secure VM launch protocol using Trusted Computing techniques. This protocol allows the cloud IaaS users to securely bind the VM to a trusted computer configuration such that the clear text VM only will run on a platform that has been booted into a trustworthy state. This capability builds user confidence and can serve as an important enabler for creating trust in public clouds. We evaluate the feasibility of our proposed protocol via a full scale system implementation and perform a system security analysis
60 ja plus ryhmä : Ryhmätoiminta yli 60-vuotiaille mielenterveyskuntoutujille
Leinonen, Minna & Rasmusson, Elisa. 60 ja plus -ryhmä. Ryhmätoiminta yli 60-vuotiaille mielenterveyskuntoutujille. Kevät 2018, 39 sivua, 2 liitettä. Diakonia-ammattikorkeakoulu, Sosiaalialan koulutusohjelma, Diakonisen sosiaalityön suuntautumisvaihtoehto, sosionomi (AMK) + diakonian virkakelpoisuus.
Opinnäytetyön tavoitteena oli suunnitella yli 60-vuotiaille mielenterveyskuntoutujille ryhmätoimintamalli, jossa kiinnitettiin huomiota mielen hyvinvointiin sekä syrjäytymisen ehkäisyyn. Vertaistuki ja yhteisöllisyys ovat suuressa roolissa ryhmän toiminnassa. Opinnäytetyö tehtiin yhteistyössä Oulussa toimivan Hyvän mielen talon kanssa. Opinnäytetyö on toiminnallinen kehittämistyö.
Ryhmäkerroilla käytetyt luovat työmenetelmät vahvistavat ihmisen hyvinvointia sekä lisäävät osallisuutta ja yhteistä tekemistä. Luovat työmenetelmät antavat mahdollisuuden käsitellä myös hengellisyyteen ja spiritualiteettiin liittyviä aiheita.
Yli 60-vuotiaille mielenterveyskuntoutujille suunnatulle toiminnalle on kysyntää. Ikääntyvät mielenterveyskuntoutujat ovat ryhmä, joille suunnattua toimintaa on vähän.
Asiasanat: vertaistuki, yhteisöllisyys, mielenterveys, ikääntyvätLeinonen, Minna & Rasmusson, Elisa. 60+ group. Group activity for over 60-year-old mental health rehabilitees. Spring 2018. 39 pages, 2 appendices. Language: Finnish. Diaconia University of Applied Sciences. Degree programme in Social Services, Option in Diaconal Social Work. Degree: Bachelor of Social Services.
The goal of the thesis was to plan a group activity model for over 60-year-old mental health rehabilitees in which attention was paid to the well-being of the mind and prevention of exclusion. In group activity peer support and communality are in a big role. This thesis was made in co-operation with Hyvän mielen talo in Oulu, Finland. The thesis is a functional thesis and at the same time development work.
The working methods that are used in groups strengthen a human’s well-being, inclusion and collaboration. Creative methods give an opportunity to handle also spiritual themes.
Activities for over 60-year-old mental health rehabilitees are in great demand. The aging mental health rehabilitees are a group that do not have activities specially directed at them.
Keywords: peer support, communality, mental health, elderly peopl
Recommended from our members
‘If you look the part you’ll get the job’: should career professionals help clients to enhance their career image?
This article presents a critical exploration of the role of career professionals in supporting people to reflect on and enhance their appearance, attractiveness and self-presentation (career image). The article is conceptual and based on a review of the broader literature on career success, appearance and attractiveness. It explores the evidence for a relationship between attractiveness and career, and the authors propose a conceptual framework in which career image is comprised of three elements (interpersonal skills, aesthetic presentation and beauty). The paper examines a possible role for career professionals in relation to this and then critically examines this role and concludes with the proposition of a research agenda in this area
Modes of ocean variability in the tropical Pacific as derived from Geosat altimetry
Satellite-derived (Geosat altimetry) sea surface height anomalies for the period November 1986 to September 1989 were investigated in order to extract the dominant modes of climate variability in the tropical Pacific. We applied the technique of principal oscillation patterns and computed associated wind stress patterns for each mode. Four modes were identified. The first mode has a time scale of about 3 months and can be identified with the first baroclinic equatorial Kelvin wave mode, which is excited by intraseasonal wind variations over the western equatorial Pacific. The second mode has a time scale of about 6 months and describes the semiannual cycle in the tropical Pacific sea level. Equatorial wave dynamics appears to be crucial for this mode also. The third mode is the annual cycle which shows evidence of off-equatorial Rossby wave propagation. The fourth mode is associated with the El Niño/Southern Oscillation (ENSO) phenomenon. The ENSO mode is found to be consistent with the “delayed action oscillator” scenario
Multiple causes of interannual sea surface temperature variability in the equatorial Atlantic Ocean
The eastern equatorial Atlantic Ocean is subject to interannual fluctuations of sea surface temperatures, with climatic impacts on the surrounding continents. The dynamic mechanism underlying Atlantic temperature variability is thought to be similar to that of the El Nino/Southern Oscillation (ENSO) in the equatorial Pacific, where air-sea coupling leads to a positive feedback between surface winds in the western basin, sea surface temperature in the eastern basin, and equatorial oceanic heat content. Here we use a suite of observational data, climate reanalysis products, and general circulation model simulations to reassess the factors driving the interannual variability. We show that some of the warm events can not be explained by previously identified equatorial wind stress forcing and ENSO-like dynamics. Instead, these events are driven by a mechanism in which surface wind forcing just north of the equator induces warm ocean temperature anomalies that are subsequently advected toward the equator. We find the surface wind patterns are associated with long-lived subtropical sea surface temperature anomalies and suggest they therefore reflect a link between equatorial and subtropical Atlantic variability
- …
