This article reviews risks and vulnerabilities in interdomain routing and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and countermeasures to reduce router vulnerabilities. 相似文献
This paper explores how research teams in Intel’s Digital Health Group are using ethnography to identify ‘designable moments’—spaces,
times, objects, issues and practices which suggest opportunities for appropriate interventions. It argues that technology
innovation should aim to incorporate the views, experiences and practices of users from the start of the design process to
support independent living and develop culturally sensitive enhancements that contribute towards wellbeing and a life of quality
for local older populations. 相似文献
As more interactive surfaces enter public life, casual interactions from passersby are bound to increase. Most of these users
can be expected to carry a mobile phone or PDA, which nowadays offers significant computing capabilities of its own. This
offers new possibilities for interaction between these users’ private displays and large public ones. In this paper, we present
a system that supports such casual interactions. We first explore a method to track mobile phones that are placed on a horizontal
interactive surface by examining the shadows which are cast on the surface. This approach detects the presence of a mobile
device, as opposed to any other opaque object, through the signal strength emitted by the built-in Bluetooth transceiver without
requiring any modifications to the devices’ software or hardware. We then go on to investigate interaction between a Sudoku
game running in parallel on the public display and on mobile devices carried by passing users. Mobile users can join a running
game by placing their devices on a designated area. The only requirement is that the device is in discoverable Bluetooth mode.
After a specific device has been recognized, a client software is sent to the device which then enables the user to interact
with the running game. Finally, we explore the results of a study which we conducted to determine the effectiveness and intrusiveness
of interactions between users on the tabletop and users with mobile devices. 相似文献
We examined the high precision deposition of toner and polymer microparticles with a typical size of approximately 10 microm on electrode arrays with electrodes of 100 microm and below using custom-made microelectronic chips. Selective desorption of redundant particles was employed to obtain a given particle pattern from preadsorbed particle layers. Microparticle desorption was regulated by dielectrophoretic attracting forces generated by individual pixel electrodes, tangential detaching forces of an air flow, and adhesion forces on the microchip surface. A theoretical consideration of the acting forces showed that without pixel voltage, the tangential force applied for particle detachment exceeded the particle adhesion force. When the pixel voltage was switched on, however, the sum of attracting forces was larger than the tangential detaching force, which was crucial for desorption efficiency. In our experiments, appropriately large dielectrophoretic forces were achieved by applying high voltages of up to 100 V on the pixel electrodes. In addition, electrode geometries on the chip's surface as well as particle size influenced the desorption quality. We further demonstrated the compatibility of this procedure to complementary metal oxide semiconductor chip technology, which should allow for an easy technical implementation with respect to high-resolution microparticle deposition. 相似文献
Weighted Max-SAT is the optimization version of SAT and many important problems can be naturally encoded as such. Solving weighted Max-SAT is an important problem from both a theoretical and a practical point of view. In recent years, there has been considerable interest in finding efficient solving techniques. Most of this work focuses on the computation of good quality lower bounds to be used within a branch and bound DPLL-like algorithm. Most often, these lower bounds are described in a procedural way. Because of that, it is difficult to realize the logic that is behind.In this paper we introduce an original framework for Max-SAT that stresses the parallelism with classical SAT. Then, we extend the two basic SAT solving techniques: search and inference. We show that many algorithmic tricks used in state-of-the-art Max-SAT solvers are easily expressible in logical terms in a unified manner, using our framework.We also introduce an original search algorithm that performs a restricted amount of weighted resolution at each visited node. We empirically compare our algorithm with a variety of solving alternatives on several benchmarks. Our experiments, which constitute to the best of our knowledge the most comprehensive Max-SAT evaluation ever reported, demonstrate the practical usability of our approach. 相似文献
IT systems pervade our society more and more, and we become heavily dependent on them. At the same time, these systems are increasingly targeted in cyberattacks, making us vulnerable. Enterprise and cybersecurity responsibles face the problem of defining techniques that raise the level of security. They need to decide which mechanism provides the most efficient defense with limited resources. Basically, the risks need to be assessed to determine the best cost-to-benefit ratio. One way to achieve this is through threat modeling; however, threat modeling is not commonly used in the enterprise IT risk domain. Furthermore, the existing threat modeling methods have shortcomings. This paper introduces a metamodel-based approach named Yet Another Cybersecurity Risk Assessment Framework (Yacraf). Yacraf aims to enable comprehensive risk assessment for organizations with more decision support. The paper includes a risk calculation formalization and also an example showing how an organization can use and benefit from Yacraf.
Supercapacitors, also known as electrochemical capacitors, have witnessed a fast evolution in the recent years, but challenges remain. This review covers the fundamentals and state-of-the-art developments of supercapacitors. Conventional and novel electrode materials, including high surface area porous carbons for electrical double layer capacitors (EDLCs) and transition metal oxides, carbides, nitrides and their various nanocomposites for pseudocapacitors – are described. Latest characterization techniques help to better understand the charge storage mechanisms in such supercapacitors and recognize their current limitations, while recently proposed synthesis approaches enable various breakthroughs in this field. 相似文献