SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Wilson M) ;lar1:(kau)"

Sökning: WFRF:(Wilson M) > Karlstads universitet

  • Resultat 1-4 av 4
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Knoche, Hendrik, et al. (författare)
  • Identifying Challenges and Opportunities for Intelligent Data-Driven Health Interfaces to Support Ongoing Care
  • 2023
  • Ingår i: CHI EA '23: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems. - : Association for Computing Machinery (ACM). - 9781450394222 ; , s. 1-7
  • Konferensbidrag (refereegranskat)abstract
    • This workshop will explore future work in the area of intelligent, conversational, data-driven health interfaces both from patients’ and health care professionals’ perspectives. We aim to bring together a diverse set of experts and stakeholders to jointly discuss the opportunities and challenges at the intersection of public health care provisioning, patient and caretaker empowerment, monitoring provisioning of health care and its quality. This will require AI-supported, conversational decision-making interfaces that adhere to ethical and privacy standards and address issues around agency, control, engagement, motivation, and accessibility. The goal of the workshop is to create a community around intelligent data-driven interfaces and create a road map for their future research.
  •  
2.
  • Martucci, Leonardo, et al. (författare)
  • A Lightweight Distributed Group Authentication Mechanism
  • 2004
  • Konferensbidrag (refereegranskat)abstract
    • Identifying trustable devices and establishing secure tunnels between them in ad hoc network environments is a difficult task because it has to be quick, inexpensive and secure. Certificate-based authentication mechanisms are too expensive for small devices. The use of such mechanisms must be controlled and reserved for special situations, (e.g. banking applications) but not for everyday transactions. In addition, indiscriminate use of asymmetric ciphering and certificate-based authentication is a shortcut to battery exhaustion attacks. This paper describes a lightweight distributed group authentication mechanism suitable for ad hoc network devices requirements. We introduce the concept of group authentication, which target is not the individual identification of devices, but to verify if a device belongs or does not belong to a trusted group. The proposed mechanism verifies if devices have a pre-shared secret and sets new cipher keys each time it runs. This mechanism requires loose synchronization among the devices real time clocks to thwart replay attacks. It also mitigates the effects of battery exhaustion attacks due to its lightness
  •  
3.
  • Martucci, Leonardo, et al. (författare)
  • A Trust-Based Security Architecture for Small and Medium-Sized Mobile Ad Hoc Networks
  • 2004
  • Konferensbidrag (refereegranskat)abstract
    • This paper describes a trust based security architecture for small/medium-sized mobile ad hoc networks. We designed and implemented a security architecture that extends the traditional PKI model, assigning variable trust values to digital certificates and issuing credentials to grant access to network services. Trust values are not static; they vary during regular network operation as network users provoke security incidents. Depending on the seriousness of the incidents the trust value associated to the offenders certificate will vary. Eventually, a series of security incidents may end up with the certificate revocation. We also developed a security framework for designing secure applications and built prototypes to test and validate our architecture. We considered service-oriented ad hoc networks, where every mobile device is classified as service providers or service users
  •  
4.
  • Thompson, G. Brian, et al. (författare)
  • Learning with sublexical information from emerging reading vocabularies in exceptionally early and normal reading development
  • 2015
  • Ingår i: Cognition. - : Elsevier. - 0010-0277 .- 1873-7838. ; 136, s. 166-185
  • Tidskriftsartikel (refereegranskat)abstract
    • Predictions from theories of the processes of word reading acquisition have rarely been tested against evidence from exceptionally early readers. The theories of Ehri, Share, and Byrne, and an alternative, Knowledge Sources theory, were so tested. The former three theories postulate that full development of context-free letter sounds and awareness of phonemes are required for normal acquisition, while the claim of the alternative is that with or without such, children can use sublexical information from their emerging reading vocabularies to acquire word reading. Results from two independent samples of children aged 3-5, and 5 years, with mean word reading levels of 7 and 9 years respectively, showed underdevelopment of their context-free letter sounds and phoneme awareness, relative to their word reading levels and normal comparison samples. Despite such underdevelopment, these exceptional readers engaged in a form of phonological recoding that enabled pseudoword reading, at the level of older-age normal controls matched on word reading level. Moreover, in the 5-year-old sample further experiments showed that, relative to normal controls, they had a bias toward use of sublexical information from their reading vocabularies for phonological recoding of heterophonic pseudowords with irregular consistent spelling, and were superior in accessing word meanings independently of phonology, although only if the readers were without exposure to explicit phonics. The three theories were less satisfactory than the alternative theory in accounting for the learning of the exceptionally early readers. (C) 2014 Elsevier B.V. All rights reserved.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-4 av 4

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy