Search
Now showing items 31-40 of 40
Faulty node repair and dynamically spawned black hole search in clouds
(2015-03-01)
The reality of the constant emergence of new threats justifies the necessity to protect
network assets and mitigate the risks associated with attacks. In this context, eliminating faulty network entities in the distributed ...
An investigation of land-use impacts on water quality and phytoplankton communities of the Vermilion River and major tributaries, Sudbury, Ontario, Canada
(2015-12-01)
The Vermilion River and major tributaries (VRMT) receive numerous inputs from point and non-point sources along their continuum. In addition to these inputs from the surrounding landscape, a hydroelectric impoundment and ...
Effects of dietary fermentable material on innate and adaptive immune measures in male and female rats under resting and immunized conditions
(2015-02-01)
Sex-based differences in immune parameters are well recognized, and recent evidence suggests differences in microbiota composition between sexes, necessitating assessment of effects of dietary fermentable material (DFM) ...
On the potential of intent-based access control (IBAC) in preventing insider threats
(2015-11-01)
Existing access control mechanisms are based on the concepts of identity enrollment and recognition, and assume that recognized identity is synonymous with ethical actions. However, statistics over the years show that the ...
Towards measuring privacy
(2015-04-01)
The acceptable threshold for privacy is an individual choice, informed by culture, tradition and experience. That it is important, conversely, is self-evident. We use it to moderate personal information disclosure, how ...
Dynamic square patterns in two dimensional neural fields
(2015-07-29)
The goal of this thesis is to study the emergence of spatiotemporal waves in neural field models. Neural field models aim to describe the activity of populations of neurons at a mesoscopic scale, considering averaged ...
CORE: a framework for the automatic repair of concurrency bugs
(2015-01-01)
Desktop computers now contain 2, 4 or even 8 processors. To benefit from them programs must be written to work in parallel. If writing good code is hard, writing good parallel code is much harder. Parallelization adds ...
Dynamic probabilistic network protection in large-scale failure scenarios
(2015-01-01)
Large-scale failure resulting from natural disasters or intentional attacks is now considered a serious risk for communication network infrastructure. In these events, simultaneous damages in several links and nodes may ...
Analysis of resistance nodulation division efflux pumps in Acinetobacter baumannii
(2015-01-01)
Strains from Canadian hospitals were classified as A. baumannii, A. pitti, or A. osocomialis and the most commonly expressed resistance nodulation division (RND) efflux pump was adeFGH. A collection of A. baumannii isolates ...
TandemTable: Supporting Conversations and Language Learning Using a Multi-Touch Digital Table
(Association for Computing Machinery, 2015-06-03)
We present TandemTable, a multi-touch tabletop system designed to break down communication barriers between partners, with a special focus on supporting those who are learning languages. The design was guided by a grounding ...