Search Results

You are looking at 21 - 30 of 30 items for :

  • physical tests x
  • Information Technology x
Clear All
Open access

Loet Leydesdorff, Wouter de Nooy and Lutz Bornmann

recursion in the evaluation of the accumulated advantages ( Price, 1976 ). Unlike these other measures, in PWR the disadvantages are appreciated equally with the advantages; the “power” (gains) is divided by the “weakness” (losses). In studies of sporting tournament (e.g. crickets), the ranking using PWR was found to outperform other rankings ( Prathap, 2014 ). In this study, we respond to this proposal in detail by testing PWR empirically in the citation matrix of 83 journals assigned to the Web-of-Science (WoS) category “Library and Information Science” (LIS) in the

Open access

Ling Wei, Haiyun Xu, Zhenmeng Wang, Kun Dong, Chao Wang and Shu Fang

providing emotional support, such as offering advice on family problems, indicates a stronger tie. Burt (2004) proposed that structural factors such as network topology and informal social circles shape tie strength. Gilbert and Karahalios (2009) presented a predictive model that maps social media data to tie strength, and tested the seven dimensions of tie strength suggested by the existing literature. They found that intimacy makes the greatest contribution to tie strength. Gilbert (2009) also mentioned that threshold value can be used to define strong and weak

Open access

Jane Greenberg

, demonstrate the value of metadata entrenched in data science. 5 Summary and Conclusions Metadata, while applauded by many, has not been vigorously pursued as a research topic in data science, compared to statistical modeling, algorithm testing, data mining, and visualization. To be clear, there is metadata research; however, metadata focused scientific and scholarly output in data science venues has not kept pace with these other topics. Articulating a problem is one of the first steps to addressing a challenge. This paper pursued initial steps to addressing this

Open access

Nees Jan van Eck and Ludo Waltman

Fractional counting For each of the five broad fields of science distinguished in the LR 2017, Figure 5 shows the share of all sessions in which the field was selected. The differences are not very large, with the most popular field, physical sciences and engineering, being selected less than twice as often as the least popular field, life and earth sciences. Figure 5 Share of all sessions in which a specific field was selected on the list view page. Figure 6 shows the share of all sessions in which a specific region (i.e., continent) was selected

Open access

Jon Garner, Alan L. Porter, Andreas Leidolf and Michelle Baker

interest in that substantial collaboration among an arbitrary set of collegial researchers would not be expected to increase markedly in the time periods studied. We note CG2 here for completeness, and draw limited comparisons. The general hypothesis is that participation in iUTAH increases collaboration and the degree of interdisciplinarity in the research of its members. Testing of the hypotheses of changed publication outputs, citations received, and especially, collaboration patterns centers on comparing the treatment and comparison groups, Before and After. The

Open access

Chaomei Chen

Mapping Scientific Frontiers: The Quest for Knowledge Visualization (Springer 2003, 2013). Dr. Chen has published over 200 peerreviewed articles in multiple disciplines, including computer science and information science. His work has been cited over 12,000 times on Google Scholar. His research has been supported by the National Science Foundation (NSF) and other government agencies as well as industrial sponsors such as Elsevier, IMS Health, Lockheed Martin, and Pfizer. His earlier research was funded by the European Commission, the Engineering and Physical Sciences

Open access

Jeremy Martin, Travis Mayberry, Collin Donahue, Lucas Foppe, Lamont Brown, Chadwick Riggins, Erik C. Rye and Dane Brown

Abstract

Media Access Control (MAC) address randomization is a privacy technique whereby mobile devices rotate through random hardware addresses in order to prevent observers from singling out their traffic or physical location from other nearby devices. Adoption of this technology, however, has been sporadic and varied across device manufacturers. In this paper, we present the first wide-scale study of MAC address randomization in the wild, including a detailed breakdown of different randomization techniques by operating system, manufacturer, and model of device.

We then identify multiple flaws in these implementations which can be exploited to defeat randomization as performed by existing devices. First, we show that devices commonly make improper use of randomization by sending wireless frames with the true, global address when they should be using a randomized address. We move on to extend the passive identification techniques of Vanhoef et al. to effectively defeat randomization in ~96% of Android phones. Finally, we identify a previously unknown flaw in the way wireless chipsets handle low-level control frames which applies to 100% of devices we tested. This flaw permits an active attack that can be used under certain circumstances to track any existing wireless device.

Open access

Jagdev Singh, Devendra Kumar and Sushila

-2141. J. Saberi-Nadjafi and A. Ghorbani, He's homotopy perturbation method: an effective tool for solving nonlinear integral and integro-differential equations, Computers & Mathematics with Applications, 58 (2009), 1345-1351. A. V. Karmishin, A. I. Zhukov and V. G. Kolosov, Methods of Dynamics Calculation and Testing for Thin-Walled Structures, Mashinostroyenie, Moscow, Russia, 1990. R. Hirota, Exact solutions of the Korteweg-de Vries equation for multiple collisions of solitons, Physical Review Letters, 27 (1971

Open access

Pavel Lifshits, Roni Forte, Yedid Hoshen, Matt Halpern, Manuel Philipose, Mohit Tiwari and Mark Silberstein

Yuval Yarom. 2016. ECDSA key extraction from mobile devices via nonintrusive physical side channels. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security . ACM, 1626–1638. [13] Matthew Halpern, Yuhao Zhu, and Vijay Janapa Reddi. 2016. Mobile CPU’s rise to power: Quantifying the impact of generational mobile CPU design trends on performance, energy, and user satisfaction. In 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA) . 64–76. [14] Jun Han, Emmanuel Owusu, Le T Nguyen, Adrian

Open access

Elleen Pan, Jingjing Ren, Martina Lindorfer, Christo Wilson and David Choffnes

://www.cgsecurity.org/wiki/PhotoRec . [19] Picas.tech Privacy Policy. http://archive.today/2018.06.14-231220/https://www.picas.tech/privacyandroid.php . (last accessed 06/14/2018). [20] PIL. https://pypi.python.org/pypi/PIL . [21] Prisma Privacy Policy. http://archive.today/2018.06.14-232142/http://prisma-ai.com/privacy.html . (last accessed 06/14/2018). [22] Protocol Buffers. https://developers.google.com/protocol-buffers/ . [23] Scalpel. https://github.com/sleuthkit/scalpel . [24] tcpxtract. http://tcpxtract.sourceforge.net/ . [25] TestFairy Mobile Testing