منابع مشابه
Relaxed Authenticity
In-network data aggregation allows energy-efficient communication within a sensor network. However, such data aggregation introduces new security challenges. As sensor nodes are prone to node-compromise, a fraction of nodes might act maliciously and forge aggregated data. For arbitrary aggregation functions, the verification of authenticity of aggregated data, i.e., its correctness, integrity, ...
متن کاملQuestioning Representations
The role of models in the design of computer systems to support interpersonal and cooperative work is examined. It is argued that the current generation of models over-emphasise determinism at the expense of interpretation in the work process. It is further argued that there are many cases in which designs pass between many different professional groups (office workers, managers, analysts, desi...
متن کاملQuestioning Mashups
Mashups have been defined in earlier development stages of the web. Their main motivation is to build new services from existing resources. This principle is still productive. Assumptions on what mashups take in, which interfaces and services they provide and where they are networked need an overhaul. Focusing on a reuse of resources exploiting all their affordances while opening wider ranges f...
متن کاملThe Concept of Authenticity
The concept of authenticity -the idea of `being oneself' or being `true to oneself' -is central to modern moral thought. Yet it is a puzzling notion. This article discusses two accounts of it. Essentialism holds that each individual has a `true' nature or self. Feelings and actions are authentic when they correspond to this nature. This approach is contrasted with views of the self as a complex...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: National Identities
سال: 2006
ISSN: 1460-8944,1469-9907
DOI: 10.1080/14608940600842607