| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910459672003321 |
|
|
Titolo |
Subsanar las desigualdades en una generación [[electronic resource] ] : alcanzar la equidad sanitaria actuando sobre los determinantes sociales de la salud : informe final de la Comisión sobre Determinantes Sociales de la Salud |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Geneva, Switzerland, : World Health Organization, Comisión sobre Determinantes Sociales de la Salud, 2009 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-282-76095-5 |
9786612760952 |
92-4-068529-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (256 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
World health |
Health care rationing |
Medical care - Needs assessment |
Social medicine |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Índice; Agradecimientos; RESUMEN ANALÍTICO; PARTE 1. SITUACIÓN ACTUAL: NECESIDAD DE UN MOVIMIENTO MUNDIALPARA LA EQUIDAD SANITARIA; Capítulo 1: Comisión sobre determinantes sociales de la salud: un nuevo programa de acción mundial; Capítulo 2: Inequidad sanitaria mundial: necesidad de acción; Capítulo 3: Causas y soluciones; PARTE 2. DATOS CIENTÍFICOS, ACCIONES Y ACTORES; Capítulo 4: Las características de los datos científicos y las acciones; PARTE 3. CONDICIONES DE VIDA; Capítulo 5: Equidad desde el principio; Capítulo 6: Entornos salubres para una población sana |
Capítulo 7: Prácticas justas en materia de empleo y trabajo dignoCapítulo 8: Protección social a lo largo de la vida; Capítulo 9: Atención universal de salud; PARTE 4. EL PODER, EL DINERO Y LOS RECURSOS; Capítulo 10: La equidad sanitaria en las políticas, sistemas y programas; Capítulo 11: Financiación equitativa; Capítulo 12: |
|
|
|
|
|
|
|
|
|
|
|
Responsabilidad del mercado; Capítulo 13: Equidad de género; Capítulo 14: Emancipación política: integración y posibilidad de expresarse; Capítulo 15: Una gobernanza mundial eficaz; PARTE 5. CONOCIMIENTOS, SEGUIMIENTO Y CAPACIDAD: LA ESPINA DORSAL DE LA ACCIÓN |
Capítulo 16: Los determinantes sociales de la salud: seguimiento, investigación y formaciónPARTE 6. CREACIÓN DE UN MOVIMIENTO MUNDIAL; Capítulo 17: Intervenciones basadas en la labor de la Comisión sobre Determinantes Sociales de la Salud; APÉNDICE A: LISTA DE TODAS LAS RECOMENDACIONES; LOS MIEMBROS DE LA COMISIÓN; REFERENCIAS BIBLIOGRÁFICAS; SIGLAS; LISTA DE RECUADROS, FIGURAS Y TABLAS; ÍNDICE POR TEMAS |
|
|
|
|
|
|
Sommario/riassunto |
|
"" Para la Comisi n sobre Determinantes Sociales de la Salud, reducir las desigualdades en materia de salud es un imperativo tico. La injustita social est acabando con la vida de much simas personas."" El informe final de la Comisi n sobre Determinantes Sociales de la Salud identifica aspectos cruciales de las condiciones de vida cotidianas y de los factores estructurales subyacentes que las influencian, sobre los que es preciso actuar. El informe proporciona un an lisis de los determinantes sociales de la salud y ejemplos concretos de tipos de medidas que han demostrado su eficacia para mejor |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910983297203321 |
|
|
Autore |
Cai Zhipeng |
|
|
Titolo |
Wireless Artificial Intelligent Computing Systems and Applications : 18th International Conference, WASA 2024, Qindao, China, June 21–23, 2024, Proceedings, Part II / / edited by Zhipeng Cai, Daniel Takabi, Shaoyong Guo, Yifei Zou |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (558 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 14998 |
|
|
|
|
|
|
Altri autori (Persone) |
|
TakabiDaniel |
GuoShaoyong |
ZouYifei |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Wireless communication systems |
Mobile communication systems |
Artificial intelligence |
Application software |
Computers |
Computer networks |
Wireless and Mobile Communication |
Artificial Intelligence |
Computer and Information Systems Applications |
Computing Milieux |
Computer Communication Networks |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
-- FedMQ: Multi-grained Quantization for Heterogeneous Federated Learning. -- A Secure and Efficient Privacy Data Aggregation Mechanism. -- A Lightweight Method to Survey with Protecting Privacy yet Maintaining Accuracy. -- A Method for Abnormal Detection and Poisoned Data Recovery in Clustered Federated Learning. -- FedDAGC: Dynamic Adaptive Graph Coarsening for Federated Learning on Non-IID Graphs. -- Defending Against Poisoning Attacks in Federated |
|
|
|
|
|
|
|
|
|
|
|
Prototype Learning on Non-IID Data. -- Federated Learning for Edge Heterogeneous Object Detection Algorithm. -- CoR-FHD: Communication-Efficient and Robust Federated Hyperdimensional Computing for Activity Recognition. -- Dynamic Staleness Control for Asynchronous Federated Learning in Decentralized Topology. -- Fair and Communication-Efficient Personalized Federated Learning. -- Distributed & Personalized Federated Learning in Wireless Ad Hoc Networks. -- DS-TFP: A Distributed and Secure Traffic Flow Prediction Framework Based on Federated Graph Learning. -- Federated Dynamic Graph Fusion Framework for Remaining Useful Life Prediction. -- FEAttack: A Fast and Efficient Hard-Label Textual Attack Framework. -- Pleno-Sense: An Adaptive Switching Algorithm towards Robust Respiration Monitoring Across Diverse Motion Scenarios. -- Inter-Technology Backscatter Communication: A Bidirectional Zigbee-BLE System. -- Distributed Dynamic Virtual Network Embedding in Container Networks. -- Automatic Modulation Recognition Using Parallel Feature Extraction Architecture. -- A Message Routing Algorithm Based on the Importance of Node Social Relationships in Opportunistic Mobile Networks. -- Real-time Atmospheric Duct Height Prediction Framework Based on Spatio-temporal to Ensure Maritime Communication Security. -- An Extra Diagnosis Algorithm for Conditional Recursive Match Networks under the PMC Model. -- Personalized mmWave Signal Synthesis for Human Sensing. -- Remorabook: Privacy-Preserving Mobile Social Networking Based on Remora Computing. -- DSBA: Dynamic Sharded Blockchain Architecture for Industrial Emergency Data Sharing. -- A Novel Merging Framework for Homogeneous and Heterogeneous Blockchain Systems. -- Active Defense Simulation Evaluation of Industrial Control Systems Based on Attack-Defense Graph. -- Hybrid Heterogeneous Wireless Chargers Placement. -- An Efficient Fault-tolerant Communication Scheme in 3-ary n-cube Networks. -- 3D Physical Layer Secure Transmission for UAV-assisted Mobile Communications without Locations of Eavesdroppers. -- Adaptive Self-healing Routing for Heterogeneous Ambient Backscatter Wireless Sensor Networks. -- Joint Optimization of Maximum Achievable Rate in SWIPT Systems Assisted by Active STAR-RIS. -- Anonymity on Byzantine-Resilient Decentralized Computing. -- A DRL-Based Edge Intelligent Servo Control with Semi-Closed-Loop Feedbacks in Industrial IoT. -- Anomaly Detection under Normality-Shifted IoT Scenario: Filter, Detection, and Adaption. -- DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification. -- Multiscale Adversarial Domain Adaptation Approach for Cloud-Edge Collaborative Fault Diagnosis of Industrial Equipment. -- Detection and Localization of Malicious Nodes in Internet of Things Based on SDN. -- Enhancing Scalability: A Complete Tree Sharding Architecture towards IoT. -- A Cloud-Edge Integrated Water Body Extraction Using Superpixel Segmentation. -- Layer-Aware Microservice Deployment for Edge Computing with Service Reliability Provisioning. -- FusionFlow: Neural Fusion and Compression for Communication Efficient Edge-Cloud Collaborative Computing. -- Toward Low Overhead and Real-time Multi-vehicle Collaborative Perception via V2V Communication. |
|
|
|
|
|
|
Sommario/riassunto |
|
The three-volume proceedings set LNCS 14997-14999 constitutes the refereed proceedings of the 18th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2024, held in Qindao, China, during June 21–23, 2024. The 98 full papers and 10 short papers included in these proceedings were carefully reviewed and selected from 301 submissions. They focus on cutting-edge ideas, research findings, and innovative solutions in the dynamic intersection |
|
|
|
|
|
|
|
|
|
|
|
|
|
of wireless technologies and artificial intelligence (AI) computing systems. |
|
|
|
|
|
|
3. |
Record Nr. |
UNISA996673179203316 |
|
|
Autore |
Törngren Martin |
|
|
Titolo |
Computer Safety, Reliability, and Security. SAFECOMP 2025 Workshops : CoC3CPS, DECSoS, SASSUR, SENSEI, SRToITS, and WAISE, Stockholm, Sweden, September 9, 2025, Proceedings / / edited by Martin Törngren, Barbara Gallina, Erwin Schoitsch, Elena Troubitsyna, Friedemann Bitsch |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2026.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (808 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 15955 |
|
|
|
|
|
|
Altri autori (Persone) |
|
GallinaBarbara |
SchoitschErwin |
TroubitsynaElena |
BitschFriedemann |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks |
Image processing - Digital techniques |
Computer vision |
Information technology - Management |
Software engineering |
Computer science |
Data protection |
Computer Communication Networks |
Computer Imaging, Vision, Pattern Recognition and Graphics |
Computer Application in Administrative Data Processing |
Software Engineering |
Theory of Computation |
Security Services |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
Nota di contenuto |
|
-- 1st International Workshop on Co-Design of Communication, Computing, and Control in Cyber-Physical Systems (CoC3CPS 2025). -- An end-to-end testbed for communication, compute, and control co-design: the Kista Innovation Park. -- Real-Time Control Selection over the Computing Continuum. -- Temporal Intent-Aware Multi-Agent Learning for Network Optimization. -- 20th International Workshop on Dependable Smart Cyber-Physical Systems and Systems-of-Systems (DECSoS 2025). -- Dependable AI Inference - A work-in-progress on CPU, Co-Processor and FPGA Approaches. -- Methodology for Test Case Allocation based on a Formalized ODD. -- Safety-Aware Strategy Synthesis for Autonomous System of Systems with UPPAAL. -- From Bouncing Break-ins to Frictional Firewalls: Interacting Requirements for Vehicle Safety and Security. -- A ThreatGet-Based Framework for Aligning System Security with the Cyber Resilience Act. -- i7Fuzzer: Neural-Guided Fuzzing for Enhancing Security Testing of Stateful Protocols. -- HyLLM-IDS: A Conceptual Hybrid LLM-Assisted Intrusion Detection Framework for Cyber-Physical Systems. -- PROTECTION: Provably Robust Intrusion Detection system for IoT through recursive Delegation. -- Towards Credible Simulators: A Validation Methodology for Safety-Critical Virtual Testing. -- Cybersecurity in Partitioned Space Embedded Systems. -- 12th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2025). -- A GSN-Based Requirement Analysis of the EU AI Regulation. -- A Safety Argument Fragment Towards Safe Deployment of Performant Automated Driving Systems. -- Certus: A domain specific language for confidence assessment in assurance cases. -- Doubt in Safety Claims is Inevitable: What is its Impact, and How to Deal with it?. -- Ensuring Information Security in Inclusive Digital Environments. -- Functional Safety with Model-Based Safety Analysis: A Perspective from ARP4761A. -- High-Performance AI Inference for Agile Deployment on Space-Qualified Processors: A Performance Benchmarking Study. -- SCALOFT: An Initial Approach for Situation Coverage-Based Safety Analysis of an Autonomous Aerial Drone in a Mine. -- 4th International Workshop on Safety-Security Interaction (SENSEI 2025). -- Trick or Treat: A Study of Human Detection of Manipulative Tactics in Phishing Emails. -- Rational Verification in Repeated Security Games. -- Quantitative Assessment of Energy Efficiency, Comfort, and Safety in an Intelligent Heating System Under False Data. -- Cyber-Safety Assessment of Wind Turbines: A Reachability Analysis Approach Against Cyber-Attacks. -- 2nd International Workshop on Safety/Reliability/Trustworthiness of Intelligent Transportation Systems (SRToITS 2025). -- Scenario Hazard Prevention for Autonomous Driving Based on Improved STPA. -- Alexandru Forrai. Systematic test scenario generation and risk assessment for automated driving system. -- AV-SLAF: A Scenario-Layered Framework for Safety Analysis of Autonomous Vehicles Based on STPA and CTA. -- Applying Machine Learning towards the Recognition of Driving Behavior. -- External Human-Machine Interaction Design Principles and Supporting Technologies for Autonomous Vehicles. -- Formal Analysis of Resilience in Transport Systems with Bigraphs. -- Vehicle-Level Safety Validation of AD/ADAS Systems via Extreme Value Analysis. -- 8th International Workshop on Artificial Intelligence Safety Engineering (WAISE 2025). -- A Modular AI Testing Framework for Trustworthy AI: Proof-of-Concept Implementation. -- Architectural Mitigation of Control AI Risk Factors for Safe Human-Robot-Collaboration. -- Uncovering Unsafe Feature Interactions in Vehicle Control Using Generative AI and Digital Twins. -- AURORA Networks: Auto-associative Universal Real-time Outlier |
|
|
|
|
|
|
|
|
|
|
|
Risk Assessment Networks. -- Does not impute! Performance and ethical implications of missing data for an AI-based diabetes co-morbidity predictor. -- Facilitating Fault Tree Analysis with Generative AI. -- Efficient Safety Retrofitting Against Jailbreaking for LLMs. -- Risk Analysis of One-Pixel Image Defects in Safety-Critical Deep Neural Networks. -- Safe Adversarial Control Through Interaction. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the proceedings of the Workshops held in conjunction with the 44th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2025, which took place in Stockholm, Sweden, during September 2025. The 43 papers included in this book were carefully reviewed and selected from a total of 61 submissions to the following six workshops: · CoC3CPS 2025, Co-Design of Communication, Computing and Control in Cyber-Physical Systems · DECSoS 2025 – 20th Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems · SASSUR 2025 - 12th International Workshop on Next Generation of System Assurance Approaches for Critical Systems · SENSEI 2025 – 4th International Workshop on Safety and Security Interaction · SRToITS 2025 – 2nd International Workshop on Safety/Reliability/Trustworthiness of Intelligent Transportation Systems · WAISE 2025 – 8th International Workshop on Artificial Intelligence Safety Engineering. |
|
|
|
|
|
|
|
| |