289 resultados para Singleton bound


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We study the rates of growth of the regret in online convex optimization. First, we show that a simple extension of the algorithm of Hazan et al eliminates the need for a priori knowledge of the lower bound on the second derivatives of the observed functions. We then provide an algorithm, Adaptive Online Gradient Descent, which interpolates between the results of Zinkevich for linear functions and of Hazan et al for strongly convex functions, achieving intermediate rates between [square root T] and [log T]. Furthermore, we show strong optimality of the algorithm. Finally, we provide an extension of our results to general norms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The requirement of isolated relays is one of the prime obstacles in utilizing sequential slotted cooperative protocols for Vehicular Ad-hoc Networks (VANET). Significant research advancement has taken place to improve the diversity multiplexing trade-off (DMT) of cooperative protocols in conventional mobile networks without much attention on vehicular ad-hoc networks. We have extended the concept of sequential slotted amplify and forward (SAF) protocols in the context of urban vehicular ad-hoc networks. Multiple Input Multiple Output (MIMO) reception is used at relaying vehicular nodes to isolate the relays effectively. The proposed approach adds a pragmatic value to the sequential slotted cooperative protocols while achieving attractive performance gains in urban VANETs. We have analysed the DMT bounds and the outage probabilities of the proposed scheme. The results suggest that the proposed scheme can achieve an optimal DMT similar to the DMT upper bound of the sequential SAF. Furthermore, the outage performance of the proposed scheme outperforms the SAF protocol by 2.5 dB at a target outage probability of 10-4.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Self-gifting consumer behaviour (SGCB) is on the rise as consumers seek reward and therapeutic benefits from their shopping experiences. SGCB is defined as personally symbolic, self-communication through special indulgences, which tend to be premeditated and highly context bound. Prior research into the measurement of this growing behavioural phenomenon has been fragmented because of differences in conceptualisation. This research builds upon the prior literature and through a series of qualitative and quantitative studies, develops a valid, multidimensional measure of SGCB that will be useful for future quantitative inquiry into self-gifting consumption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

So far, low probability differentials for the key schedule of block ciphers have been used as a straightforward proof of security against related-key differential analysis. To achieve resistance, it is believed that for cipher with k-bit key it suffices the upper bound on the probability to be 2− k . Surprisingly, we show that this reasonable assumption is incorrect, and the probability should be (much) lower than 2− k . Our counter example is a related-key differential analysis of the well established block cipher CLEFIA-128. We show that although the key schedule of CLEFIA-128 prevents differentials with a probability higher than 2− 128, the linear part of the key schedule that produces the round keys, and the Feistel structure of the cipher, allow to exploit particularly chosen differentials with a probability as low as 2− 128. CLEFIA-128 has 214 such differentials, which translate to 214 pairs of weak keys. The probability of each differential is too low, but the weak keys have a special structure which allows with a divide-and-conquer approach to gain an advantage of 27 over generic analysis. We exploit the advantage and give a membership test for the weak-key class and provide analysis of the hashing modes. The proposed analysis has been tested with computer experiments on small-scale variants of CLEFIA-128. Our results do not threaten the practical use of CLEFIA.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Knowledge of the pollutant build-up process is a key requirement for developing stormwater pollution mitigation strategies. In this context, process variability is a concept which needs to be understood in-depth. Analysis of particulate build-up on three road surfaces in an urban catchment confirmed that particles <150µm and >150µm have characteristically different build-up patterns, and these patterns are consistent over different field conditions. Three theoretical build-up patterns were developed based on the size-fractionated particulate build-up patterns, and these patterns explain the variability in particle behavior and the variation in particle-bound pollutant load and composition over the antecedent dry period. Behavioral variability of particles <150µm was found to exert the most significant influence on the build-up process variability. As characterization of process variability is particularly important in stormwater quality modeling, it is recommended that the influence of behavioral variability of particles <150µm on pollutant build-up should be specifically addressed. This would eliminate model deficiencies in the replication of the build-up process and facilitate the accounting of the inherent process uncertainty, and thereby enhance the water quality predictions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

"World Architecture records the major architectural contributions made in all regions of the world to the development of human culture. Grouped into 10 geographical regions and representing five twenty-year-periods, the buildings have been selected by approximately 80 eminent international architectural critics. Each volume contains 100 buildings from one particular region, each object accompanied by an analytical text as well as by drawings and photographs. Introduction essays by the general editor, Kenneth Frampton, and the editor(s) of each volume complete the survey. The series comprises 10 volumes. The books are handsome, linen-bound and stitched, generously formatted (21,5 x 28,5 cm/8,4 x 11 inches) and contain approx. 300 pages and 400 colour prints each. This unique project gives the most precise and authoritative description of 1000 of the century's most notable buildings. Countries: Brunei, Burma, Cambodia, Indonesia, Laos, Malaysia, The Philippines, Singapore, Thailand, Vietnam and Australia, New Zealand, Papua New Guinea, and Oceania."

Relevância:

10.00% 10.00%

Publicador:

Resumo:

IgA is an important mucosal antibody that can neutralize mucosal pathogens by either preventing attachment to epithelia (immune exclusion) or alternatively inhibit intraepithelial replication following transcytosis by the polymeric immunoglobulin receptor (pIgR). Chlamydia trachomatis is a major human pathogen that initially targets the endocervical or urethral epithelium in women and men, respectively. As both tissues contain abundant SIgA we assessed the protection afforded by IgA targeting different chlamydial antigens expressed during the extra and intraepithelial stages of infection. We developed an in vitro model utilizing polarizing cells expressing the murine pIgR together with antigen-specific mouse IgA, and an in vivo model utilizing pIgR-/- mice. SIgA targeting the extraepithelial chlamydial antigen, the major outer membrane protein (MOMP), significantly reduced infection in vitro by 24 % and in vivo by 44 %. Conversely, pIgR-mediated delivery of IgA targeting the intraepithelial inclusion membrane protein A (IncA) bound to the inclusion but did not reduce infection in vitro or in vivo. Similarly, intraepithelial IgA targeting the secreted protease Chlamydia protease-like activity factor (CPAF) also failed to reduce infection. Together, these data suggest the importance of pIgR-mediated delivery of IgA targeting extra but not intraepithelial chlamydial antigens for protection against a genital tract infection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dragline Swing to Dump Automation By Peter Corke, CSIRO Manufacturing Technology/CRC for Mining Technology and Equipment (CMTE) Peter Corke presented a case study of a project to automate the dragline swing to dump operation. The project is funded by ACARP, BHP Coal, Pacific Coal and the CMTE and is being carried out on a dragline at Pacific Coal's Meandu mine near Brisbane. Corke began by highlighting that the minerals industry makes extensive use of large, mechanised machines. However, unlike other industries, mining has not adopted automation and most machines are controlled by human operators on board the machine itself. Choosing an automation target The dragline automation was chosen because: ò draglines are one of the biggest capital assets in a mine; ò performance between operators vary significantly, so improved capital utilisation is possible; ò the dragline is often the bottleneck in production; ò a large part of the operation cycle is spent swinging from dig to dump; and ò it is technically feasible. There has been a history of drag line automation projects, none with great success.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A significant media city globally , Sydney is the production and design centre for the Australian media system and a subsidiary node of larger international systems principally headquartered in Los Angeles and London. Its media cluster is undergoing transformations to improve its position internationally by increasing capabilities and ties to other Australian and international production clusters. Sydney’s media cluster is a collection of suburbs forming an “arc” along major transport corridors stretching from Macquarie Park in the north to Sydney airport in the south. As a dispersed rather than tightly bound cluster, it is defined by the functional proximity provided by automobile and telecommunication networks Sydney’s media cluster is considered here along two dimensions—that of Sydney’s place within the ecology of Australian and international media and that of its internal organization within the geographical space of metropolitan Sydney. The first examines Sydney’s media cluster at the level of the metropolitan area of Sydney within its state, national and international contexts; while the second digs below this level to explore its working out in urban space.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, Bree Hadley discusses The Ex/centric Fixations Project, a practice-led research project which explores the inadequacy of language as a technology for expressing human experiences of difference, discrimination or marginalisation within mainstream cultures. The project asks questions about the way experience, memory and the public discourses available to express them are bound together, about the silences, failures and falsehoods embedded in any effort to convey human experience via public discourses, and about how these failures might form the basis of a performative writing method. It has, to date, focused on developing a method that expresses experience through improvised, intertextual and discontinous collages of language drawn from a variety of public discourses. Aesthetically, this method works with what Hans Theis Lehmann (Postdramatic Theatre p. 17) calls a “textual variant” of the postdramatic “in which language appears not as the speech of characters – if there are still definable characters at all – but as an autonomous theatricality” (Ibid. 18). It is defined by what Lehmann, following Julia Kristeva, calls a “polylogue”, which presents experience as a conflicted, discontinuous and circular phenomenon, akin to a musical fugue, to break away from “an order centred on one logos” (Ibid. 32). The texts function simultaneously as a series of parts, and as wholes, interwoven voices seeming almost to connect, almost to respond to each other, and almost to tell – or challenging each other’s telling – of a story. In this paper, Hadley offers a performative demonstration, together with descriptions of the way spectators respond, including the way their playful, polyvocal texture impacts on engagement, and the way the presence or non-presence of performing bodies to which the experiences depicted can be attached impacts on engagement. She suggests that the improvised, intertextual and experimental enactments of self embodied in the texts encourage spectators to engage at an emotional level, and make-meaning based primarily on memories they recall in the moment, and thus has the potential to counter the risk that people may read depictions of experiences radically different from their own in reductive, essentialised ways.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In making this submission, we suggest that Australia learn from the experiences of other jurisdictions, and avoid some of the mistakes that have been made. In particular, this involves: * Ensuring that adequate information is available to evaluate the success of the scheme * Ensuring that notices sent to consumers provide full and accurate information that helps them understand their rights and options * Limiting the potential abuse of the system, and particularly attempts to intimidate consumers into paying unfair penalties through ‘speculative invoicing’ * Avoiding the potential for actual or perceived bias in the scheme’s oversight body

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The efficient computation of matrix function vector products has become an important area of research in recent times, driven in particular by two important applications: the numerical solution of fractional partial differential equations and the integration of large systems of ordinary differential equations. In this work we consider a problem that combines these two applications, in the form of a numerical solution algorithm for fractional reaction diffusion equations that after spatial discretisation, is advanced in time using the exponential Euler method. We focus on the efficient implementation of the algorithm on Graphics Processing Units (GPU), as we wish to make use of the increased computational power available with this hardware. We compute the matrix function vector products using the contour integration method in [N. Hale, N. Higham, and L. Trefethen. Computing Aα, log(A), and related matrix functions by contour integrals. SIAM J. Numer. Anal., 46(5):2505–2523, 2008]. Multiple levels of preconditioning are applied to reduce the GPU memory footprint and to further accelerate convergence. We also derive an error bound for the convergence of the contour integral method that allows us to pre-determine the appropriate number of quadrature points. Results are presented that demonstrate the effectiveness of the method for large two-dimensional problems, showing a speedup of more than an order of magnitude compared to a CPU-only implementation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Canonical single-stranded DNA-binding proteins (SSBs) from the oligosaccharide/oligonucleotide-binding (OB) domain family are present in all known organisms and are critical for DNA replication, recombination and repair. The SSB from the hyperthermophilic crenarchaeote Sulfolobus solfataricus (SsoSSB) has a ‘simple’ domain organization consisting of a single DNA-binding OB fold coupled to a flexible C-terminal tail, in contrast with other SSBs in this family that incorporate up to four OB domains. Despite the large differences in the domain organization within the SSB family, the structure of the OB domain is remarkably similar all cellular life forms. However, there are significant differences in the molecular mechanism of ssDNA binding. We have determined the structure of the SsoSSB OB domain bound to ssDNA by NMR spectroscopy. We reveal that ssDNA recognition is modulated by base-stacking of three key aromatic residues, in contrast with the OB domains of human RPA and the recently discovered human homologue of SsoSSB, hSSB1. We also demonstrate that SsoSSB binds ssDNA with a footprint of five bases and with a defined binding polarity. These data elucidate the structural basis of DNA binding and shed light on the molecular mechanism by which these ‘simple’ SSBs interact with ssDNA.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

EphB4 is a membrane-bound receptor tyrosine kinase (RTK) commonly over-produced by many epithelial cancers but with low to no expression in most normal adult tissues. EphB4 over-production promotes ligand-independent signaling pathways that increase cancer cell viability and stimulate migration and invasion. Several studies have shown that normal ligand-dependent signaling is tumour suppressive and therefore novel therapeutics which block the tumour promoting ligand-independent signaling and/or stimulate tumour suppressive ligand-dependent signaling will find application in the treatment of cancer. An EphB4-specific polyclonal antibody, targeting a region of 200 amino acids in the extracellular portion of EphB4, showed potent in vitro anti-cancer effects measured by an increase in apoptosis and a decrease in anchorage independent growth. Peptide exclusion was used to identify the epitope targeted by this antibody within the cysteine-rich region of the EphB4 protein, a sequence defined as a potential ligand interacting interface. Addition of antibody to cancer cells resulted in phosphorylation and subsequent degradation of the EphB4 protein, suggesting a mechanism that is ligand mimetic and tumour suppressive. A monoclonal antibody which specifically targets this identified extracellular epitope of EphB4 significantly reduced breast cancer xenograft growth in vivo confirming that EphB4 is a useful target for ligand-mimicking antibody-based anti-cancer therapies.