562 resultados para LATTICE CLUSTER THEORY
Resumo:
The notion of certificateless public-key encryption (CL-PKE) was introduced by Al-Riyami and Paterson in 2003 that avoids the drawbacks of both traditional PKI-based public-key encryption (i.e., establishing public-key infrastructure) and identity-based encryption (i.e., key escrow). So CL-PKE like identity-based encryption is certificate-free, and unlike identity-based encryption is key escrow-free. In this paper, we introduce simple and efficient CCA-secure CL-PKE based on (hierarchical) identity-based encryption. Our construction has both theoretical and practical interests. First, our generic transformation gives a new way of constructing CCA-secure CL-PKE. Second, instantiating our transformation using lattice-based primitives results in a more efficient CCA-secure CL-PKE than its counterpart introduced by Dent in 2008.
Resumo:
In the last years several works have investigated a formal model for Information Retrieval (IR) based on the mathematical formalism underlying quantum theory. These works have mainly exploited geometric and logical–algebraic features of the quantum formalism, for example entanglement, superposition of states, collapse into basis states, lattice relationships. In this poster I present an analogy between a typical IR scenario and the double slit experiment. This experiment exhibits the presence of interference phenomena between events in a quantum system, causing the Kolmogorovian law of total probability to fail. The analogy allows to put forward the routes for the application of quantum probability theory in IR. However, several questions need still to be addressed; they will be the subject of my PhD research
Resumo:
Recently, Portfolio Theory (PT) has been proposed for Information Retrieval. However, under non-trivial conditions PT violates the original Probability Ranking Principle (PRP). In this poster, we shall explore whether PT upholds a different ranking principle based on Quantum Theory, i.e. the Quantum Probability Ranking Principle (QPRP), and examine the relationship between this new model and the new ranking principle. We make a significant contribution to the theoretical development of PT and show that under certain circumstances PT upholds the QPRP, and thus guarantees an optimal ranking according to the QPRP. A practical implication of this finding is that the parameters of PT can be automatically estimated via the QPRP, instead of resorting to extensive parameter tuning.
Resumo:
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
Resumo:
This article reports on a review of selected theory and practice in sports journalism to determine if the prominence of female journalists reporting the news of a major sporting movement, and industry, the Australian Football League (AFL) could be attributed to a feminist response to the traditional domination of male values in the sports media complex. The article reviews selected literature to establish that, on the evidence presented, male values have traditionally dominated the news. It then considers feminist theory and alternative feminist responses to the domination of male values in the newsroom. Consideration is also given to Australian research on the ‘seriousness’ of sports news and its coverage (or lack thereof) of more ‘feminine’ news values including human interest stories, stories about culture and those on serious social issues. Interviews with a select group of female journalists who write about the AFL for The Age newspaper in Melbourne are recounted, with a focus on the journalists’ work experiences. The article concludes by drawing together the research findings to demonstrate that, although feminine news values are represented in only a small proportion of AFL news stories, there is evidence to suggest they are afforded a high degree of presentational prominence which reflects the needs and expectations of a female audience. It shows that female journalists do play a meaningful role in the AFL media and that, given the evidence presented, a feminist response to the traditional domination of male values in the sports media complex could indeed be applicable, and taking place.
Resumo:
In this paper, we seek to operationalize Amartya Sen's concept of human capability to guide a scholarly investigation of student career choice capability. We begin by outlining factors affecting youth labour markets in Australia; a prosperous country that is affected by a ‘two-speed’ national economy. We then examine recent government initiatives that have been designed to combat youth unemployment and cyclical disadvantage by enhancing the aspirations and career knowledge of secondary school students. We argue that these policy measures are based on four assumptions: first, that career choice capability is a problem of individual agency; second, that the dissemination of career information can empower students to act as ‘consumers’ in an unequal job market; third, that agency is simply a question of will; and finally, that school education and career advice – as a means to freedom in the space of career development – is of equal quality, distribution and value to an increasingly diverse range of upper secondary school students. The paper concludes by outlining a conceptual framework capable of informing an empirical research project that aims to test these assumptions by measuring and comparing differences between groups in the range of freedom to achieve and, therefore, to choose.
Resumo:
This project develops and evaluates a model of curriculum design that aims to assist student learning of foundational disciplinary ‘Threshold Concepts’. The project uses phenomenographic action research, cross-institutional peer collaboration and the Variation Theory of Learning to develop and trial the model. Two contrasting disciplines (Physics and Law) and four institutions (two research-intensive and two universities of technology) were involved in the project, to ensure broad applicability of the model across different disciplines and contexts. The Threshold Concepts that were selected for curriculum design attention were measurement uncertainty in Physics and legal reasoning in Law. Threshold Concepts are key disciplinary concepts that are inherently troublesome, transformative and integrative in nature. Once understood, such concepts transform students’ views of the discipline because they enable students to coherently integrate what were previously seen as unrelated aspects of the subject, providing new ways of thinking about it (Meyer & Land 2003, 2005, 2006; Land et al. 2008). However, the integrative and transformative nature of such threshold concepts make them inherently difficult for students to learn, with resulting misunderstandings of concepts being prevalent...
Resumo:
"The focus of this chapter is on context-resonant systems perspectives in career theory and their implications for practice in diverse cultural and contextual settings. For over two decades, the potential of systems theory to offer a context-resonant approach to career development has been acknowledged. Career development theory and practice, however, have been dominated for most of their history by more narrowly defined theories informed by a trait-and-factor tradition of matching the characteristics of individuals to occupations. In contrast, systems theory challenges this parts-in-isolation approach and offers a response that can accommodate the complexity of both the lives of individuals and the world of the 21st century by taking a more holistic approach that considers individuals in context. These differences in theory and practice may be attributed to the underlying philosophies that inform them. For example, the philosophy informing the trait-and-factor theoretical position, logical positivism, places value on: studying individuals in isolation from their environments; content over process; facts over feelings; objectivity over subjectivity; and views individual behavior as observable, measurable, and linear. In practice, this theory base manifests in expert-driven practices founded on the assessment of personal traits such as interests, personality, values, or beliefs which may be matched to particular occupations. The philosophy informing more recent theoretical positions, constructivism, places value on: studying individuals in their contexts; making meaning of experience through the use of subjective narrative accounts; and a belief in the capacity of individuals known as agency. In practice, this theory base manifests in practices founded on collaborative relationships with clients, narrative approaches, and a reduced emphasis on expert-driven linear processes. Thus, the tenets of constructivism which inform the systems perspectives in career theory are context-resonant. Systems theory stresses holism where the interconnectedness of all elements of a system is considered. Systems may be open or closed. Closed systems have no relationship with their external environment whereas open systems interact with their external environment and are open to external influence which is necessary for regeneration. Congruent with general systems theory, the systems perspectives emerging within career theory are based on open systems. Such systems are complex and dynamic and comprise many elements and subsystems which recursively interact with each other as well as with influences from the surrounding environment. As elements of a system should not be considered in isolation, a systems approach is holistic. Patterns of behavior are found in the relationships between the elements of dynamic systems. Because of the multiplicity of relationships within and between elements of subsystems, the possibility of linear causal explanations is reduced. Story is the mechanism through which the relationships and patterns within systems are recounted by individuals. Thus the career guidance practices emanating from theories informed by systems perspectives are inherently narrative in orientation. Narrative career counseling encourages career development to be understood from the subjective perspective of clients. The application of systemic thinking in practice takes greater account of context. In so doing, practices informed by systems theory may facilitate relevance to a diverse client group in diverse settings. In a world that has become increasingly global and diverse it seems that context-resonant systems perspectives in career theory are essential to ensure the future of career development. Translating context-resonant systems perspectives into practice offers important possibilities for methods and approaches that are respectful of diversity."--publisher website
Resumo:
Measuring Earth material behaviour on time scales of millions of years transcends our current capability in the laboratory. We review an alternative path considering multiscale and multiphysics approaches with quantitative structure-property relationships. This approach allows a sound basis to incorporate physical principles such as chemistry, thermodynamics, diffusion and geometry-energy relations into simulations and data assimilation on the vast range of length and time scales encountered in the Earth. We identify key length scales for Earth systems processes and find a substantial scale separation between chemical, hydrous and thermal diffusion. We propose that this allows a simplified two-scale analysis where the outputs from the micro-scale model can be used as inputs for meso-scale simulations, which then in turn becomes the micro-model for the next scale up. We present two fundamental theoretical approaches to link the scales through asymptotic homogenisation from a macroscopic thermodynamic view and percolation renormalisation from a microscopic, statistical mechanics view.
Resumo:
Over the past decade, various paradigm shifts and challenges have rapidly changed learning and teaching in higher education including meeting student expectation for more engaging, more interactive learning experiences, the increased focus in the tertiary sector to deliver content online, and dealing with the complexities of fast-changing technologies. Rising to these challenges and responding to them is a complex and multi-faceted task. This paper discusses a case study undertaken applying a framework drawn from engineering education teaching and learning methods using the concept of academagogy, which is learner-centric, actively empowering students in building effective learning and engages facilitators in meaningful teaching and delivery methods.
Resumo:
The invention of asymmetric encryption back in the seventies was a conceptual leap that vastly increased the expressive power of encryption of the times. For the first time, it allowed the sender of a message to designate the intended recipient in an cryptographic way, expressed as a “public key” that was related to but distinct from the “private key” that, alone, embodied the ability to decrypt. This made large-scale encryption a practical and scalable endeavour, and more than anything else—save the internet itself—led to the advent of electronic commerce as we know and practice it today.
Resumo:
This paper presents ongoing work toward constructing efficient completely non-malleable public-key encryption scheme based on lattices in the standard (common reference string) model. An encryption scheme is completely non-malleable if it requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti proposed two inefficient constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Recently, two efficient public-key encryption schemes have been proposed, both of them are based on pairing identity-based encryption.
Resumo:
This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.
Resumo:
Two lecture notes describe recent developments of evolutionary multi objective optimization (MO) techniques in detail and their advantages and drawbacks compared to traditional deterministic optimisers. The role of Game Strategies (GS), such as Pareto, Nash or Stackelberg games as companions or pre-conditioners of Multi objective Optimizers is presented and discussed on simple mathematical functions in Part I , as well as their implementations on simple aeronautical model optimisation problems on the computer using a friendly design framework in Part II. Real life (robust) design applications dealing with UAVs systems or Civil Aircraft and using the EAs and Game Strategies combined material of Part I & Part II are solved and discussed in Part III providing the designer new compromised solutions useful to digital aircraft design and manufacturing. Many details related to Lectures notes Part I, Part II and Part III can be found by the reader in [68].