42 resultados para General Information Theory
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
The notion of identity-based IB cryptography was proposed by Shamir [177] as a specialization of public key PK cryptography which dispensed with the need for cumbersome directories, certificates, and revocation lists.
Resumo:
We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different collision and near-collision attacks on the compression function. The first attack uses differences in the chaining values and the block counter and finds collisions with complexity 233. The second attack utilizes differences in the chaining values and salt and yields collisions with complexity 242. The final attack uses differences only in the chaining values to yield near-collisions with complexity 299. All our attacks are independent of the number of rounds in the compression function. We illustrate the first two attacks by showing examples of collisions and near-collisions.
Resumo:
We discuss algorithms for combining sequential prediction strategies, a task which can be viewed as a natural generalisation of the concept of universal coding. We describe a graphical language based on Hidden Markov Models for defining prediction strategies, and we provide both existing and new models as examples. The models include efficient, parameterless models for switching between the input strategies over time, including a model for the case where switches tend to occur in clusters, and finally a new model for the scenario where the prediction strategies have a known relationship, and where jumps are typically between strongly related ones. This last model is relevant for coding time series data where parameter drift is expected. As theoretical contributions we introduce an interpolation construction that is useful in the development and analysis of new algorithms, and we establish a new sophisticated lemma for analysing the individual sequence regret of parameterised models.
Resumo:
In traditional communication and information theory, noise is the demon Other, an unwelcome disruption in the passage of information. Noise is "anything that is added to the signal between its transmission and reception that is not intended by the source...anything that makes the intended signal harder to decode accurately". It is in Michel Serres' formulation, the "third man" in dialogue who is always assumed, and whom interlocutors continually struggle to exclude. Noise is simultaneously a condition and a by-product of the act of communication, it represents the ever present possibility of disruption, interruption, misunderstanding. In sonic or musical terms noise is cacophony, dissonance. For economists, noise is an arbitrary element, both a barrier to the pursuit of wealth and a basis for speculation. For Mick (Jeremy Sims) and his mate Kev (Ben Mendelsohn) in David Caesar's Idiot Box (1996), as for Hando (Russell Crowe) and his gang of skinheads in Geoffrey Wright's Romper Stomper (1992), or Dazey (Ben Mendelsohn) and Joe (Aden Young) in Wright's Metal Skin (1994) and all those like them starved of (useful) information and excluded from the circuit - the information poor - their only option, their only point of intervention in the loop, is to make noise, to disrupt, to discomfort, to become Serres' "third man", "the prosopopoeia of noise" (5).
Resumo:
This discussion paper is intended to provide background material for the workshop organised by Queensland University Technology (QUT) on 17 October 2014. The overall purpose of the workshop is to better understand the relationship between the precautionary principle and endangered species management in Australia. In particular, we are looking for real life examples (or hypotheticals) of where the principle is (or is not) being applied in relation to Australia’s endangered species. A wide variety of participants have been invited to the workshop including scientists, representatives of NGOs, lawyers and academics. Whilst some very general information is outlined below, we encourage all participants to bring their own thoughts on how the precautionary principle should operate and to reflect on examples of where you have seen it work (or not work) in Australia. The sharing of your own case studies is thus encouraged.
Resumo:
The anterior temporal lobes (ATLs) have been proposed to serve as a "hub" linking amodal or domain general information about the meaning of words, objects, facts and people distributed throughout the brain in semantic memory. The two primary sources of evidence supporting this proposal, viz. structural imaging studies in semantic dementia (SD) patients and functional imaging investigations, are not without problems. Similarly, knowledge about the anatomo-functional connectivity of semantic memory is limited to a handful of intra-operative electrocortical stimulation (IES) investigations in patients. Here, using principal components analyses (PCA) of a battery of conceptual and non-conceptual tests coupled with voxel based morphometry (VBM) and diffusion tensor imaging (DTI) in a sample of healthy older adults aged 55-85. years, we show that amodal semantic memory relies on a predominantly left lateralised network of grey matter regions involving the ATL, posterior temporal and posterior inferior parietal lobes, with prominent involvement of the left inferior fronto-occipital fasciculus (IFOF) and uncinate fasciculus fibre pathways. These results demonstrate relationships between semantic memory, brain structure and connectivity essential for human communication and cognition.
Resumo:
Broad knowledge is required when a business process is modeled by a business analyst. We argue that existing Business Process Management methodologies do not consider business goals at the appropriate level. In this paper we present an approach to integrate business goals and business process models. We design a Business Goal Ontology for modeling business goals. Furthermore, we devise a modeling pattern for linking the goals to process models and show how the ontology can be used in query answering. In this way, we integrate the intentional perspective into our business process ontology framework, enriching the process description and enabling new types of business process analysis. © 2008 IEEE.
Resumo:
Legal translation theory brooks little interference with the source legal text. With few exceptions (Joseph 2005; Hammel 2008; Harvey 2002; Kahaner 2005; Kasirer 2001; Lawson 2006), lawyers and linguists tend to tether themselves to the pole of literalism. More a tight elastic band than an unyielding rope, this tether constrains — rather than prohibits — liberal legal translations. It can stretch to accommodate a degree of freedom by the legal translator however, should it go too far, it snaps back to the default position of linguistic fidelity. This ‘stretch and snap’ gives legal translation a unique place in general translation theory. In the general debate over the ‘degree of freedom’ the translator enjoys in conveying the meaning of the text, legal translation theory has reached its own settlement. Passivity is the default; creativity, the ‘qualified’ exception (Hammel 2008: 275).
Resumo:
Individual and/or co-offenders fraudulent activities can have a devastating effect on a company’s reputation and credibility. Enron, Xerox, WorldCom, HIH Insurance and One.Tel are examples where stakeholders incurred substantial financial losses as a result of fraud and led to a loss of confidence in corporate dealings by the public in general. There are numerous theoretical approaches that attempt to explain how and why fraudulent acts occur, drawing on the fields of sociology, organisational, management and economic literature, but there is limited empirical evidence published in accounting literature. This qualitative inductive study analyses perceptions and experiences of forensic accountants to gain insights into individual fraud and co-offending in order to determine whether the conceptual framework developed from literature accurately depicts the causes of fraud committed by individuals and groups in the twenty-first century. Findings from the study both support and extend the conceptual framework, demonstrating that strain and anomie can result in fraud, that deviant sub-groups recruit and coerce members by providing relief from strain, and that inadequate corporate governance mechanisms both contribute to fraud occurring, and provide the opportunity for fraudulent activities to be executed and often remain undetected. Additional factors emerging from this study (the ‘technoconomy’, addiction and IT measures) were also identified as contributors to fraud, particularly relevant to the twenty-first century, and consequently, a refined conceptual framework is presented in the discussion and conclusion to the paper.
Resumo:
Detection and prevention of global network satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill three gaps in the literature: first, to assess in detail the exact nature of threat scenarios posed by spoofing against the most commonly cited targets; second, to investigate the many practical impediments, often underplayed, to carrying out GNSS spoofing attacks in the field; and third, to survey and assess the effectiveness of a wide range of proposed defences against GNSS spoofing. Our conclusion lists promising areas of future research.