91 resultados para Lattice gauge theories
Resumo:
Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo the fundamental parallelepiped of a secret basis (like GGH [9], or NTRUSign [12]). This approach leaked some information on the secret, namely the shape of the parallelepiped, which has been exploited on practical attacks [24]. NTRUSign was an extremely efficient scheme, and thus there has been a noticeable interest on developing countermeasures to the attacks, but with little success [6]. In [8] Gentry, Peikert and Vaikuntanathan proposed a randomized version of Babai’s nearest plane algorithm such that the distribution of a reduced vector modulo a secret parallelepiped only depended on the size of the base used. Using this algorithm and generating large, close to uniform, public keys they managed to get provably secure GGH-like lattice-based signatures. Recently, Stehlé and Steinfeld obtained a provably secure scheme very close to NTRUSign [26] (from a theoretical point of view). In this paper we present an alternative approach to seal the leak of NTRUSign. Instead of modifying the lattices and algorithms used, we do a classic leaky NTRUSign signature and hide it with gaussian noise using techniques present in Lyubashevky’s signatures. Our main contributions are thus a set of strong NTRUSign parameters, obtained by taking into account latest known attacks against the scheme, a statistical way to hide the leaky NTRU signature so that this particular instantiation of CVP-based signature scheme becomes zero-knowledge and secure against forgeries, based on the worst-case hardness of the O~(N1.5)-Shortest Independent Vector Problem over NTRU lattices. Finally, we give a set of concrete parameters to gauge the efficiency of the obtained signature scheme.
Resumo:
Legal Theories: Contexts and Practices presents legal theory as a living and evolving entity. The reader is brought into its story as an active participant who is challenged to think about where they sit within the history and traditions of legal theory and jurisprudence. This second edition explores how lawyers and the courts adopt theoretical and jurisprudential positions and how they are influenced by the historical, social, cultural, and legal conditions characteristic of the time in which they live. It considers how legal theories, too, are influenced by those conditions, and how these combined forces influence and continue to affect contemporary legal thinking and legal interpretation.
Resumo:
Research on implicit person theories shows that beliefs about the malleability of human attributes have important implications for social cognition, interpersonal behavior, and intergroup relations. We argue that these implications can be understood within the framework of psychological essentialism, which extends work on implicit theories in promising directions. We review evidence that immutability beliefs covary with a broader set of essentialist beliefs, and that these essentialist beliefs are associated with stereotyping and prejudice. We then present recent studies indicating that associations between implicit person theories and stereotyping may be explained in terms of essentialist beliefs, implying a significant role for these beliefs in the psychology of group perception. Finally, we propose ways in which research and theory on essentialist beliefs might clarify and advance research on implicit person theories.
Resumo:
Study/Objective This research examines the types of emergency messages used in Australia during the response and early recovery phases of a natural disaster. The aim of the research is to develop theory-driven emergency messages that increase individual behavioural compliance during a disaster. Background There is growing evidence of non-compliant behaviour in Australia, such as refusing to evacuate and travelling through hazardous areas. This can result in personal injury, loss of life, and damage to (or loss of) property. Moreover, non-compliance can place emergency services personnel in life-threatening situations when trying to save non-compliant individuals. Drawing on message compliance research in psychology and sociology, a taxonomy of message types was developed to ascertain how emergency messaging can be improved to produce compliant behaviour. Method A review of message compliance literature was conducted to develop the taxonomy of message types previously found to achieve compliance. Seven categories were identified: direct-rational, manipulation, negative phrasing, positive phrasing, exchange appeals, normative appeals, and appeals to self. A content analysis was then conducted to assess the emergency messages evident in the Australian emergency management context. The existing messages were aligned with the literature to identify opportunities to improve emergency messaging. Results & Conclusion The results suggest there is an opportunity to improve the effectiveness of emergency messaging to increase compliance during the response and early recovery phases of a natural disaster. While some message types cannot legally or ethically be used in emergency communication (e.g. manipulative messaging), there is an opportunity to create more persuasive messages (e.g. appeals to self) that personalise the individual’s perception of risk, triggering them to comply with the message.
Resumo:
Structural fire safety has become one of the key considerations in the design and maintenance of the built infrastructure. Conventionally the fire resistance rating of load bearing Light gauge Steel Frame (LSF) walls is determined based on the standard time-temperature curve given in ISO 834. Recent research has shown that the true fire resistance of building elements exposed to building fires can be less than their fire resistance ratings determined based on standard fire tests. It is questionable whether the standard time-temperature curve truly represents the fuel loads in modern buildings. Therefore an equivalent fire severity approach has been used in the past to obtain fire resistance rating. This is based on the performance of a structural member exposed to a realistic design fire curve in comparison to that of standard fire time-temperature curve. This paper presents the details of research undertaken to develop an energy based time equivalent approach to obtain the fire resistance ratings of LSF walls exposed to realistic design fire curves with respect to standard fire exposure. This approach relates to the amount of energy transferred to the member. The proposed method was used to predict the fire resistance ratings of single and double layer plasterboard lined and externally insulated LSF walls. The predicted fire ratings were compared with the results from finite element analyses and fire design rules for three different wall configurations exposed to both rapid and prolonged fires. The comparison shows that the proposed energy method can be used to obtain the fire resistance ratings of LSF walls in the case of prolonged fires.
Resumo:
Theories of individual attitudes toward IT include task technology fit (TTF), technology acceptance model (TAM), unified theory of acceptance and use of technology (UTAUT), cognitive fit, expectation disconfirmation, and computer self-efficacy. Examination of these theories reveals three main concerns. First, the theories mostly ‘‘black box’’ (or omit) the IT artifact. Second, appropriate mid-range theory is not developed to contribute to disciplinary progress and to serve the needs of our practitioner community. Third, theories are overlapping but incommensurable. We propose a theoretical framework that harmonizes these attitudinal theories and shows how they can be specialized to include relevant IS phenomenon.
Resumo:
Youth misuse of fire is a substantive community concern. Despite evidence which indicates youths account for a significant proportion of all deliberately lit fires within Australia, an absence of up-to-date, contextually specific research means the exact scope and magnitude of youth misuse of fire within Australia remains unknown. Despite research suggesting com- monalities exist between youth misuse of fire and juvenile offending more broadly, misuse of fire is rarely explained using criminological theory. In light of this gap, a descriptive analysis of youth misuse of fire within New South Wales was performed. Routine Activity Theory and Crime Pattern Theory were tested to explain differences in misuse of fire across age groups. Results suggest these environmental theories offer useful frameworks for explaining youth misuse of fire in New South Wales. It is argued that the Routine Activity Theory and Crime Pattern Theory can be employed to better inform youth misuse of fire policy and prevention efforts.
Resumo:
We investigate the terminating concept of BKZ reduction first introduced by Hanrot et al. [Crypto'11] and make extensive experiments to predict the number of tours necessary to obtain the best possible trade off between reduction time and quality. Then, we improve Buchmann and Lindner's result [Indocrypt'09] to find sub-lattice collision in SWIFFT. We illustrate that further improvement in time is possible through special setting of SWIFFT parameters and also through the combination of different reduction parameters adaptively. Our contribution also include a probabilistic simulation approach top-up deterministic simulation described by Chen and Nguyen [Asiacrypt'11] that can able to predict the Gram-Schmidt norms more accurately for large block sizes.
Resumo:
In this symposium I will discuss my work on three parallel projects I have been working on since 2010: Theories of Modernity & the Subject-Critique of contemporary architecture under ideological capitalism-and Fascism & Modern Architecture
Resumo:
"In Perpetual Motion is an "historical choreography" of power, pedagogy, and the child from the 1600s to the early 1900s. It breaks new ground by historicizing the analytics of power and motion that have interpenetrated renditions of the young. Through a detailed examination of the works of John Locke, Jean-Jacques Rousseau, Johann Herbart, and G. Stanley Hall, this book maps the discursive shifts through which the child was given a unique nature, inscribed in relation to reason, imbued with an effectible interiority, and subjected to theories of power and motion. The book illustrates how developmentalist visions took hold in U.S. public school debates. It documents how particular theories of power became submerged and taken for granted as essences inside the human subject. In Perpetual Motion studiously challenges views of power as in or of the gaze, tracing how different analytics of power have been used to theorize what gazing could notice."--BOOK JACKET.
Resumo:
Theories of search and search behavior can be used to glean insights and generate hypotheses about how people interact with retrieval systems. This paper examines three such theories, the long standing Information Foraging Theory, along with the more recently proposed Search Economic Theory and the Interactive Probability Ranking Principle. Our goal is to develop a model for ad-hoc topic retrieval using each approach, all within a common framework, in order to (1) determine what predictions each approach makes about search behavior, and (2) show the relationships, equivalences and differences between the approaches. While each approach takes a different perspective on modeling searcher interactions, we show that under certain assumptions, they lead to similar hypotheses regarding search behavior. Moreover, we show that the models are complementary to each other, but operate at different levels (i.e., sessions, patches and situations). We further show how the differences between the approaches lead to new insights into the theories and new models. This contribution will not only lead to further theoretical developments, but also enables practitioners to employ one of the three equivalent models depending on the data available.
Resumo:
Random walk models are often used to interpret experimental observations of the motion of biological cells and molecules. A key aim in applying a random walk model to mimic an in vitro experiment is to estimate the Fickian diffusivity (or Fickian diffusion coefficient),D. However, many in vivo experiments are complicated by the fact that the motion of cells and molecules is hindered by the presence of obstacles. Crowded transport processes have been modeled using repeated stochastic simulations in which a motile agent undergoes a random walk on a lattice that is populated by immobile obstacles. Early studies considered the most straightforward case in which the motile agent and the obstacles are the same size. More recent studies considered stochastic random walk simulations describing the motion of an agent through an environment populated by obstacles of different shapes and sizes. Here, we build on previous simulation studies by analyzing a general class of lattice-based random walk models with agents and obstacles of various shapes and sizes. Our analysis provides exact calculations of the Fickian diffusivity, allowing us to draw conclusions about the role of the size, shape and density of the obstacles, as well as examining the role of the size and shape of the motile agent. Since our analysis is exact, we calculateDdirectly without the need for random walk simulations. In summary, we find that the shape, size and density of obstacles has a major influence on the exact Fickian diffusivity. Furthermore, our results indicate that the difference in diffusivity for symmetric and asymmetric obstacles is significant.
Resumo:
Light gauge steel frame (LSF) wall systems are increasingly used in residential and commercial buildings as load bearing and non-load bearing elements. Conventionally, the fire resistance ratings of such building elements are determined using approximate prescriptive methods based on limited standard fire tests. However, recent studies have shown that in some instances real building fire time-temperature curves could be more severe than the standard fire curve, in terms of maximum temperature and rate of temperature rise. This has caused problems for safe evacuation and rescue activities, and in some instances has also lead to the collapse of buildings earlier than the prescribed fire resistance. Therefore a detailed research study into the performance of LSF wall systems under both standard fire and realistic fire conditions was undertaken using full scale fire tests to understand the fire performance of different LSF wall configurations. Both load bearing and non-load bearing full scale fire tests were performed on LSF walls configurations which included single layer, double layer, externally insulated wall panels made up of different steel sections and thicknesses of gypsum plasterboards. The non-load bearing fire test results were utilized to understand the factors affecting the fire resistance of LSF walls, while loading bearing fire test results led to development of simplified methods to predict the fire resistance ratings of load bearing LSF walls exposed to both standard and realistic design fires. This paper presents the results of full scale experimental study and highlights the effects of standard and realistic fire conditions on fire performance of LSF walls.
Resumo:
There is a widely held view that the nation-state has become less central to media and communications policy over the last two decades. As Jan van Cuilenberg and Denis McQuail (2003, p. 181) observed in their overview of trends in communications policy-making, 'the old normative media policies have been challenged and policy-makers are searching for a new communications policy paradigm'. There are characteristically five factors put forward as to why the nation-state has become less central to media in the twenty-first century
Resumo:
School is regarded as a site of moral training for the younger generation to encounter nation’s future challenges as well as to re-energize nation’s cultural identity. The more competitive global society led by free market trade in terms of ASEAN Economic Community (AEC), requires the school to adapt and change its curriculum more frequently. Like many other countries, Indonesian Ministry of Education and Culture has introduced and nurtured universal values and traditional values respectively through school curriculum reforms to develop students’ ability to participating in global society. This paper will describe classical and contemporary theories related to moral education that have been implemented in Indonesia’s school curriculum and school activities. The theories developed by Durkheim, Alastair MacIntyre, and Basil Bernstein will be discussed. This includes explaining how far the theories have been adopted in Indonesia and how the approaches are currently being used in Indonesian schooling. This paper suggests despite the implementation of those theories in Indonesian schools, the government needs to optimise the operation of those theories to gain significant outcomes.