107 resultados para R CODES


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Australian Prudential Regulation Authority v Rural and General Insurance Let [2004] FCA 933, Gyles J considered what he described as "a novel question", namely, whether taking steps to prepare to give oral evidence when subpoenaed to attend for that purpose, including the obtaining of legal advice and assistance, could be recovered by the witness under O 27 r 11 of the Federal Court Rules

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Mitchell Contractors Pty Ltd v Townsville-Thuringowa Water Supply Joint Board [2004] QSC 329, Douglas J considered the issue of broad significance for litigation practitioners of whether draft expert reports fall within the description in r212(2) of the Uniform Civil Procedure Rules 1999 (Qld) of documents "consisting of a statement or report of an expert" and are therefore not privileged from disclosure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We discuss algorithms for combining sequential prediction strategies, a task which can be viewed as a natural generalisation of the concept of universal coding. We describe a graphical language based on Hidden Markov Models for defining prediction strategies, and we provide both existing and new models as examples. The models include efficient, parameterless models for switching between the input strategies over time, including a model for the case where switches tend to occur in clusters, and finally a new model for the scenario where the prediction strategies have a known relationship, and where jumps are typically between strongly related ones. This last model is relevant for coding time series data where parameter drift is expected. As theoretical contributions we introduce an interpolation construction that is useful in the development and analysis of new algorithms, and we establish a new sophisticated lemma for analysing the individual sequence regret of parameterised models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We observe that MDS codes have interesting properties that can be used to construct ideal threshold schemes. These schemes permit the combiner to detect cheating, identify cheaters and recover the correct secret. The construction is later generalised so the resulting secret sharing is resistant against the Tompa-Woll cheating.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the approach of Guilbert, a European stationery company, which has chosen a fast track strategy towards implementation of enterprise resource planning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many educators are currently interested in using computer-mediated communications (CMCs) to support learning and creative practice. In my work I have been looking at how we might create drama through using cyberspaces, working with teachers and students in secondary school contexts. In trying to understand issues that have arisen and ways of working with the data I have found a number of frameworks helpful for analysing the online interactions. These frameworks draw from O'Toole's work on contexts negotiated in the creation of drama and other frameworks drawn from Wertsch, Bakhtin and Vygotsky's work on speech utterances, dialogic processes and internalisation of learning. The contexts and factors which must be negotiated in online communications within learning contexts are quite complex and educators may need to provide parameters and protocols to ensure appropriate languages, genres and utterances are utilised. The paper explores some of the types of languages, genres and utterances that emerged from a co-curricula drama project and issues that arose, including the importance of establishing processes for giving and receiving critical feedback This paper is of relevance to those whose research strategies may involve the use of computer-mediated communications as well as those utilising cyberspaces in educational contexts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background The purpose of this study was to estimate the incidence of fatal and non-fatal Low Speed Vehicle Run Over (LSVRO) events among children aged 0–15 years in Queensland, Australia, at a population level. Methods Fatal and non-fatal LSVRO events that occurred in children resident in Queensland over eleven calendar years (1999-2009) were identified using ICD codes, text description, word searches and medical notes clarification, obtained from five health related data bases across the continuum of care (pre-hospital to fatality). Data were manually linked. Population data provided by the Australian Bureau of Statistics were used to calculate crude incidence rates for fatal and non-fatal LSVRO events. Results There were 1611 LSVROs between 1999–2009 (IR = 16.87/100,000/annum). Incidence of non-fatal events (IR = 16.60/100,000/annum) was 61.5 times higher than fatal events (IR = 0.27/100,000/annum). LSVRO events were more common in boys (IR = 20.97/100,000/annum) than girls (IR = 12.55/100,000/annum), and among younger children aged 0–4 years (IR = 21.45/100000/annum; 39% or all events) than older children (5–9 years: IR = 16.47/100,000/annum; 10–15 years IR = 13.59/100,000/annum). A total of 896 (56.8%) children were admitted to hospital for 24 hours of more following an LSVRO event (IR = 9.38/100,000/annum). Total LSVROs increased from 1999 (IR = 14.79/100,000) to 2009 (IR = 18.56/100,000), but not significantly. Over the 11 year period, there was a slight (non –significant) increase in fatalities (IR = 0.37-0.42/100,000/annum); a significant decrease in admissions (IR = 12.39–5.36/100,000/annum), and significant increase in non-admissions (IR = 2.02-12.77/100,000/annum). Trends over time differed by age, gender and severity. Conclusion This is the most comprehensive, population-based epidemiological study on fatal and non-fatal LSVRO events to date. Results from this study indicate that LSVROs incur a substantial burden. Further research is required on the characteristics and risk factors associated with these events, in order to adequately inform injury prevention. Strategies are urgently required in order to prevent these events, especially among young children aged 0-4 years.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Professor Peter Barrett at the 2013 CIB World Building Congress1 (WBC13) presented a timely context for the future of research and development (R&D) investment in the global construction industry (Barrett, 2013). He called for a shift in the focus from lessons learned and doing things better to what is the right thing to do and developing a new paradigm for achieving this. This shift requires empathy with industry and users; a desire to generate and transmit knowledge; an opportunity to study deeply and over the long term; and with an objective stance towards fJositive and negative findings. This shift includes the creation of sta11dards for the holistic impact of spaces through exemplary pilot projects creating evidence for policy makers and clients (Barrett, 2013)...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Few would disagree that the upstream oil & gas industry has become more technology-intensive over the years. But how does innovation happen in the industry? Specifically, what ideas and inputs flow from which parts of the sector׳s value network, and where do these inputs go? And how do firms and organizations from different countries contribute differently to this process? This paper puts forward the results of a survey designed to shed light on these questions. Carried out in collaboration with the Society of Petroleum Engineers (SPE), the survey was sent to 469 executives and senior managers who played a significant role with regard to R&D and/or technology deployment in their respective business units. A total of 199 responses were received from a broad range of organizations and countries around the world. Several interesting themes and trends emerge from the results, including: (1) service companies tend to file considerably more patents per innovation than other types of organization; (2) over 63% of the deployed innovations reported in the survey originated in service companies; (3) neither universities nor government-led research organizations were considered to be valuable sources of new information and knowledge in the industry׳s R&D initiatives, and; (4) despite the increasing degree of globalization in the marketplace, the USA still plays an extremely dominant role in the industry׳s overall R&D and technology deployment activities. By providing a detailed and objective snapshot of how innovation happens in the upstream oil & gas sector, this paper provides a valuable foundation for future investigations and discussions aimed at improving how R&D and technology deployment are managed within the industry. The methodology did result in a coverage bias within the survey, however, and the limitations arising from this are explored.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Preneel, Govaerts and Vandewalle (PGV) analysed the security of single-block-length block cipher based compression functions assuming that the underlying block cipher has no weaknesses. They showed that 12 out of 64 possible compression functions are collision and (second) preimage resistant. Black, Rogaway and Shrimpton formally proved this result in the ideal cipher model. However, in the indifferentiability security framework introduced by Maurer, Renner and Holenstein, all these 12 schemes are easily differentiable from a fixed input-length random oracle (FIL-RO) even when their underlying block cipher is ideal. We address the problem of building indifferentiable compression functions from the PGV compression functions. We consider a general form of 64 PGV compression functions and replace the linear feed-forward operation in this generic PGV compression function with an ideal block cipher independent of the one used in the generic PGV construction. This modified construction is called a generic modified PGV (MPGV). We analyse indifferentiability of the generic MPGV construction in the ideal cipher model and show that 12 out of 64 MPGV compression functions in this framework are indifferentiable from a FIL-RO. To our knowledge, this is the first result showing that two independent block ciphers are sufficient to design indifferentiable single-block-length compression functions.