334 resultados para Hutchinson, Edward


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a model to estimate travel time using cumulative plots. Three different cases considered are i) case-Det, for only detector data; ii) case-DetSig, for detector data and signal controller data and iii) case-DetSigSFR: for detector data, signal controller data and saturation flow rate. The performance of the model for different detection intervals is evaluated. It is observed that detection interval is not critical if signal timings are available. Comparable accuracy can be obtained from larger detection interval with signal timings or from shorter detection interval without signal timings. The performance for case-DetSig and for case-DetSigSFR is consistent with accuracy generally more than 95% whereas, case-Det is highly sensitive to the signal phases in the detection interval and its performance is uncertain if detection interval is integral multiple of signal cycles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Vehicle detectors have been installed at approximately every 300 meters on each lane on Tokyo metropolitan expressway. Various traffic data such as traffic volume, average speed and time occupancy are collected by vehicle detectors. We can understand traffic characteristics of every point by comparing traffic data collected at consecutive points. In this study, we focused on average speed, analyzed road potential by operating speed during free-flow conditions, and identified latent bottlenecks. Furthermore, we analyzed effects for road potential by the rainfall level and day of the week. It’s expected that this method of analysis will be utilized for installation of ITS such as drive assist, estimation of parameters for traffic simulation and feedback to road design as congestion measures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tzeng et al. proposed a new threshold multi-proxy multi-signature scheme with threshold verification. In their scheme, a subset of original signers authenticates a designated proxy group to sign on behalf of the original group. A message m has to be signed by a subset of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group. A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature. Subsequently, there are two improved schemes to eliminate the security leak of Tzeng et al.’s scheme. In this paper, we have pointed out the security leakage of the three schemes and further proposed a novel threshold multi-proxy multi-signature scheme with threshold verification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This fascinating handbook defines how knowledge contributes to social and economic life, and vice versa. It considers the five areas critical to acquiring a comprehensive understanding of the knowledge economy: the nature of the knowledge economy; social, cooperative, cultural, creative, ethical and intellectual capital; knowledge and innovation systems; policy analysis for knowledge-based economies; and knowledge management. In presenting the outcomes of an important body of research, the handbook enables knowledge policy and management practitioners to be more systematically guided in their thinking and actions. The contributors cover a wide disciplinary spectrum in an accessible way, presenting concise, to-the-point discussions of critical concepts and practices that will enable practitioners to make effective research, managerial and policy decisions. They also highlight important new areas of concern to knowledge economies such as wisdom, ethics, language and creative economies that are largely overlooked.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. AE is potentially more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message and in a separate pass, providing integrity protection by generating a Message Authentication Code (MAC) tag. This paper presents results on the analysis of three AE stream ciphers submitted to the recently completed eSTREAM competition. We classify the ciphers based on the methods the ciphers use to provide authenticated encryption and discuss possible methods for mounting attacks on these ciphers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article surveys literature bearing on the issue of parental liability and responsibility for the crimes of young offenders, with a particular focus on comparing different approaches to dealing with the issue in Australia and Canada. This comparative analysis of Australian and Canadian legislative and policy approaches is situated within a broader discussion of arguments about the “punitive turn” in youth justice, responsibilisation, and cross-jurisdictional criminal justice policy transfer and convergence. Our findings suggest that there are significant differences in the manner and extent to which Australia and Canada have invoked parental responsibility laws and policies as part of the solution to dealing with youth crime. We conclude by speculating on some of the reasons for these differences and establishing an agenda for additional needed cross-jurisdictional research. In particular, we argue that it would be fruitful to undertake a cross-jurisdictional study that examines the development and effects of parental responsibility laws across a larger number of different Western countries as well as across individual states and provinces within these national jurisdictions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Lawyers have traditionally viewed law as a closed system, and doctrinal research has been the research methodology used most widely in the profession. This reflects traditional concepts of legal reasoning. There is a wealth of reliable and valid social science data available to lawyers and judges. Judges in fact often refer to general facts about the world, society, institutions and human behaviour (‘empirical facts’). Legal education needs to prepare our students for this broader legal context. This paper examines how ‘empirical facts’ are used in Australian and other common law courts. Specifically, the paper argues that there is a need for enhanced training in non-doctrinal research methodologies across the law school curriculum. This should encompass a broad introduction to social science methods, with more attention being paid to a cross-section of methodologies such as content analysis, comparative law and surveys that are best applied to law.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we discuss our participation to the INEX 2008 Link-the-Wiki track. We utilized a sliding window based algorithm to extract the frequent terms and phrases. Using the extracted phrases and term as descriptive vectors, the anchors and relevant links (both incoming and outgoing) are recognized efficiently.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The production of knowledge has become central to economic life. Competitiveness in the 21st century market place is now characterized by the ability to translate scientific and technological knowledge into innovation. But does this render cultural and social knowledge unimportant? This unique book advocates a broader epistemological base for the term ‘knowledge’ and develops policy implications from this perspective. By examining long-term challenges, the volume argues that fresh policy thinking is needed not only in the obviously knowledge-intensive portfolios but across all areas of knowledge production and questions how the different dynamics of the knowledge era affect defence, employment, environment, indigenous and international relations, multiculturalism and urban policy.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This is a video of the first of a seminar series which took place 10th February 2010. The presentations showcase how QUT researchers engage with new technology and techniques when conducting research. This sharing of eresearch experience resulted in great feedback from colleagues attending the presentations. Welcome – Prof Arun Sharma Presentations Prof Christian Langton, Prof Edward Chung, Assoc Prof Axel Bruns, Prof David Kavanagh, Prof Paul Roe, Martin Borchert, Dr Kirsty Kitto, Prof Robin Drogemuller, Prof Peter Corke, Assoc Prof Marcus Foth, Close – Prof Tom Cochrane.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

UCON is an emerging access control framework that lacks an administration model. In this paper we define the problem of administration and propose a novel administrative model. At the core of this model is the concept of attribute, which is also the central component of UCON. In our model, attributes are created by the assertions of subjects, which ascribe properties/rights to other subjects or objects. Through such a treatment of attributes, administration capabilities can be delegated from one subject to another and as a consequence UCON is improved in three aspects. First, immutable attributes that are currently considered as external to the model can be incorporated and thereby treated as mutable at- tributes. Second, the current arbitrary categorisation of users (as modifiers of attributes), to system and administrator can be removed. Attributes and objects are only modifiable by those who possess administration capability over them. Third, the delegation of administration over objects and properties that is not currently expressible in UCON is made possible.