10 resultados para Dealer
em Queensland University of Technology - ePrints Archive
Resumo:
In today's fiercely competitive products market, product warranty has started playing an important role. The warranty period offered by the manufacturer/dealer has been progressively increasing since the beginning of the 20th Century. Currently, a large number of products are being sold with long-term warranty policies in the form of extended warranty, warranty for used products, service contracts and lifetime warranty policies. Lifetime warranties are relatively a new concept. The modelling of failures during the warranty period and the costs for such policies are complex since the lifespan in these policies are not defined well and it is often difficult to tell about life measures for the longer period of coverage due to usage pattern/maintenance activities undertaken and uncertainties of costs over the period. This paper focuses on defining lifetime, developing lifetime warranty policies and models for predicting failures and estimating costs for lifetime warranty policies.
Resumo:
In the context of cultural and/or differential ‘normalisation’ of certain forms of drug use, this article describes two case-studies of heavy recreational drug users. The daily lives of these users blur the line between the legal and the illegal; their drug trading is generally as a consumer and ‘friend of a friend’ small dealer in the low-level market. In the first case, problems with management of employment, time and financial budgeting are described; in the second case, such management is accomplished. Discussion refers to: differences between the two in relation to resources and vulnerability to risks, and to leisure/pleasure cultures of hedonism. The research agenda should pay more attention to users who seek to maintain a legitimate lifestyle but who develop problems managing work and their drug-related leisure. Understanding the consumer demand and dealing activity of such users is important in trying to develop a fuller understanding of drug markets.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where each participant’s share can be used several times which reduces the number of interactions between the dealer and the group members. In addition some secrets may require a higher security level than others involving the need for different threshold values. Recently Chan and Chang designed such a scheme but their construction only allows a single secret to be shared per threshold value. In this article we combine the previous two approaches to design a multiple time verifiable multi-secret sharing scheme where several secrets can be shared for each threshold value. Since the running time is an important factor for practical applications, we will provide a complexity comparison of our combined approach with respect to the previous schemes.
Resumo:
I found it on eBay: ‘Jamaica GB used in 1858 6d x 2 sg Z5 used on piece A01 [Kingston] 1858’. Offered for sale by a stamp dealer on the Isle of Man was a scrap of blue paper, apparently part of an old envelope or torn off a sealed, folded letter, on which was stuck an attached pair of British postage stamps, each bearing the image of a young Queen Victoria
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have secure channels between shareholders. In contrast, we show how to increase the threshold parameter of the standard CRT secret-sharing scheme without secure channels between the shareholders. Our method can thus be applied to existing CRT schemes even if they were set up without consideration to future threshold increases. Our method is a positive cryptographic application for lattice reduction algorithms, and we also use techniques from lattice theory (geometry of numbers) to prove statements about the correctness and information-theoretic security of our constructions.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (Geometry of Numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
While cannabis is the most prolifically used illicit drug in Australia, there is a gap in our understanding concerning the social interactions and friendships formed around its supply and use. The authors recruited cannabis users aged between 18 and 30 years throughout Australia, to explore the impact of supply routes on young users and their perceived notions of drug dealing in order to provide valuable insight into the influence that reciprocal relationships have on young people’s access to cannabis. Findings reveal that the supply of cannabis revolves around pre-existing connections and relationships formed through associates known to be able to readily source cannabis. It was found that motivations for proffering cannabis in a shared environment were related more to developing social capital than to generating financial gain. Given this, often those involved in supply do not perceive that they are breaking the law or that they are ‘dealers’. This social supply market appears to be built on trust and social interactions and, as such, presents several challenges to law enforcement. It is suggested that there would be benefit in providing targeted education campaigns to combat social supply dealing among young adults.
Resumo:
1. Under the Terms of Reference for the Committee’s Inquiry, ‘lemons’ are defined as ‘new motor vehicles with numerous, severe defects that re-occur despite multiple repair attempts or where defects have caused a new motor vehicle to be out of service for a prolonged period of time’. Consumers are currently protected in relation to lemon purchases by the Australian Consumer Law (ACL) located in Schedule 2 of the Competition and Consumer Act 2010 (Cth) (CCA). The ACL applies as a law of Queensland pursuant to the Fair Trading Act 1989 (Qld). The voluntary recall and consumer guarantees law took effect on 1 January 2011. 2. In 2006, the Government of Victoria made a commitment to introduce a lemon law into the provisions of the then Fair Trading Act 1999 (Vic). The public consultation process on the proposal to introduce a lemon law for motor vehicle purchases in Victoria was conducted by Ms Janice Munt MP, with the assistance of Consumer Affairs Victoria (CAV). CAV released an Issues Paper to canvas with industry and the community options for the development and introduction of a motor vehicle lemon law.(Consumer Affairs Victoria, Introducing Victorian motor vehicle lemon laws, Issues Paper, (September, 2007). 3. A CAV report prepared by Janice Munt MP was released in July, 2008 (Consumer Affairs Victoria, Motor Cars: A report on the motor vehicle lemon law consultations (July 2008) (Victorian Lemon Law Report). However, the Victorian proposal was overtaken by events leading to the adoption of a uniform consumer protection law in all Australian jurisdictions, the ACL. 4. The structure of this submission is to consider first the three different bases upon which consumers can obtain relief for economic loss arising from defects in motor vehicles. The second part of the submission considers the difficulties encountered by consumers in litigating motor vehicle disputes in the courts and tribunals. The third part of the submission examines the approach taken in other jurisdictions to resolving motor vehicle disputes. The final part of the submission considers a number of possible reforms that could be made to the existing law and its enforcement to reduce consumer detriment arising from the purchase of ‘lemon’ motor vehicles. 5. There are three principal bases upon which a consumer can obtain redress for defects in new motor vehicles under the ACL. The first is where the manufacturer admits liability and initiates the voluntary recall procedure provided for in s 128 of the ACL. Under this basis the manufacturer generally repairs or replaces the part subject to the recall free of charge. The second basis is where the manufacturer or dealer denies liability and the consumer is initiates proceedings in the court or tribunal seeking a statutory remedy under the ACL, the nature of which will depend on whether the failure to comply with the consumer guarantee was major or not. The third basis upon which a consumer can obtain redress is pursuant to public enforcement by the ACCC. Each basis will be considered in this part. What all three bases have in common is the need to conduct an investigation to identify the nature of the defect and how it arose.