60 resultados para Harry Truman
em Queensland University of Technology - ePrints Archive
Resumo:
Harry Reade (1927-1998) was an Australian waterside worker-artist who became involved with animation production through the Waterside Workers’ Federation Film Unit, in Sydney. During the early years of the Cuban Revolution, Reade contributed to Cuba’s social and cultural reform process by influencing the development of the educational sector of Cuban animation. This article examines the forces that shaped Reade and the ways in which he contributed to the use of animation as an agent of social change.
Resumo:
In a three day trial in April 2008, the United States District Court for the Southern District of New York considered whether the Harry Potter Lexicon infringed the intellectual property rights of J.K. Rowling and Warner Brothers. The case has attracted great media attention. As John Crace, a reporter for The Guardian, observed: “On one side: global-celebrity author J.K. Rowling. On the other: an amateur fan site devoted to the world's favourite boy wizard. At stake: the soul of Harry Potter.” J.K. Rowling is the author of the seven book Harry Potter series, which tell the story of a young wizard, Harry Potter, and his battles with Voldemort, the Lord of Darkness. As the court papers noted, “The Harry Potter Books are a modern day publishing phenomenon and success story.” Warner Brothers sought and obtained the film rights to the series. The entertainment company has thus far produced five films; a sixth is due in November 2008; and the final instalment is planned. The Harry Potter Lexicon is a reference guide created by Steven Vander Ark, a former grade school teacher. He has organised a large volume of material on the Harry Potter books and the Harry Potter films on a website in an alphabetical listing, from “A-Z”. The founder of RDR Books, Roger Rapoport, approached Ark to publish the Harry Potter Lexicon in a book form. Ark agreed to this request, and provided the publisher with a condensed version of the web-site. After RDR Books announced its intention to publish the reference book, J.K. Rowling and Warner Brothers brought a legal action in the United States District Court for the Southern District of New York, alleging that the publishers of the Harry Potter Lexicon were in breach of various intellectual property rights. A spokesperson for Warner Brothers and J.K. Rowling observed: "A fan’s affectionate enthusiasm should not obscure acts of plagiarism. The publishers knew what they were doing. The problem remains that the Lexicon takes an enormous amount of Ms. Rowling’s work and adds virtually no original commentary of its own. As we’ve said in court, it takes too much and adds too little. Authors have a duty to prevent the exploitation of their works by people who contribute nothing original, creative or interpretive." The litigation involves the intersection of copyright law, trade mark law, and consumer protection law. It has a wider significance because it deals with the protection of authorial rights; the use of literary indexes, supplements and reference guides; and the clash between character merchandising and fan fiction.
Resumo:
The MPEG-21 Multimedia Framework provides for controlled distribution of multimedia works through its Intellectual Property Management and Protection ("IPMP") Components and Rights Expression Language ("MPEG REL"). The IPMP Components provide a framework by which the components of an MPEG-21 digital item can be protected from undesired access, while MPEG REL provides a mechanism for describing the conditions under which a component of a digital item may be used and distributed. This chapter describes how the IPMP Components and MPEG REL were used to implement a series of digital rights management applications at the Cooperative Research Centre for Smart Internet Technology in Australia. While the IPMP Components and MPEG REL were initially designed to facilitate the protection of copyright, the applications also show how the technology can be adapted to the protection of private personal information and sensitive corporate information.
Resumo:
The study objective was to determine whether the ‘cardiac decompensation score’ could identify cardiac decompensation in a patient with existing cardiac compromise managed with intraaortic balloon counterpulsation (IABP). A one-group, posttest-only design was utilised to collect observations in 2003 from IABP recipients treated in the intensive care unit of a 450 bed Australian, government funded, public, cardiothoracic, tertiary referral hospital. Twenty-three consecutive IABP recipients were enrolled, four of whom died in ICU (17.4%). All non-survivors exhibited primarily rising scores over the observation period (p < 0.001) and had final scores of 25 or higher. In contrast, the maximum score obtained by a survivor at any time was 15. Regardless of survival, scores for the 23 participants were generally decreasing immediately following therapy escalation (p = 0.016). Further reflecting these changes in patient support, there was also a trend for scores to move from rising to falling at such treatment escalations (p = 0.024). This pilot study indicates the ‘cardiac decompensation score’ to accurately represent changes in heart function specific to an individual patient. Use of the score in conjunction with IABP may lead to earlier identification of changes occurring in a patient's cardiac function and thus facilitate improved IABP outcomes.
Resumo:
An initialisation process is a key component in modern stream cipher design. A well-designed initialisation process should ensure that each key-IV pair generates a different key stream. In this paper, we analyse two ciphers, A5/1 and Mixer, for which this does not happen due to state convergence. We show how the state convergence problem occurs and estimate the effective key-space in each case.
Resumo:
Sfinks is a shift register based stream cipher designed for hardware implementation. The initialisation state update function is different from the state update function used for keystream generation. We demonstrate state convergence during the initialisation process, even though the individual components used in the initialisation are one-to-one. However, the combination of these components is not one-to-one.
Resumo:
Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.
Resumo:
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.