94 resultados para Keen, Cliff
em Queensland University of Technology - ePrints Archive
Resumo:
This article discusses what recent statistics and public reports reveal about the funding of GEERS (now the FEG) and its bottom line. The article examines (1) whether there has been a “blowout” in the scheme which guarantees the recovery of employee entitlements in liquidations and (2) what might be done to put the scheme on a firmer fiscal footing.
Resumo:
We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient than the recent protocol of Abdalla and Pointcheval (FC 2005), proven in the random oracle model. We also observe some limitations in the model due to Abdalla, Fouque and Pointcheval (PKC 2005) for proving security of such protocols.
Resumo:
We examine the use of randomness extraction and expansion in key agreement (KA) pro- tocols to generate uniformly random keys in the standard model. Although existing works provide the basic theorems necessary, they lack details or examples of appropriate cryptographic primitives and/or parameter sizes. This has lead to the large amount of min-entropy needed in the (non-uniform) shared secret being overlooked in proposals and efficiency comparisons of KA protocols. We therefore summa- rize existing work in the area and examine the security levels achieved with the use of various extractors and expanders for particular parameter sizes. The tables presented herein show that the shared secret needs a min-entropy of at least 292 bits (and even more with more realistic assumptions) to achieve an overall security level of 80 bits using the extractors and expanders we consider. The tables may be used to �nd the min-entropy required for various security levels and assumptions. We also �nd that when using the short exponent theorems of Gennaro et al., the short exponents may need to be much longer than they suggested.
Resumo:
Aim – To develop and assess the predictive capabilities of a statistical model that relates routinely collected Trauma Injury Severity Score (TRISS) variables to length of hospital stay (LOS) in survivors of traumatic injury. Method – Retrospective cohort study of adults who sustained a serious traumatic injury, and who survived until discharge from Auckland City, Middlemore, Waikato, or North Shore Hospitals between 2002 and 2006. Cubic-root transformed LOS was analysed using two-level mixed-effects regression models. Results – 1498 eligible patients were identified, 1446 (97%) injured from a blunt mechanism and 52 (3%) from a penetrating mechanism. For blunt mechanism trauma, 1096 (76%) were male, average age was 37 years (range: 15-94 years), and LOS and TRISS score information was available for 1362 patients. Spearman’s correlation and the median absolute prediction error between LOS and the original TRISS model was ρ=0.31 and 10.8 days, respectively, and between LOS and the final multivariable two-level mixed-effects regression model was ρ=0.38 and 6.0 days, respectively. Insufficient data were available for the analysis of penetrating mechanism models. Conclusions – Neither the original TRISS model nor the refined model has sufficient ability to accurately or reliably predict LOS. Additional predictor variables for LOS and other indicators for morbidity need to be considered.
Resumo:
Aims – To develop local contemporary coefficients for the Trauma Injury Severity Score in New Zealand, TRISS(NZ), and to evaluate their performance at predicting survival against the original TRISS coefficients. Methods – Retrospective cohort study of adults who sustained a serious traumatic injury, and who survived until presentation at Auckland City, Middlemore, Waikato, or North Shore Hospitals between 2002 and 2006. Coefficients were estimated using ordinary and multilevel mixed-effects logistic regression models. Results – 1735 eligible patients were identified, 1672 (96%) injured from a blunt mechanism and 63 (4%) from a penetrating mechanism. For blunt mechanism trauma, 1250 (75%) were male and average age was 38 years (range: 15-94 years). TRISS information was available for 1565 patients of whom 204 (13%) died. Area under the Receiver Operating Characteristic (ROC) curves was 0.901 (95%CI: 0.879-0.923) for the TRISS(NZ) model and 0.890 (95% CI: 0.866-0.913) for TRISS (P<0.001). Insufficient data were available to determine coefficients for penetrating mechanism TRISS(NZ) models. Conclusions – Both TRISS models accurately predicted survival for blunt mechanism trauma. However, TRISS(NZ) coefficients were statistically superior to TRISS coefficients. A strong case exists for replacing TRISS coefficients in the New Zealand benchmarking software with these updated TRISS(NZ) estimates.
Resumo:
This paper is a beginning point for discussing what the literature states about parents’ involvement in their children’s mathematics education. Where possible it will focus on Torres Strait Islander Peoples. Little is known about how Torres Strait Islander parents approach their children’s learning of mathematics and how important early mathematics is to mothers. What is known is that is they are keen for their children to receive an education that provides them with opportunities for their present and future lives. However, gaining access to education is challenging given that the language of instruction in schools is written to English conventions, decontextualised and disconnected from the students’ culture, community and home language. This paper discusses some of the issues raised in the literature about what parents are confronted with when making decisions about their children’s education.
Resumo:
Existing trauma registries in Australia and New Zealand play an important role in monitoring the management of injured patients. Over the past decade, such monitoring has been translated into changes in clinical processes and practices. Monitoring and changes have been ad hoc, as there are currently no Australasian benchmarks for “optimal” injury management. A binational trauma registry is urgently needed to benchmark injury management to improve outcomes for injured patients.
Developing a best practice framework for implementing public private partnerships (PPP) in Hong Kong
Resumo:
Public Private Partnership (PPP) is a well established methodology for procuring public works projects. By incorporating the private sector’s expertise, efficiency, innovation, business sense, risk sharing, financing etc. into public works projects, the quality of public services and facilities can be uplifted. Like many jurisdictions, Hong Kong is also keen to take aboard this methodology which is so familiar but yet so distant. Although they have been one of the first jurisdictions to utilise the private sector in public works projects, their comfortable financial reserves has meant that there has been no urge to push the movement until recently. PPP has become increasingly popular amongst governments. The Hong Kong Special Administrative Region (HKSAR) government is no exception. Some of the more active works departments have commissioned studies to investigate the best ways to deliver these projects, others have even trialed the method themselves. The efficiency Unit of the HKSAR government has also become an active arm in conducting research in this area. Although so, the information that is currently available is still very broad. Building from their works there is a need to develop a best practice framework for implementing PPP projects in Hong Kong by incorporating international experiences. To develop a best practice framework will require thorough investigation into the benefits, difficulties and critical success factor of PPP. PPP should also be compared with other procurement methods. In order to do so it is important to clearly understand the local situation by an analysis of projects conducted to date. Lessons learnt can further be derived from other countries and incorporated to those derived locally. Finally the best conditions in terms of project nature, complexity, types, and scales for adopting PPP should be derived. The aim and objectives of this study were achieved via a comprehensive literature review, in-depth case analyses, interview survey with experts from both Hong Kong and overseas, and finally a large scale data collection was conducted via a questionnaire survey with PPP practitioners. These findings were further triangulated before they were used as the basis to form the best practice framework presented in this thesis. The framework was then further validated by PPP experts to ensure it is comprehensive, objective, reliable and practical. This study has presented a methodology that can be adopted for future studies. It has also updated our knowledge on the development trends of PPP as well as opened up the experiences of other jurisdictions. The findings have shown that the local industry is familiar with “what” should be done in PPP projects but they are unsure of “how” these goals can be achieved. This framework has allowed this further knowledge to be delivered to PPP practitioners. As a result, the development of this framework can help to resolve the current economic crisis by encouraging more developments and business opportunities for the private sector. In addition, the correct projects can be delivered by PPP, the advantages of PPP can be maximised, and the general public can benefit from the private sector’s participation.
Resumo:
This paper is a beginning point for discussing what the literature states about parents’ involvement in their children’s mathematics education. Where possible it will focus on Torres Strait Islander Peoples. Little is known about how Torres Strait Islander parents approach their children’s learning of mathematics and how important early mathematics is to mothers. What is known is that is they are keen for their children to receive an education that provides them with opportunities for their present and future lives. However, gaining access to education is challenging given that the language of instruction in schools is written to English conventions, decontextualised and disconnected from the students’ culture, community and home language. This paper discusses some of the issues raised in the literature about what parents are confronted with when making decisions about their children’s education.
Resumo:
Undoubtedly, the past half-century has witnessed an escalation of changes in the social, political, economic and educational structures in many societies around the world. Some have seen change as a challenge and hope while, for many others, it is a source of concern and worry. Some have adopted change with gusto, while for many it is something to be resisted. Some say we live in a world and times with an increasing awareness that “times are changing”, while for some “the more things change, the more they stay the same”.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.