8 resultados para coloring
em Queensland University of Technology - ePrints Archive
Resumo:
We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted.
Resumo:
We show the first deterministic construction of an unconditionally secure multiparty computation (MPC) protocol in the passive adversarial model over black-box non-Abelian groups which is both optimal (secure against an adversary who possesses any t
Resumo:
The Alzheimer’s Australia 15th National Conference held on 14–17 May 2013 in Hobart (Tasmania, Australia) attracted a wide range of attendees, including people living with dementia, family caregivers, health professionals and researchers. The conference theme, The Tiles of Life Coloring the Future, invoking a vision of a better future for those affected by dementia, had seven subthemes: liberation, rehabilitation, leisure,service, creativity, wellbeing and research.
Resumo:
Our group has developed an ovine model of deep dermal, partial-thickness burn where the fetus heals scarlessly and the lamb heals with scar. The comparison of collagen structure between these two different mechanisms of healing may elucidate the process of scarless wound healing. Picrosirius staining followed by polarized light microscopy was used to visualize collagen fibers, with digital capture and analysis. Collagen deposition increased with fetal age and the fibers became thicker, changing from green (type III collagen) to yellow/red (type I collagen). The ratio of type III collagen to type I was high in the fetus (166), whereas the lamb had a much lower ratio (0.2). After burn, the ratios of type III to type I collagen did not differ from those in control skin for either fetus or lamb. The fetal tissue maintained normal tissue architecture after burn while the lamb tissue showed irregular collagen organization. In conclusion, the type or amount of collagen does not alter significantly after injury. Tissue architecture differed between fetal and lamb tissue, suggesting that scar development is related to collagen cross-linking or arrangement. This study indicates that healing in the scarless fetal wound is representative of the normal fetal growth pattern, rather than a "response" to burn injury.
Resumo:
Bcl-x(l) and Bax play important roles in the regulation of apoptosis. This study investigated the involvement of the mitochondrial death pathway and the role of Bcl-x(l) and Bax in the escape from apoptosis after prolonged serum deprivation in Madin-Darby canine kidney (MDCK) cells. Low level apoptosis and basal activity of the mitochondrial death pathway were detectable in normal cell growth. In serum deprivation, mitosis was partially suppressed, and the mitochondrial activity was stimulated. The level of apoptosis continuously rose over 48 h. This rise was concomitant with the increasing presence of cytochrome c in cytosol. However, both apoptosis and cytosolic cytochrome c fell dramatically at 72 h. Elevation of whole cell Bcl-x(l) and redistribution of Bcl-x(l) protein from cytosol to the membrane at 48 h and 72 h was observed. Redistribution of Bax protein from the membrane to cytosol occurred at 24 h, and remained steady to 72 h. Bax/Bcl-x(l) coimmunoprecipitation by anti-Bax antibody showed reduced Bax/Bcl-x(l) interaction at the membrane at 72 h, but not at 24 or 48 h. These results suggest that apoptosis upon serum withdrawal results from the leakage of cytochrome c to cytosol. Amelioration of the leakage of cytochrome c and apoptosis requires not only the increase of Bcl-x(l)/Bax ratio, but also the release of Bcl-x(l) from Bax at the membrane.
Resumo:
Many applications can benefit from the accurate surface temperature estimates that can be made using a passive thermal-infrared camera. However, the process of radiometric calibration which enables this can be both expensive and time consuming. An ad hoc approach for performing radiometric calibration is proposed which does not require specialized equipment and can be completed in a fraction of the time of the conventional method. The proposed approach utilizes the mechanical properties of the camera to estimate scene temperatures automatically, and uses these target temperatures to model the effect of sensor temperature on the digital output. A comparison with a conventional approach using a blackbody radiation source shows that the accuracy of the method is sufficient for many tasks requiring temperature estimation. Furthermore, a novel visualization method is proposed for displaying the radiometrically calibrated images to human operators. The representation employs an intuitive coloring scheme and allows the viewer to perceive a large variety of temperatures accurately.
Resumo:
Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.