103 resultados para Side preference


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective, approximation of the power consumption for many real-world systems. These leakage models reflect the number of bits switching, which is assumed proportional to the power consumption. However, the actual power consumption changing in the circuits is unlikely to be directly of that form. We, therefore, propose a non-linear leakage model by mapping the existing leakage model via a transform function, by which the changing power consumption is depicted more precisely, hence the attack efficiency can be improved considerably. This has the advantage of utilising a non-linear power model while retaining the simplicity of the Hamming weight or distance models. A modified attack architecture is then suggested to yield the correct key efficiently in practice. Finally, an empirical comparison of the attack results is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a new methodology for characterising the energy performance of buildings suitable for city-scale, top-down energy modelling. Building properties that have the greatest impact on simulated energy performance were identified via a review of sensitivity analysis studies. The methodology greatly simplifies the description of a building to decrease labour and simulation processing overheads. The methodology will be used in the EU FP7 INDICATE project which aims to create a master-planning tool that uses dynamic simulation to facilitate the design of sustainable, energy efficient smart cities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Demand Side Management (DSM) plays an important role in Smart Grid. It has large scale access points, massive users, heterogeneous infrastructure and dispersive participants. Moreover, cloud computing which is a service model is characterized by resource on-demand, high reliability and large scale integration and so on and the game theory is a useful tool to the dynamic economic phenomena. In this study, a scheme design of cloud + end technology is proposed to solve technical and economic problems of the DSM. The architecture of cloud + end is designed to solve technical problems in the DSM. In particular, a construct model of cloud + end is presented to solve economic problems in the DSM based on game theories. The proposed method is tested on a DSM cloud + end public service system construction in a city of southern China. The results demonstrate the feasibility of these integrated solutions which can provide a reference for the popularization and application of the DSM in china.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Libertarian paternalism, as advanced by Cass Sunstein, is seriously flawed, but not primarily for the reasons that most commentators suggest. Libertarian paternalism and its attendant regulatory implications are too libertarian, not too paternalistic, and as a result are in considerable tension with ‘thick’ conceptions of human dignity. We make four arguments. The first is that there is no justification for a presumption in favor of nudging as a default regulatory strategy, as Sunstein asserts. It is ordinarily less effective than mandates; such mandates rarely offend personal autonomy; and the central reliance on cognitive failures in the nudging program is more likely to offend human dignity than the mandates it seeks to replace. Secondly, we argue that nudging as a regulatory strategy fits both overtly and covertly, often insidiously, into a more general libertarian program of political economy. Thirdly, while we are on the whole more concerned to reject the libertarian than the paternalistic elements of this philosophy, Sunstein’s work, both in Why Nudge?, and earlier, fails to appreciate how nudging may be manipulative if not designed with more care than he acknowledges. Lastly, because of these characteristics, nudging might even be subject to legal challenges that would give us the worst of all possible regulatory worlds: a weak regulatory intervention that is liable to be challenged in the courts by well-resourced interest groups. In such a scenario, and contrary to the ‘common sense’ ethos contended for in Why Nudge?, nudges might not even clear the excessively low bar of doing something rather than nothing. Those seeking to pursue progressive politics, under law, should reject nudging in favor of regulation that is more congruent with principles of legality, more transparent, more effective, more democratic, and allows us more fully to act as moral agents. Such a system may have a place for (some) nudging, but not one that departs significantly from how labeling, warnings and the like already function, and nothing that compares with Sunstein’s apparent ambitions for his new movement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A podcast of a talk presented at a conference in Berlin organized by the Vervassungsblog on Choice Architecture in Democracies, in January 2015 - Verfassungsblog - Autonomy vs. Technocracy: Libertarian Paternalism revisited

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While studies examining free votes find MPs’ preferences influence their voting behaviour, most studies also show MPs tend to divide along party lines even after the whips have been withdrawn. Recent work offers a possible alternative explanation for this finding: this sustained party cohesion represents the impact of MPs’ party identification similar to party identification effects in the electorate. This argument is tested using a series of free votes on same-sex relations. Even after controlling for preferences using several direct measures, party continues to shape voting behaviour. Although indirect, this provides evidence in favour of the party-asidentification argument. 

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The KongTM ball test has been used extensively to assess lateral bias in the domestic dog. Implicit in this challenge is the assumption that dogs use their dominant paw to stabilise the ball. This study examined whether or not this is the case. A comparative approach was adopted, exploring limb use in dogs and humans. In Experiment 1, the paw preference of 48 dogs was assessed on the KongTM ball test. Analysis revealed an equal distribution of paw use, although significantly more dogs were paw-preferent than ambilateral. Significantly more male dogs were classified as right-pawed, while more females were ambilateral. There was no significant effect of canine sex or castration status on the dogs’ paw preferences. In Experiment 2, 94 adult humans were assessed on their ability to remove a piece of paper from a KongTM ball with their mouth, using their left, right or both hands to stabilise the ball. 76% of the right-handed people used their left hand, and 82% of the left-handed participants used their right hand, to hold the KongTM steady. It is concluded that dogs, like humans, are most likely using their non-dominant limb to stabilise the KongTM ball and their dominant side for postural support. This has potential applied implications from an animal welfare perspective.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper addresses the representation of landscape complexity in stated preferences research. It integrates landscape ecology and landscape economics and conducts the landscape analysis in a three-dimensional space to provide ecologically meaningful quantitative landscape indicators that are used as variables for the monetary valuation of landscape in a stated preferences study. Expected heterogeneity in taste intensity across respondents is addressed with a mixed logit model in Willingness to Pay space. Our methodology is applied to value, in monetary terms, the landscape of the Sorrento Peninsula in Italy, an area that has faced increasing pressure from urbanization affecting its traditional horticultural, herbaceous, and arboreal structure, with loss of biodiversity, and an increasing risk of landslides. We find that residents of the Sorrento Peninsula would prefer landscapes characterized by large open views and natural features. Residents also appear to dislike heterogeneous landscapes and the presence of lemon orchards and farmers' stewardship, which are associated with the current failure of protecting the traditional landscape. The outcomes suggest that the use of landscape ecology metrics in a stated preferences model may be an effective way to move forward integrated methodologies to better understand and represent landscape and its complexity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is lack of consistent evidence as to how well PD patients are able to accurately time their movements across space with an external acoustic signal. For years, research based on the finger-tapping paradigm, the most popular paradigm for exploring the brain's ability to time movement, has provided strong evidence that patients are not able to accurately reproduce an isochronous interval [i.e., Ref. (1)]. This was undermined by Spencer and Ivry (2) who suggested a specific deficit in temporal control linked to emergent, rhythmical movement not event-based actions, which primarily involve the cerebellum. In this study, we investigated motor timing of seven idiopathic PD participants in event-based sensorimotor synchronization task. Participants were asked to move their finger horizontally between two predefined target zones to synchronize with the occurrence of two sound events at two time intervals (1.5 and 2.5 s). The width of the targets and the distance between them were manipulated to investigate impact of accuracy demands and movement amplitude on timing performance. The results showed that participants with PD demonstrated specific difficulties when trying to accurately synchronize their movements to a beat. The extent to which their ability to synchronize movement was compromised was found to be related to the severity of PD, but independent of the spatial constraints of the task.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cryptographic algorithms have been designed to be computationally secure, however it has been shown that when they are implemented in hardware, that these devices leak side channel information that can be used to mount an attack that recovers the secret encryption key. In this paper an overlapping window power spectral density (PSD) side channel attack, targeting an FPGA device running the Advanced Encryption Standard is proposed. This improves upon previous research into PSD attacks by reducing the amount of pre-processing (effort) required. It is shown that the proposed overlapping window method requires less processing effort than that of using a sliding window approach, whilst overcoming the issues of sampling boundaries. The method is shown to be effective for both aligned and misaligned data sets and is therefore recommended as an improved approach in comparison with existing time domain based correlation attacks.