131 resultados para Secure multiparty computation cryptography


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We are currently in the midst of a second quantum revolution. The first quantum revolution gave us new rules that govern physical reality. The second quantum revolution will take these rules and use them to develop new technologies. In this review we discuss the principles upon which quantum technology is based and the tools required to develop it. We discuss a number of examples of research programs that could deliver quantum technologies in coming decades including: quantum information technology, quantum electromechanical systems, coherent quantum electronics, quantum optics and coherent matter technology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe a method by which the decoherence time of a solid-state qubit may be measured. The qubit is coded in the orbital degree of freedom of a single electron bound to a pair of donor impurities in a semiconductor host. The qubit is manipulated by adiabatically varying an external electric field. We show that by measuring the total probability of a successful qubit rotation as a function of the control field parameters, the decoherence rate may be determined. We estimate various system parameters, including the decoherence rates due to electromagnetic fluctuations and acoustic phonons. We find that, for reasonable physical parameters, the experiment is possible with existing technology. In particular, the use of adiabatic control fields implies that the experiment can be performed with control electronics with a time resolution of tens of nanoseconds.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We demonstrate complete characterization of a two-qubit entangling process-a linear optics controlled-NOT gate operating with coincident detection-by quantum process tomography. We use a maximum-likelihood estimation to convert the experimental data into a physical process matrix. The process matrix allows an accurate prediction of the operation of the gate for arbitrary input states and a calculation of gate performance measures such as the average gate fidelity, average purity, and entangling capability of our gate, which are 0.90, 0.83, and 0.73, respectively.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a scheme which offers a significant reduction in the resources required to implement linear optics quantum computing. The scheme is a variation of the proposal of Knill, Laflamme and Milburn, and makes use of an incremental approach to the error encoding to boost probability of success.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

wPrey species show specific adaptations that allow recognition, avoidance and defense against predators. For many mammalian species this includes sensitivity towards predator-derived odors. The typical sources of such odors include predator skin and fur, urine, feces and anal gland secretions. Avoidance of predator odors has been observed in many mammalian prey species including rats, mice, voles, deer, rabbits, gophers, hedgehogs, possums and sheep. Field and laboratory studies show that predator odors have distinctive behavioral effects which include (1) inhibition of activity, (2) suppression of non-defensive behaviors such as foraging, feeding and grooming, and (3) shifts to habitats or secure locations where such odors are not present. The repellent effect of predator odors in the field may sometimes be of practical use in the protection of crops and natural resources, although not all attempts at this have been successful. The failure of some studies to obtain repellent effects with predator odors may relate to (1) mismatches between the predator odors and prey species employed, (2) strain and individual differences in sensitivity to predator odors, and (3) the use of predator odors that have low efficacy. In this regard, a small number of recent studies have suggested that skin and fur-derived predator odors may have a more profound lasting effect on prey species than those derived from urine or feces. Predator odors can have powerful effects on the endocrine system including a suppression of testosterone and increased levels of stress hormones such as corticosterone and ACTH. Inhibitory effects of predator odors on reproductive behavior have been demonstrated, and these are particularly prevalent in female rodent species. Pregnant female rodents exposed to predator odors may give birth to smaller litters while exposure to predator odors during early life can hinder normal development. Recent research is starting to uncover the neural circuitry activated by predator odors, leading to hypotheses about how such activation leads to observable effects on reproduction, foraging and feeding. (c) 2005 Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Qu-Prolog is an extension of Prolog which performs meta-level computations over object languages, such as predicate calculi and lambda-calculi, which have object-level variables, and quantifier or binding symbols creating local scopes for those variables. As in Prolog, the instantiable (meta-level) variables of Qu-Prolog range over object-level terms, and in addition other Qu-Prolog syntax denotes the various components of the object-level syntax, including object-level variables. Further, the meta-level operation of substitution into object-level terms is directly represented by appropriate Qu-Prolog syntax. Again as in Prolog, the driving mechanism in Qu-Prolog computation is a form of unification, but this is substantially more complex than for Prolog because of Qu-Prolog's greater generality, and especially because substitution operations are evaluated during unification. In this paper, the Qu-Prolog unification algorithm is specified, formalised and proved correct. Further, the analysis of the algorithm is carried out in a frame-work which straightforwardly allows the 'completeness' of the algorithm to be proved: though fully explicit answers to unification problems are not always provided, no information is lost in the unification process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2007 Associate Professor Jay Hall retires from the University of Queensland after more than 30 years of service to the Australian archaeological community. Celebrated as a gifted teacher and a pioneer of Queensland archaeology, Jay leaves a rich legacy of scholarship and achievement across a wide range of archaeological endeavours. An Archæological Life brings together past and present students, colleagues and friends to celebrate Jay’s contributions, influences and interests.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authorised trustee status is a legal concept which has economic implications; one of the major implications is that it assists in the direction of investment funds into particular securities and areas of the economy. The concept of authorised trustee status, while attempting to achieve specific outcomes for the beneficiaries of trusts cannot be relied upon to secure these results. Economic analysis of the role of the trustee maintains that this role is one of portfolio manager; a role which is complex but which is explicable in terms of definable procedures and practices. The role of trustee as portfolio manager is one which requires greater financial knowledge than can be assumed is possessed by all trustees. The trustee as portfolio manager is required to maintain a review of decisions make under powers to invest trust assets. A solution to the problem of authorised trustee status is proposed. The solution takes two parts: the first is the adoption of the prudent person approach but with the codification of duties of the trustee and the explicit listing of the factors that a trustee should consider in using the investment powers. The second part of the proposed solution is to link the investment powers of trustees to the best practice features of securities advisers who are now licensed by a regulatory body, the Australian Securities and Investment Commission.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study contrasts the actual conservation spending and the Australian public’s demand for conservation funding for two Australian mammal species, the koala and the northern hairy-nosed wombat. It involves a survey of 204 members of the Australian public. Willingness to fund conservation action to protect the northern hairy-nosed wombat was found to be higher than that for the koala despite the koala’s immense popularity. The critically endangered status of the northern-hairy nosed wombat and the more secure conservation status of the koala is a factor likely to have influenced the comparative willingness-to-pay decisions. Actual annual conservation expenditure for both species is lower than the estimated aggregate willingness-to-pay for their conservation. Furthermore, conservation funding for the koala is much more than that for the northern hairy-nosed wombat even though the estimated public willingness-to-pay (demand) for funding koala conservation was less than for this wombat species. Reasons for this are suggested. They may also help to explain misalignment between demand for conservation funding of other species involving differences in charisma and endangerment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using a species’ population to measure its conservation status, this note explores how an increase in knowledge about this status would change the public’s willingness to donate funds for its conservation. This is done on the basis that the relationship between the level of donations and a species’ conservation status satisfies stated general mathematical properties. This level of donation increases, on average, with greater knowledge of a species’ conservation status if it is endangered, but falls if it is secure. Game theory and other theory is used to show how exaggerating the degree of endangerment of a species can be counterproductive for conservation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Managing hawksbill turtle populations for use and conservation requires (i) adequate scientific understanding of their population status and dynamics and (ii) consideration of the public’s attitudes to this species. This study employs experimental surveys to assess the Australian public’s attitudes towards the hawksbill turtle, their knowledge of it, their views about its sustainable commercial harvesting, and their support and financial contribution for the species’ conservation. Contingent valuation reveals that the Australian public’s willingness to contribute to the conservation of the hawksbill turtle is high even in comparison to threatened Australian bird and mammal fauna. Most of this stated contribution is based on the intrinsic (non-use) value associated with the hawksbill turtle. It seems that the Australian public will only accept its harvesting if the sustainability of this is assured and its population is more secure. The CITES categorisation of the hawksbill as an Appendix I species hampers the development of techniques for its sustainable use.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The anisotropic norm of a linear discrete-time-invariant system measures system output sensitivity to stationary Gaussian input disturbances of bounded mean anisotropy. Mean anisotropy characterizes the degree of predictability (or colouredness) and spatial non-roundness of the noise. The anisotropic norm falls between the H-2 and H-infinity norms and accommodates their loss of performance when the probability structure of input disturbances is not exactly known. This paper develops a method for numerical computation of the anisotropic norm which involves linked Riccati and Lyapunov equations and an associated special type equation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For a two layered long wave propagation, linearized governing equations, which were derived earlier from the Euler equations of mass and momentum assuming negligible friction and interfacial mixing are solved analytically using Fourier transform. For the solution, variations of upper layer water level is assumed to be sinosoidal having known amplitude and variations of interface level is solved. As the governing equations are too complex to solve it analytically, density of upper layer fluid is assumed as very close to the density of lower layer fluid to simplify the lower layer equation. A numerical model is developed using the staggered leap-forg scheme for computation of water level and discharge in one dimensional propagation having known amplitude for the variations of upper layer water level and interface level to be solved. For the numerical model, water levels (upper layer and interface) at both the boundaries are assumed to be known from analytical solution. Results of numerical model are verified by comparing with the analytical solutions for different time period. Good agreements between analytical solution and numerical model are found for the stated boundary condition. The reliability of the developed numerical model is discussed, using it for different a (ratio of density of fluid in the upper layer to that in the lower layer) and p (ratio of water depth in the lower layer to that in the upper layer) values. It is found that as ‘CX’ increases amplification of interface also increases for same upper layer amplitude. Again for a constant lower layer depth, as ‘p’ increases amplification of interface. also increases for same upper layer amplitude.