991 resultados para unconditional guarantees


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Performance guarantees for online learning algorithms typically take the form of regret bounds, which express that the cumulative loss overhead compared to the best expert in hindsight is small. In the common case of large but structured expert sets we typically wish to keep the regret especially small compared to simple experts, at the cost of modest additional overhead compared to more complex others. We study which such regret trade-offs can be achieved, and how. We analyse regret w.r.t. each individual expert as a multi-objective criterion in the simple but fundamental case of absolute loss. We characterise the achievable and Pareto optimal trade-offs, and the corresponding optimal strategies for each sample size both exactly for each finite horizon and asymptotically.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Follow-the-Leader (FTL) is an intuitive sequential prediction strategy that guarantees constant regret in the stochastic setting, but has poor performance for worst-case data. Other hedging strategies have better worst-case guarantees but may perform much worse than FTL if the data are not maximally adversarial. We introduce the FlipFlop algorithm, which is the first method that provably combines the best of both worlds. As a stepping stone for our analysis, we develop AdaHedge, which is a new way of dynamically tuning the learning rate in Hedge without using the doubling trick. AdaHedge refines a method by Cesa-Bianchi, Mansour, and Stoltz (2007), yielding improved worst-case guarantees. By interleaving AdaHedge and FTL, FlipFlop achieves regret within a constant factor of the FTL regret, without sacrificing AdaHedge’s worst-case guarantees. AdaHedge and FlipFlop do not need to know the range of the losses in advance; moreover, unlike earlier methods, both have the intuitive property that the issued weights are invariant under rescaling and translation of the losses. The losses are also allowed to be negative, in which case they may be interpreted as gains.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

New criteria of extended resiliency and extended immunity of vectorial Boolean functions, such as S-boxes for stream or block ciphers, were recently introduced. They are related to a divide-and-conquer approach to algebraic attacks by conditional or unconditional equations. Classical resiliency turns out to be a special case of extended resiliency and as such requires more conditions to be satisfied. In particular, the algebraic degrees of classically resilient S-boxes are restricted to lower values. In this paper, extended immunity and extended resiliency of S-boxes are studied and many characterisations and properties of such S-boxes are established. The new criteria are shown to be necessary and sufficient for resistance against the divide-and-conquer algebraic attacks by conditional or unconditional equations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters to both first and second price (Vickrey) auctions and provides full price flexibility. Both computational and communication cost are linear with the number of bidders and utilize only standard cryptographic primitives. The protocol strictly divides knowledge of the bidder's identity and their actual bids between, respectively, a registration authority and an auctioneer, who are assumed not to collude but may be separately corrupt. This assures strong bidder-anonymity, though only weak bid privacy. The protocol is structured in two phases, each involving only off-line communication. Registration, requiring the use of the public key infrastructure, is simultaneous with hash-sealed bid-commitment and generates a receipt to the bidder containing a pseudonym. This phase is followed by encrypted bid-submission. Both phases involve the registration authority acting as a communication conduit but the actual message size is quite small. It is argued that this structure guarantees non-repudiation by both the winner and the auctioneer. Second price correctness is enforced either by observing the absence of registration of the claimed second-price bid or, where registered but lower than the actual second price, is subject to cooperation by the second price bidder - presumably motivated through self-interest. The use of the registration authority in other contexts is also considered with a view to developing an architecture for efficient secure multiparty transactions

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A parallel authentication and public-key encryption is introduced and exemplified on joint encryption and signing which compares favorably with sequential Encrypt-then-Sign (ɛtS) or Sign-then-Encrypt (Stɛ) schemes as far as both efficiency and security are concerned. A security model for signcryption, and thus joint encryption and signing, has been recently defined which considers possible attacks and security goals. Such a scheme is considered secure if the encryption part guarantees indistinguishability and the signature part prevents existential forgeries, for outsider but also insider adversaries. We propose two schemes of parallel signcryption, which are efficient alternative to Commit-then-Sign-and- Encrypt (Ct&G3&S). They are both provably secure in the random oracle model. The first one, called generic parallel encrypt and sign, is secure if the encryption scheme is semantically secure against chosen-ciphertext attacks and the signature scheme prevents existential forgeries against random-message attacks. The second scheme, called optimal parallel encrypt. and sign, applies random oracles similar to the OAEP technique in order to achieve security using encryption and signature components with very weak security requirements — encryption is expected to be one-way under chosen-plaintext attacks while signature needs to be secure against universal forgeries under random-plaintext attack, that is actually the case for both the plain-RSA encryption and signature under the usual RSA assumption. Both proposals are generic in the sense that any suitable encryption and signature schemes (i.e. which simply achieve required security) can be used. Furthermore they allow both parallel encryption and signing, as well as parallel decryption and verification. Properties of parallel encrypt and sign schemes are considered and a new security standard for parallel signcryption is proposed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The software watermarking model is based on replacing jump instructions or unconditional branch statements (UBS) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and/or integrity checks change and the target address is not computed correctly. Gupta and Pieprzyk's attack uses debugger capabilities such as register and address lookup and breakpoints to minimize the requirement to manually inspect the software. Using these resources, the FBF and calls to the same is identified, correct displacement values are generated and calls to FBF are replaced by the original UBS transferring control of the attack to the correct target instruction. In this paper, we propose a watermarking model that provides security against such debugging attacks. Two primary measures taken are shifting the stack pointer modification operation from the FBF to the individual UBSs, and coding the stack pointer modification in the same language as that of the rest of the code rather than assembly language to avoid conspicuous contents. The manual component complexity increases from O(1) in the previous scheme to O(n) in our proposed scheme.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book analyses the principles underlying the construction and application of a number of boilerplate and other clauses commonly included in commercial contracts. The first Part of the work deals with general principles of interpretation. It then considers clauses which allocate commercial risk; clauses relating to performance; clauses introducing new parties by way of assignment, novation or nomination; clauses such as guarantees and indemnities which create liabilities in third parties; and dispute resolution clauses including governing law. The authors highlight common issues surrounding the application of these clauses in practice and, where appropriate, make drafting recommendations based on their analysis of case law and the operation of relevant statutes. This is a very accessible resource for all commercial practitioners.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Like the UK, Australia has a number of school nursing models and programmes. The School Based Youth Health Nurse Program (SBYHNP) is a new and unique model of school nursing in Queensland, Australia. The SBYHNP represents a philosophical and structural shift from traditional school nursing programmes. The purpose of this qualitative case study is to explore the reasons School Based Youth Health Nurses (SBYHN) leave school nursing. Sixteen in-depth interviews were conducted with participants who practiced as SBYHN and left the SBYHNP. This case study reveals six themes: The politics’: Navigating the organisational divide, 'Unconditional positive regard’: Surviving without team cohesion, 'Absolutely exhausted’: Maintaining physical and emotional strength, ‘Definitely geographical’: Managing the tyranny of time and distance, ‘If things fell into place’: Thinking about what could have been, and ‘A stepping stone’: Moving on to the next nursing position. This case study suggests nurses considering school nursing as a specialty should seek opportunity to understand this complex role, ensure realistic expectations and ndertake relevant qualifications. This approach may secure the investment made by nurses and schools and create demand for a highly sort after position.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Infection with human herpesvirus 8 (HHV-8) has been consistently linked to Kaposi's sarcoma, but its mode of transmission, association with other cancers, and interaction with the human immunodeficiency virus type 1 (HIV-1) are largely unknown. Methods Between January 1992 and December 1997, we interviewed 3591 black patients with cancer in Johannesburg and Soweto, South Africa. Blood was tested for antibodies against HIV-1 and HHV-8 in 3344 of the patients. Antibodies against HHV-8 were detected with an indirect immunofluorescence assay. The intensity of the fluorescent signal correlated well with the titers of antibodies (P<0.001). The relations among the presence of anti–HHV-8 antibodies, sociodemographic and behavioral factors, type of cancer, and the presence or absence of coexistent HIV-1 infection were examined with the use of unconditional logistic-regression models. Results Among the 3293 subjects with cancers other than Kaposi's sarcoma, the standardized seroprevalence of antibodies against HHV-8 was 32 percent, which did not differ significantly from the standardized seroprevalence among black blood donors. Among these 3293 patients, the prevalence of antibodies against HHV-8 increased with increasing age (P<0.001) and an increasing number of sexual partners (P=0.05) and decreased with increasing years of education (P=0.007); it was not strongly associated with HIV-1 infection. Anti–HHV-8 antibodies were more frequent among black than white blood donors (P<0.001). Among the 51 patients with Kaposi's sarcoma, the standardized seroprevalence of antibodies against HHV-8 was 83 percent, significantly higher than the prevalence among those without Kaposi's sarcoma (P<0.001). For 16 other specific types of cancer, including multiple myeloma (108 cases) and prostate cancer (202 cases), the variation in the standardized seroprevalence of antibodies against HHV-8 was not remarkable. At a given intensity of fluorescence of anti–HHV-8 antibodies, Kaposi's sarcoma was more frequent among HIV-1–positive patients than among those who were HIV-1–negative (P<0.001). Conclusions Among black patients with cancer in South Africa, the seroprevalence of anti–HHV-8 antibodies is high and is specifically associated with Kaposi's sarcoma, particularly at high titers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the high prevalence of infection by the Human Immunodeficiency Virus (HIV) in South Africa, information on its association with cancer is sparse. Our study was carried out to examine the relationship between HIV and a number of cancer types or sites that are common in South Africa. A total of 4,883 subjects, presenting with a cancer or cardiovascular disease at the 3 tertiary referral hospitals in Johannesburg, were interviewed and had blood tested for HIV. Odds ratios associated with HIV infection were calculated by using unconditional logistic regression models for 16 major cancer types where data was available for 50 or more patients. In the comparison group, the prevalence of HIV infection was 8.3% in males and 9.1% in females. Significant excess risks associated with HIV infection were found for Kaposi's sarcoma (OR=21.9, 95% CI=12.5–38.6), non-Hodgkin lymphoma (OR=5.0, 95%CI=2.7–9.5), vulval cancer (OR=4.8, 95%CI=1.9–12.2) and cervical cancer (OR=1.6, 95%CI=1.1–2.3) but not for any of the other major cancer types examined, including Hodgkin disease, multiple myeloma and lung cancer. In Johannesburg, South Africa, HIV infection was associated with significantly increased risks of Kaposi's sarcoma, non-Hodgkin lymphoma and cancers of the cervix and the vulva. The relative risks for Kaposi's sarcoma and non-Hodgkin lymphoma associated with HIV infection were substantially lower than those found in the West.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Kyoto Protocol is remarkable among global multilateral environmental agreements for its efforts to depoliticize compliance. However, attempts to create autonomous, arm’s length and rule-based compliance processes with extensive reliance on putatively neutral experts were only partially realized in practice in the first commitment period from 2008 to 2012. In particular, the procedurally constrained facilitative powers vested in the Facilitative Branch were circumvented, and expert review teams (ERTs) assumed pivotal roles in compliance facilitation. The ad hoc diplomatic and facilitative practices engaged in by these small teams of technical experts raise questions about the reliability and consistency of the compliance process. For the future operation of the Kyoto compliance system, it is suggested that ERTs should be confined to more technical and procedural roles, in line with their expertise. There would then be greater scope for the Facilitative Branch to assume a more comprehensive facilitative role, safeguarded by due process guarantees, in accordance with its mandate. However, if – as appears likely – the future compliance trajectories under the United Nations Framework Convention on Climate Change will include a significant role for ERTs without oversight by the Compliance Committee, it is important to develop appropriate procedural safeguards that reflect and shape the various technical and political roles these teams currently play.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2003 Robert Fardon was the first prisoner to be detained under the Dangerous Prisoners (Sexual Offenders) Act 2003 (Qld), the first of the new generation preventive detention laws enacted in Australia and directed at keeping sex offenders in prison or under supervision beyond the expiry of their sentences where a court decides, on the basis of psychiatric assessments, that unconditional release would create an unacceptable risk to the community. A careful examination of Fardon’s case shows the extent to which the administration of the regime was from the outset governed by politics and political calculation rather than the logic of risk management and community protection. In 2003 Robert Fardon was the first person detained under the Dangerous Prisoners (Sexual Offenders) Act 2003 (Qld) (hereafter DPSOA), a newly enacted Queensland law aimed at the preventive detention of sex offenders. It was the first of a new generation of such laws introduced in Australia, now also in force in NSW, Western Australia and Victoria. The laws have been widely criticized by lawyers, academics and others (Keyzer and McSherry 2009; Edgely 2007). In this article I want to focus on the details of how the Queensland law was administered in Fardon’s case, he being perhaps the most well-known prisoner detained under such laws and certainly the longest held. It will show, I hope, that seemingly abstract rule of law principles invoked by other critics are not simply abstract: they afford a crucial practical safeguard against the corruption of criminal justice in which the ends both of community protection and of justice give way to opportunistic exploitation of ‘the mythic resonance of crime and punishment for electoral purposes’ (Scheingold 1998: 888).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider online trading in a single security with the objective of getting rich when its price ever exhibits a large upcrossing, without risking bankruptcy. We investigate payoff guarantees that are expressed in terms of the extremity of the upcrossings. We obtain an exact and elegant characterisation of the guarantees that can be achieved. Moreover, we derive a simple canonical strategy for each attainable guarantee.