998 resultados para 319
Resumo:
Suppose two parties, holding vectors A = (a 1,a 2,...,a n ) and B = (b 1,b 2,...,b n ) respectively, wish to know whether a i > b i for all i, without disclosing any private input. This problem is called the vector dominance problem, and is closely related to the well-studied problem for securely comparing two numbers (Yao’s millionaires problem). In this paper, we propose several protocols for this problem, which improve upon existing protocols on round complexity or communication/computation complexity.
Resumo:
In creative disciplines, reflective practice is an integral and cumulative form of learning. Reflective learning generates knowledge that is specific to oneself and is a form of evidence upon which to analyse and change one’s practice. Critical reflection requires a deep knowledge of the discipline and an awareness of one’s positioning within that discipline and in relation to one’s creative performance. Meaning making through performative expression allows for personal transformation through acute awareness of and reflection on one’s own beliefs, knowledges and values through the process of creating artistic work. Self-awareness and identity are significant both in the study of the arts and in becoming an artist, as aesthetic inquiry and performance are constituted by subjective self-expression in relation to objective conditions. Reflection can be expressed using symbols or semiotic systems other than language. Depending on the disciplinary context, particular modes or forms of expression will be privileged, including material forms of practice, still and moving images, music and sound, live action and digital code. This chapter explores the problematics of what counts as reflection in the arts and how reflection is represented, expressed and performed in discursive and non-discursive ways in becoming arts literate.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no bounds on the total leakage. We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage.
Resumo:
First Asia Pacific Conference, AP-BPM 2013, Beijing, China, August 29-30, 2013. Selected Papers
Resumo:
OBJECTIVE To assess the concurrent validity of fasting indexes of insulin sensitivity and secretion in - obese prepubertal (Tanner stage 1) children and pubertal (Tanner stages 2-5) glucose tolerance test (FSIVGTT) as a criterion measure. RESEARCH DESIGN AND METHODS Eighteen obese children and adolescents (11 girls and 7 boys, mean age 12.2 +/- 2.4 years, mean BMI 35.4 +/- 6.2 kg/m(2), mean BMI-SDS 3.5 +/- 0.5, 7 prepubertal and I I pubertal) participated in the study. All participants underwent an insulin-modified FSIVGTT on two occasions, and 15 repeated this test a third time (mean 12.9 and 12.0 weeks apart). S-i measured by the FSIVGTT was compared with homeostasis model assessment (HOMA) of insulin resistance (HOMA-IR), quantitative insulin-sensitivity check index (QUICKI), fasting glucose-to-insulin ratio (FGIR), and fasting insulin (estimates of insulin sensitivity derived from fasting samples). The acute insulin response (AIR) measured by the FSIVGTT was compared with HOMA of percent beta-cell function (HOMA-beta%), FGIR, and fasting insulin (estimates of insulin secretion derived from fasting samples). RESULTS There was a significant negative correlation between HOMA-IR and S-i (r = -0.89, r = -0.90, and r = -0.81, P < 0.01) and a significant positive correlation between QUICKI and S-i (r = 0.89, r = 0.90, and r = 0.81, P < 0.01) at each time point. There was a significant positive correlation between FGIR and S-i (r = 0.91, r = 0.91, and r = 0.82, P < 0.01) and a significant negative correlation between fasting insulin and S-i (r = -90, r = -0.90, and r = -0.88, P < 0.01). HOMA-beta% was not as strongly correlated with AIR (r = 0.60, r = 0.54, and r = 0.61, P < 0.05). CONCLUSIONS HOMA-IR, QUICKI, FGIR, and fasting insulin correlate strongly with S-i assessed by the FSIVGTT in obese children and adolescents. Correlations between HOMA-β% FGIR and fasting insulin, and AIR were not as strong. Indexes derived from fasting samples are a valid tool for assessing insulin sensitivity in prepubertal and pubertal obese children.
Resumo:
The structures of the ammonium salts of 3,5-dinitrobenzoic acid, NH4+ C7H3N2O6- (I), 4-nitrobenzoic acid, NH4+ C7H4N2O4- . 2H2O (II) and 2,4-dichlorobenzoic acid, NH4+ C7H3Cl2O2- . 0.5H2O (III), have been determined and their hydrogen-bonded structures are described. All salts form hydrogen-bonded polymeric structures, three-dimensional in (I) and two-dimensional in (II) and (III). With (I), a primary cation-anion cyclic association is formed [graph set R3/4(10)] through N-H...O hydrogen bonds, involving a carboxyl O,O' group on one side and a single carboxyl O-atom on the other. Structure extension involves both N-H...O hydrogen bonds to both carboxyl and nitro O-atom acceptors. With structure (II), the primary inter-species interactions and structure extension into layers lying parallel to (0 0 1) are through conjoined cyclic hydrogen-bonding motifs: R3/4(10) [one cation, a carboxyl (O,O') group and two water molecules] and centrosymmetric R2/4(8) [two cations and two water molecules]. The structure of (III) also has conjoined R3/4(10) and centrosymmetric R2/4(8) motifs in the layered structure but these differ in that he first involves one cation, a carboxyl (O,O') as well as a carboxyl (O) group and one water molecule, the second, two cations and two carboxyl O-groups. The layers lie parallel to (1 0 0). The structures of the salt hydrates (II) and (III) reported in this work, giving two-dimensional layered arrays through conjoined hydrogen-bonded nets provide further illustrations of a previously indicated trend among ammonium salts of carboxylic acids, but the anhydrous three-dimensional structure of (I) is inconsistent.
Resumo:
With the growing size and variety of social media files on the web, it’s becoming critical to efficiently organize them into clusters for further processing. This paper presents a novel scalable constrained document clustering method that harnesses the power of search engines capable of dealing with large text data. Instead of calculating distance between the documents and all of the clusters’ centroids, a neighborhood of best cluster candidates is chosen using a document ranking scheme. To make the method faster and less memory dependable, the in-memory and in-database processing are combined in a semi-incremental manner. This method has been extensively tested in the social event detection application. Empirical analysis shows that the proposed method is efficient both in computation and memory usage while producing notable accuracy.
Resumo:
The effects of crack depth (a/W) and specimen width W on the fracture toughness and ductile±brittle transition have been investigated using three-point bend specimens. Finite element analysis is employed to obtain the stress-strain fields ahead of the crack tip. The results show that both normalized crack depth (a/W) and specimen width (W) affect the fracture toughness and ductile±brittle fracture transition. The measured crack tip opening displacement decreases and ductile±brittle transition occurs with increasing crack depth (a/W) from 0.1 to 0.2 and 0.3. At a fixed a/W (0.2 or 0.3), all specimens fail by cleavage prior to ductile tearing when specimen width W increases from 25 to 40 and 50 mm. The lower bound fracture toughness is not sensitive to crack depth and specimen width. Finite element analysis shows that the opening stress in the remaining ligament is elevated with increasing crack depth or specimen width due to the increase of in-plane constraint. The average local cleavage stress is dependent on both crack depth and specimen width but its lower bound value is not sensitive to constraint level. No fixed distance can be found from the cleavage initiation site to the crack tip and this distance increases gradually with decreasing inplane constraint.
Resumo:
Over the last three decades, a growing body of research related to epistemic beliefs has been identified as a crucial for understanding teaching and learning (Yadav, Herron, & Samarapungavan, 2011). In particular, research related to beliefs about teaching, learning and knowledge has been considered important for understanding why teachers engage in certain approaches to pedagogy, curriculum and assessment in classrooms (Stromlo & Bråten, 2011). The beliefs held by teachers about knowledge and knowing, otherwise known as personal epistemology (Hofer, 2010), have been shown to influence other knowledge and beliefs (Schommer-Aikens, 2004). Five and Buehl (2012) indicated that because an individual’s understanding of reality is always seen through the lens of existing beliefs, the role of beliefs as a filter is particularly relevant in the context of teacher education. That is, if beliefs influence how individuals interpret new information and experiences, preservice and practicing teachers’ beliefs shape what and how they learn about teaching.” (p. 470-480). It is likely that such beliefs have an important relationship with teacher knowledge and practices...
Resumo:
Mothers represent a large segment of marketing dollars and traditionally, word of mouth was spread from mother to mother in a face-to-face environment, such as the school car park or mother’s groups. As families have evolved, so too has the traditional mother’s group. Limited academic studies have explored online mothers’ groups and how they impact on consumption. In order to explore the nature of this online influence and how mothers are influenced by other mothers online, a study was conducted through the use of observation and qualitative questioning. The data suggests that trust between mothers is generally high and mothers tend to trust the opinions of other mothers when they recommend a product. This is similar in other reference group contexts, however, mothers are communicating about brands frequently and influencing behaviour. This leads to a number of managerial and theoretical implications discussed in the paper.
Resumo:
Existing techniques for automated discovery of process models from event logs largely focus on extracting flat process models. In other words, they fail to exploit the notion of subprocess, as well as structured error handling and repetition constructs provided by contemporary process modeling notations, such as the Business Process Model and Notation (BPMN). This paper presents a technique for automated discovery of BPMN models containing subprocesses, interrupting and non-interrupting boundary events, and loop and multi-instance markers. The technique analyzes dependencies between data attributes associated with events, in order to identify subprocesses and to extract their associated logs. Parent process and subprocess models are then discovered separately using existing techniques for flat process model discovery. Finally, the resulting models and logs are heuristically analyzed in order to identify boundary events and markers. A validation with one synthetic and two real-life logs shows that process models derived using the proposed technique are more accurate and less complex than those derived with flat process model discovery techniques.
Resumo:
Researchers are increasingly grappling with ways of theorizing social media and its use. This review essay proposes that the theory of Information Grounds (IG) may provide a valuable lens for understanding how social media fosters collaboration and social engagement among information professionals. The paper presents literature that helps us understand how social media can be seen as IG, and maps the characteristics of social media to the seven propositions of IG theory. This work is part of a wider study investigating the ways in which Information Technology (IT) professionals experience social media.
Resumo:
The use of Wireless Sensor Networks (WSNs) for vibration-based Structural Health Monitoring (SHM) has become a promising approach due to many advantages such as low cost, fast and flexible deployment. However, inherent technical issues such as data asynchronicity and data loss have prevented these distinct systems from being extensively used. Recently, several SHM-oriented WSNs have been proposed and believed to be able to overcome a large number of technical uncertainties. Nevertheless, there is limited research verifying the applicability of those WSNs with respect to demanding SHM applications like modal analysis and damage identification. Based on a brief review, this paper first reveals that Data Synchronization Error (DSE) is the most inherent factor amongst uncertainties of SHM-oriented WSNs. Effects of this factor are then investigated on outcomes and performance of the most robust Output-only Modal Analysis (OMA) techniques when merging data from multiple sensor setups. The two OMA families selected for this investigation are Frequency Domain Decomposition (FDD) and data-driven Stochastic Subspace Identification (SSI-data) due to the fact that they both have been widely applied in the past decade. Accelerations collected by a wired sensory system on a large-scale laboratory bridge model are initially used as benchmark data after being added with a certain level of noise to account for the higher presence of this factor in SHM-oriented WSNs. From this source, a large number of simulations have been made to generate multiple DSE-corrupted datasets to facilitate statistical analyses. The results of this study show the robustness of FDD and the precautions needed for SSI-data family when dealing with DSE at a relaxed level. Finally, the combination of preferred OMA techniques and the use of the channel projection for the time-domain OMA technique to cope with DSE are recommended.
Resumo:
Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.
Resumo:
Business Process Management has substantially matured over the last two decades. The techniques, methods and systems available to scope, model, analyze, implement, execute, monitor and even mine a process have been scientifically researched and can be in most cases deployed in practice. In fact, many of these BPM capabilities are nowadays a commodity. However, an opportunity-rich environment and rapidly emerging digital disruptions require new BPM capabilities. In light of this context, this paper proposes three future research and development directions for BPM academics and professionals. First, Ambidextrous BPM demands the shift of focus from exploitative to explorative BPM. Second, Value-driven BPM postulates a stronger focus on the desired outcomes as opposed to the available BPM methods. Third, Customer Process Management suggests complementing the dominating internal view of BPM with a stronger, design-inspired view on the process experiences of external stakeholders.