918 resultados para Chevrolet Citation.
Resumo:
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
Early works on Private Information Retrieval (PIR) focused on minimizing the necessary communication overhead. They seemed to achieve this goal but at the expense of query response time. To mitigate this weakness, protocols with secure coprocessors were introduced. They achieve optimal communication complexity and better online processing complexity. Unfortunately, all secure coprocessor-based PIR protocols require heavy periodical preprocessing. In this paper, we propose a new protocol, which is free from the periodical preprocessing while offering the optimal communication complexity and almost optimal online processing complexity. The proposed protocol is proven to be secure.
Resumo:
Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restored from the watermarked relation) and/or non-blind (requiring original relation to detect the watermark in watermarked relation). This model has several disadvantages over reversible and blind watermarking (requiring only watermarked relation and secret key from which the watermark is detected and original relation is restored) including inability to identify rightful owner in case of successful secondary watermarking, inability to revert the relation to original data set (required in high precision industries) and requirement to store unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store original database at a secure secondary storage.
Resumo:
In many cities around the world, surveillance by a pervasive net of CCTV cameras is a common phenomenon in an attempt to uphold safety and security across the urban environment. Video footage is being recorded and stored, sometimes live feeds are being watched in control rooms hidden from public access and view. In this study, we were inspired by Steve Mann’s original work on sousveillance (surveillance from below) to examine how a network of camera equipped urban screens could allow the residents of Oulu in Finland to collaborate on the safekeeping of their city. An agile, rapid prototyping process led to the design, implementation and ‘in the wild’ deployment of the UbiOpticon screen application. Live video streams captured by web cams integrated at the top of 12 distributed urban screens were broadcast and displayed in a matrix arrangement on all screens. The matrix also included live video streams of two roaming mobile phone cameras. In our field study we explored the reactions of passers-by and users of this screen application that seeks to inverse Bentham’s original panopticon by allowing the watched to be watchers at the same time. In addition to the original goal of participatory sousveillance, the system’s live video feature sparked fun and novel user-led apprlopriations.
Resumo:
Falling prices have led to an ongoing spread of public displays in urban areas. Still, they mostly show passive content such as commercials and digital signage. At the same time, technological advances have enabled the creation of interactive displays potentially increasing their attractiveness for the audience, e.g. through providing a platform for civic discourse. This poses considerable challenges, since displays need to communicate the opportunity to engage, motivate the audience to do so, and be easy to use. In this paper we present Vote With Your Feet, a hyperlocal public polling tool for urban screens allowing users to express their opinions. Similar to vox populi interviews on TV or polls on news websites, the tool is meant to reflect the mindset of the community on topics such as current affairs, cultural identity and local matters. It is novel in that it focuses on a situated civic discourse and provides a tangible user interface, tackling the mentioned challenges. It shows one Yes/No question at a time and enables users to vote by stepping on one of two tangible buttons on the ground. This user interface was introduced to attract people’s attention and to lower participation barriers. Our field study showed that Vote With Your Feet is perceived as inviting and that it can spark discussions among co-located people.
Resumo:
This paper examines collaborative researcher-practitioner knowledge work around assessment data in culturally diverse, low- socioeconomic school communities in Queensland, Australia. Specifically, the paper draws on interview accounts about the work of a bridging knowledge flows between a local university and a cluster of schools. We draw on Bernstein’s (2000) concept of recontextualisation to explore the processes of knowledge mediation in dialogues around student assessment data to design instructional innovations. We argue that critical policy studies need to explore the complex ways in which neoliberal education policies are enacted in local sites. Moreover, we suggest that an analysis of collaborative knowledge work designed to improve student learning outcomes in low-socioeconomic school communities necessitates attention to the principles regulating knowledge flows across boundaries. In addition, it necessitates attention to the ways in which mediators navigate dilemmatic spaces, anxieties and affects/feelings in order to generate innovative learning designs in the current global context of high-stakes national testing and accountability regimes.
Resumo:
In this paper we describe the use and evaluation of CubIT, a multi-user, very large-scale presentation and collaboration framework. CubIT is installed at the Queensland University of Technology’s (QUT) Cube facility. The “Cube” is an interactive visualisation facility made up of five very large-scale interactive multi-panel wall displays, each consisting of up to twelve 55-inch multi-touch screens (48 screens in total) and massive projected display screens situated above the display panels. The paper outlines the unique design challenges, features, use and evaluation of CubIT. The system was built to make the Cube facility accessible to QUT’s academic and student population. CubIT enables users to easily upload and share their own media content, and allows multiple users to simultaneously interact with the Cube’s wall displays. The features of CubIT are implemented via three user interfaces, a multi-touch interface working on the wall displays, a mobile phone and tablet application and a web-based content management system. The evaluation reveals issues around the public use and functional scope of the system.
Resumo:
Social media tools are starting to become mainstream and those working in the software development industry are often ahead of the game in terms of using current technological innovations to improve their work. With the advent of outsourcing and distributed teams the software industry is ideally placed to take advantage of social media technologies, tools and environments. This paper looks at how social media is being used by early adopters within the software development industry. Current tools and trends in social media tool use are described and critiqued: what works and what doesn't. We use industrial case studies from platform development, commercial application development and government contexts which provide a clear picture of the emergent state of the art. These real world experiences are then used to show how working collaboratively in geographically dispersed teams, enabled by social media, can enhance and improve the development experience.
Resumo:
The advent of the Internet of Things creates an interest in how people might interrelate through and with networks of internet enabled objects. With an emphasis on fostering social connection and physical activity among older people, this preliminary study investigated objects that people over the age of 65 years viewed as significant to them. We conducted contextual interviews in people's homes about their significant objects in order to understand the role of the objects in their lives, the extent to which they fostered emotional and social connections and physical activity, and how they might be augmented through internet connection. Discussion of significant objects generated considerable emotion in the participants. We identified objects of comfort and routine, objects that exhibited status, those that fostered independence and connection, and those that symbolized relationships with loved ones. These findings lead us to consider implications for the design of interconnected objects.
Resumo:
Australian surveys have found that only 43% of women meet the current recommendation for regular moderate physical activity, and that women who are mothers of young children are even less likely to be adequately active for health benefit. These women spend a significant proportion of their day in occupational, household and care-giving activities, which may not be ‘captured’ in conventional physical activity surveys. The purpose of this study was to compare physical activity in young mothers and age-matched controls using three different measures of physical activity. 35 women (16 mothers of young children, M) and 19 age-matched comparison women (NM) completed a survey which asked about walking to and from places, and about moderate and vigorous activity in leisure time and at work (paid and unpaid). They also kept a detailed diary of all their activities for two week-days and two week-end days, and wore a pedometer (Yamax digiwalker) on these days. Each activity in the diary was assigned an energy expenditure (EE) score based on it's intensity (Compendium of Physical Activity) and time spent in that activity. There were no differences between M and NM for pedometer steps (M: 9270 sd 2947; NM: 9768 sd 3051) or for daily energy expenditure (EE) calculated from the diaries (M: 2029 sd 189; NM: 2015 sd 169 METS.mins) or survey (M: 2079 sd 448; NM: 1495 sd 325). There was a significant correlation between pedometer steps and daily METs.mins estimated from the diaries (r = 0.35, p = 0.04); however no relationship was observed between pedometer steps and EE from the survey (r = .09, p = .56). Further analysis of the individual survey items found pedometer steps to be related to EE from walking to and from places (r = .34) and leisure time (r = .31), but not work related activity (r = -.08). There were no significant relationships between EE computed from the diaries and any of the survey questions. The three activity measures indicate that the physical activity levels of the young mothers in our sample were comparable to age-matched non-mothers. The results of the correlation analyses highlight the difficulty of assessing low-intensity work-related physical activity via self-report. Supported by Australian Commonwealth Department of Health and Aged Care.
Resumo:
Aim To evaluate emergency nurse practitioner service effectiveness on outcomes related to quality of care and service responsiveness. Background Increasing service pressures in the emergency setting have resulted in the adoption of service innovation models; the most common and rapidly expanding of these is the emergency nurse practitioner. The delivery of high quality patient care in the emergency department is one of the most important service indicators to be measured in health services today. The rapid uptake of emergency nurse practitioner service in Australia has outpaced the capacity to evaluate this model in outcomes related to safety and quality of patient care. Design Pragmatic randomized controlled trial at one site with 260 participants. Methods This protocol describes a definitive prospective randomized controlled trial, which will examine the impact of emergency nurse practitioner service on key patient care and service indicators. The study control will be standard emergency department care. The intervention will be emergency nurse practitioner service. The primary outcome measure is pain score reduction and time to analgesia. Secondary outcome measures are waiting time, number of patients who did not wait, length of stay in the emergency department and representations within 48 hours. Discussion Scant research enquiry evaluating emergency nurse practitioner service on patient effectiveness and service responsiveness exists currently. This study is a unique trial that will test the effectiveness of the emergency nurse practitioner service on patients who present to the emergency department with pain. The research will provide an opportunity to further evaluate emergency nurse practitioner models of care and build research capacity into the workforce.
Resumo:
Purpose The aim of this study was to assess the predictive validity of three accelerometer prediction equations (Freedson et aL, 1997; Trost et aL, 1998; Puyau et al., 2002) for energy expenditure (EE) during overland walking and running in children and adolescents. Methods 45 healthy children and adolescents aged 10-18 completed the following protocol, each task 5-mins in duration, with a 5-min rest period in between; walking normally; walking briskly; running easily and running fast. During each task participants wore MTI (WAM 7164) Actigraphs on the left and right hips. VO2 was monitored breath by breath using the Cosmed K4b2 portable indirect calorimetry system. For each prediction equation, difference scores were calculated as EE measured minus EE predicted. The percentage of 1-min epochs correctly categorized as light (<3 METs), moderate (3-5.9 METs), and vigorous (≥6 METS) was also calculated. Results The Freedson and Trost equations consistently overestimated MET level. The level of overestimation was statistically significant across all tasks for the Freedson equation, and was significant for only the walking tasks for the Trost equation. The Puyau equation consistently underestimated AEE with the exception of the walking normally task. In terms of categorisation, the Freedson equation (72.8% agreement) demonstrated better agreement than the Puyau (60.6%). Conclusions These data suggest that the three accelerometer prediction equations do not accurately predict EE on a minute-by-minute basis in children and adolescents during overland walking and running. However, the cut points generated by these equations maybe useful for classifying activity as either, light, moderate, or vigorous.
Resumo:
The search is ongoing for the perfect researcher profile with fully integrated citations, plus links to publications, research data, esteem measures, media releases, plus social media feeds and links to the researchers place of work.
Resumo:
In this paper we describe the preliminary results of a field study which evaluated the use of MiniOrb, a system that employs ambient and tangible interaction mechanisms to allow inhabitants of office environments to report on subjectively perceived office comfort levels. The purpose of this study was to explore the role of ubiquitous computing in the individual control of indoor climate and specifically answer the question to what extent ambient and tangible interaction mechanisms are suited for the task of capturing individual comfort preferences in a non-obtrusive manner. We outline the preliminary results of an in-situ trial of the system.