931 resultados para hard proof


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A degree of judicial caution in accepting the assertion of a plaintiff as to what he or she would have done, if fully informed of risks, is clearly evident upon a review of decisions applying the common law. Civil liability legislation in some jurisdictions now precludes assertion evidence by a plaintiff. Although this legislative change was seen as creating a significant challenge for plaintiffs seeking to discharge the onus of proof of establishing causation in such cases, recent decisions suggest a more limited practical effect. While a plaintiff’s ex post facto assertions as to what he or she would have done if fully informed of risks may now be inadmissible, objective and subjective evidence as to the surrounding facts and circumstances, in particular the plaintiff’s prior attitudes and conduct, and the assertion evidence of others remains admissible. Given the court’s reliance on both objective and subjective evidence, statistical evidence may be of increasing importance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a client to solve some moderately hard problem before being granted access to a resource. However, recent client puzzle difficulty definitions (Stebila and Ustaoglu, 2009; Chen et al., 2009) do not ensure that solving n puzzles is n times harder than solving one puzzle. Motivated by examples of puzzles where this is the case, we present stronger definitions of difficulty for client puzzles that are meaningful in the context of adversaries with more computational power than required to solve a single puzzle. A protocol using strong client puzzles may still not be secure against DoS attacks if the puzzles are not used in a secure manner. We describe a security model for analyzing the DoS resistance of any protocol in the context of client puzzles and give a generic technique for combining any protocol with a strong client puzzle to obtain a DoS-resistant protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

During secondary fracture healing, various tissue types including new bone are formed. The local mechanical strains play an important role in tissue proliferation and differentiation. To further our mechanobiological understanding of fracture healing, a precise assessment of local strains is mandatory. Until now, static analyses using Finite Elements (FE) have assumed homogenous material properties. With the recent quantification of both the spatial tissue patterns (Vetter et al., 2010) and the development of elastic modulus of newly formed bone during healing (Manjubala et al., 2009), it is now possible to incorporate this heterogeneity. Therefore, the aim of this study is to investigate the effect of this heterogeneity on the strain patterns at six successive healing stages. The input data of the present work stemmed from a comprehensive cross-sectional study of sheep with a tibial osteotomy (Epari et al., 2006). In our FE model, each element containing bone was described by a bulk elastic modulus, which depended on both the local area fraction and the local elastic modulus of the bone material. The obtained strains were compared with the results of hypothetical FE models assuming homogeneous material properties. The differences in the spatial distributions of the strains between the heterogeneous and homogeneous FE models were interpreted using a current mechanobiological theory (Isakson et al., 2006). This interpretation showed that considering the heterogeneity of the hard callus is most important at the intermediate stages of healing, when cartilage transforms to bone via endochondral ossification.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bana et al. proposed the relation formal indistinguishability (FIR), i.e. an equivalence between two terms built from an abstract algebra. Later Ene et al. extended it to cover active adversaries and random oracles. This notion enables a framework to verify computational indistinguishability while still offering the simplicity and formality of symbolic methods. We are in the process of making an automated tool for checking FIR between two terms. First, we extend the work by Ene et al. further, by covering ordered sorts and simplifying the way to cope with random oracles. Second, we investigate the possibility of combining algebras together, since it makes the tool scalable and able to cover a wide class of cryptographic schemes. Specially, we show that the combined algebra is still computationally sound, as long as each algebra is sound. Third, we design some proving strategies and implement the tool. Basically, the strategies allow us to find a sequence of intermediate terms, which are formally indistinguishable, between two given terms. FIR between the two given terms is then guaranteed by the transitivity of FIR. Finally, we show applications of the work, e.g. on key exchanges and encryption schemes. In the future, the tool should be extended easily to cover many schemes. This work continues previous research of ours on use of compilers to aid in automated proofs for key exchange.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present new expected risk bounds for binary and multiclass prediction, and resolve several recent conjectures on sample compressibility due to Kuzmin and Warmuth. By exploiting the combinatorial structure of concept class F, Haussler et al. achieved a VC(F)/n bound for the natural one-inclusion prediction strategy. The key step in their proof is a d=VC(F) bound on the graph density of a subgraph of the hypercube—one-inclusion graph. The first main result of this report is a density bound of n∙choose(n-1,≤d-1)/choose(n,≤d) < d, which positively resolves a conjecture of Kuzmin and Warmuth relating to their unlabeled Peeling compression scheme and also leads to an improved one-inclusion mistake bound. The proof uses a new form of VC-invariant shifting and a group-theoretic symmetrization. Our second main result is an algebraic topological property of maximum classes of VC-dimension d as being d-contractible simplicial complexes, extending the well-known characterization that d=1 maximum classes are trees. We negatively resolve a minimum degree conjecture of Kuzmin and Warmuth—the second part to a conjectured proof of correctness for Peeling—that every class has one-inclusion minimum degree at most its VC-dimension. Our final main result is a k-class analogue of the d/n mistake bound, replacing the VC-dimension by the Pollard pseudo-dimension and the one-inclusion strategy by its natural hypergraph generalization. This result improves on known PAC-based expected risk bounds by a factor of O(log n) and is shown to be optimal up to a O(log k) factor. The combinatorial technique of shifting takes a central role in understanding the one-inclusion (hyper)graph and is a running theme throughout

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Frock Paper Scissors magazine (and accompanying web site, www.frockpapersissors.com ) has been the focus of assessment in a Fashion and Style Journalism unit from 2006 to 2011 (current). The research has focused on the ways in which synergies across disciplines can be developed through student engagement on authentic projects (with a public audience). Up to 80 students from the Fashion Design, Journalism, Media Communication, Creative Industries, Business, Creative Writing and Communication Design discipline areas in the Creative Industries Faculty at Queensland University of Technology (QUT) work on the content, production, layout and funding for the Frock Paper Scissors magazine (and web site). Research focusses on how this authentic assessment task has been integrated into the classes; discussing the approaches taken by teaching staff, the challenges faced, and the ways in which student learning outcomes have been improved and their career outcomes enhanced. The final output requires staff to curate a professional hard copy fashion magazine(and website) where 5,000 copies are distributed annually throughout south east Queensland, Sydney, Melbourne, London, New York and Amsterdam.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 1944 Australian author Eleanor Dark wrote that Australia is a hard country for an outsider to see, citing, in evidence, the writing of the “strange, foreign-looking little man with the beard” -- the self-described by D. H. Lawrence. According to Dark, Lawrence was bewildered by Australia because what his eyes saw was not what they were accustomed to seeing. Kangaroo, she wrote, suggests one long, tormented effort to see. Lawrence appears, for Dark, to be half-blind, struggling, and irritated almost beyond belief with his visit to New South Wales. Eleanor Dark wrote this critique in 1944, long after Lawrence’s 1922 visit, but for her, as for other Australian writers, Kangaroo continued to register as an important book, even if the content rankled. Katharine Susannah Prichard and Christina Stead, both advocates in general of Lawrence, likewise rejected the tenor of Kangaroo, although Lawrence would not have been worried about the response. In 1929 he referred to his irritation with Australia in letters to P.R. “Inky” Stephensen, the Australian nationalist and publisher, and he does not seem to have changed his opinions since writing Kangaroo. Yet the novel continued to be significant for Australian writers, even if as a provocation. My discussion traces the responses of the women authors to Kangaroo, and refers to Lawrence’s letters to Stephensen, as a way of emphasizing this significance, seen especially in relation to ideas about ‘seeing’ and the Australian landscape.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This Exceptional Teachers for Disadvantaged Schools (ETDS) project sets out to design a new model of Australian teacher education responding to recent demands for quality education in low SES and disadvantaged schools. The project moves teacher education from the ‘missionary’ (Larabee, 2010) or deficit (Comber and Kamler 2004; Flessa, 2007) approaches, towards a focus on notions of quality and academic excellence. Rice (2008, p.1) argues for a need to place more of the “very best teachers into the most challenging schools”, yet the problem is not merely one of training more teachers, for disadvantaged schools already receive disproportionate numbers of beginning teachers (Connell, 1994; Vickers & Ferfolja, 2006). Rather, Grossman and Loeb (2010, p. 245) argue the problem centers on the common practice of “[p]lacing the least experienced teachers with the most needy students”. This paper reports on the first year trial of the project. The ETDS project is at present, the only mainstream Australian teacher education model that targets cohorts of academically high achieving pre-service teachers with the overt aim of preparing graduates of the program to teach in disadvantaged schools. At the end of its first year, the ETDS program graduated 20 new teachers, each of whom had over the previous 18 months engaged with a specialized curriculum and carefully monitored/scaffolded practicum placements in disadvantaged schools around Brisbane, Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this paper is to bring leadership context into sharper focus and to suggest there are strong constraints on public leaders’ discretion to lead in ways consistent with NPM or NPL. Much of the existing public leadership research focuses on the individual leader and tends to give little attention to the influence of context. This lack of focus on leader context adversely affects our ability to build public leadership capacity. We draw on prior research to establish that (1) there are strong contextual constraints on public leaders’ capacity to lead in ways consistent with NPL, (2) public leaders are subject to contradictory messages and for the most part these contradictions are unacknowledged and unresolved, the impact of which is confusion and informal power-politics, (3) the task of leader transition from traditional leadership to new public leadership is very much underestimated and requires a new way to think about leadership development. On the basis of this analysis, we argue that public leaders find themselves between a rock and a hard place.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The native cottontail rabbit papillomavirus (CRPV) L1 capsid protein gene was expressed transgenically via Agrobacterium tumefaciens transformation and transiently via a tobacco mosaic virus (TMV) vector in Nicotiana spp. L1 protein was detected in concentrated plant extracts at concentrations up to 1.0 mg/kg in transgenic plants and up to 0.4 mg/kg in TMV-infected plants. The protein did not detectably assemble into viruslike particles; however, immunoelectron microscopy showed presumptive pentamer aggregates, and extracted protein reacted with conformation-specific and neutralizing monoclonal antibodies. Rabbits were injected with concentrated protein extract with Freund's incomplete adjuvant. All sera reacted with baculovirus-produced CRPV L1; however, they did not detectably neutralize infectivity in an in vitro assay. Vaccinated rabbits were, however, protected against wart development on subsequent challenge with live virus. This is the first evidence that a plant-derived papillomavirus vaccine is protective in an animal model and is a proof of concept for human papillomavirus vaccines produced in plants. Copyright © 2006, American Society for Microbiology. All Rights Reserved.