931 resultados para Computation by Abstract Devices
Resumo:
The Church-Turing Thesis is widely regarded as true, because of evidence that there is only one genuine notion of computation. By contrast, there are nowadays many different formal logics, and different corresponding foundational frameworks. Which ones can deliver a theory of computability? This question sets up a difficult challenge: the meanings of basic mathematical terms (like "set", "function", and "number") are not stable across frameworks. While it is easy to compare what different frameworks say, it is not so easy to compare what they mean. We argue for some minimal conditions that must be met if two frameworks are to be compared; if frameworks are radical enough, comparison becomes hopeless. Our aim is to clarify the dialectical situation in this bourgeoning area of research, shedding light on the nature of non-classical logic and the notion of computation alike.
Resumo:
Arguably, the world has become one large pervasive computing environment. Our planet is growing a digital skin of a wide array of sensors, hand-held computers, mobile phones, laptops, web services and publicly accessible web-cams. Often, these devices and services are deployed in groups, forming small communities of interacting devices. Service discovery protocols allow processes executing on each device to discover services offered by other devices within the community. These communities can be linked together to form a wide-area pervasive environment, allowing processes in one p u p tu interact with services in another. However, the costs of communication and the protocols by which this communication is mediated in the wide-area differ from those of intra-group, or local-area, communication. Communication is an expensive operation for small, battery powered devices, but it is less expensive for servem and workstations, which have a constant power supply and 81'e connected to high bandwidth networks. This paper introduces Superstring, a peer to-peer service discovery protocol optimised fur use in the wide-area. Its goals are to minimise computation and memory overhead in the face of large numbers of resources. It achieves this memory and computation scalability by distributing the storage cost of service descriptions and the computation cost of queries over multiple resolvers.
Resumo:
The aim of this study is to highlight what kind of information distinguishes abstract and concrete conceptual knowledge in different aged children. A familiarity-rating task has shown that 8-year-olds judged concrete concepts as very familiar while abstract concepts were judged as much less familiar with ratings increasing substantially from age 10 to age 12, according to literature showing that abstract terms are not mastered until adolescence (Schwanenflugel, 1991). The types of relation elicited by abstract and concrete concepts during development were investigated in an association production task. At all considered age levels, concrete concepts mainly activated attributive and thematic relations as well as, to a much lesser extent, taxonomic relations and stereotypes. Abstract concepts, instead, elicited mainly thematic relations and, to a much lesser extent, examples and taxonomic relations. The patterns of relations elicited were already differentiated by age 8, becoming more specific in abstract concepts with age.
Resumo:
The increasing dependency of everyday life on mobile devices also increases the number and complexity of computing tasks to be supported by these devices. However, the inherent requirement of mobility restricts them from being resources rich both in terms of energy (battery capacity) and other computing resources such as processing capacity, memory and other resources. This thesis looks into cyber foraging technique of offloading computing tasks. Various experiments on android mobile devices are carried out to evaluate offloading benefits in terms of sustainability advantage, prolonging battery life and augmenting the performance of mobile devices. This thesis considers two scenarios of cyber foraging namely opportunistic offloading and competitive offloading. These results show that the offloading scenarios are important for both green computing and resource augmentation of mobile devices. A significant advantage in battery life gain and performance enhancement is obtained. Moreover, cyber foraging is proved to be efficient in minimizing energy consumption per computing tasks. The work is based on scavenger cyber foraging system. In addition, the work can be used as a basis for studying cyber foraging and other similar approaches such as mobile cloud/edge computing for internet of things devices and improving the user experiences of applications by minimizing latencies through the use of potential nearby surrogates.
Resumo:
Secure computation involves multiple parties computing a common function while keeping their inputs private, and is a growing field of cryptography due to its potential for maintaining privacy guarantees in real-world applications. However, current secure computation protocols are not yet efficient enough to be used in practice. We argue that this is due to much of the research effort being focused on generality rather than specificity. Namely, current research tends to focus on constructing and improving protocols for the strongest notions of security or for an arbitrary number of parties. However, in real-world deployments, these security notions are often too strong, or the number of parties running a protocol would be smaller. In this thesis we make several steps towards bridging the efficiency gap of secure computation by focusing on constructing efficient protocols for specific real-world settings and security models. In particular, we make the following four contributions: - We show an efficient (when amortized over multiple runs) maliciously secure two-party secure computation (2PC) protocol in the multiple-execution setting, where the same function is computed multiple times by the same pair of parties. - We improve the efficiency of 2PC protocols in the publicly verifiable covert security model, where a party can cheat with some probability but if it gets caught then the honest party obtains a certificate proving that the given party cheated. - We show how to optimize existing 2PC protocols when the function to be computed includes predicate checks on its inputs. - We demonstrate an efficient maliciously secure protocol in the three-party setting.
Resumo:
The big data era has dramatically transformed our lives; however, security incidents such as data breaches can put sensitive data (e.g. photos, identities, genomes) at risk. To protect users' data privacy, there is a growing interest in building secure cloud computing systems, which keep sensitive data inputs hidden, even from computation providers. Conceptually, secure cloud computing systems leverage cryptographic techniques (e.g., secure multiparty computation) and trusted hardware (e.g. secure processors) to instantiate a “secure” abstract machine consisting of a CPU and encrypted memory, so that an adversary cannot learn information through either the computation within the CPU or the data in the memory. Unfortunately, evidence has shown that side channels (e.g. memory accesses, timing, and termination) in such a “secure” abstract machine may potentially leak highly sensitive information, including cryptographic keys that form the root of trust for the secure systems. This thesis broadly expands the investigation of a research direction called trace oblivious computation, where programming language techniques are employed to prevent side channel information leakage. We demonstrate the feasibility of trace oblivious computation, by formalizing and building several systems, including GhostRider, which is a hardware-software co-design to provide a hardware-based trace oblivious computing solution, SCVM, which is an automatic RAM-model secure computation system, and ObliVM, which is a programming framework to facilitate programmers to develop applications. All of these systems enjoy formal security guarantees while demonstrating a better performance than prior systems, by one to several orders of magnitude.
Resumo:
Tese (doutorado)—Universidade de Brasília, Instituto de Artes, Programa de Pós-Graduação em Artes, 2015.
Resumo:
The nature of concepts is a matter of intense debate in cognitive sciences. While traditional views claim that conceptual knowledge is represented in a unitary symbolic system, recent Embodied and Grounded Cognition theories (EGC) submit the idea that conceptual system is couched in our body and influenced by the environment (Barsalou, 2008). One of the major challenges for EGC is constituted by abstract concepts (ACs), like fantasy. Recently, some EGC proposals addressed this criticism, arguing that the ACs comprise multifaced exemplars that rely on different grounding sources beyond sensorimotor one, including interoception, emotions, language, and sociality (Borghi et al., 2018). However, little is known about how ACs representation varies as a function of life experiences and their use in communication. The theoretical arguments and empirical studies comprised in this dissertation aim to provide evidence on multiple grounding of ACs taking into account their varieties and flexibility. Study I analyzed multiple ratings on a large sample of ACs and identified four distinct subclusters. Study II validated this classification with an interference paradigm involving motor/manual, interoceptive, and linguistic systems during a difficulty rating task. Results confirm that different grounding sources are activated depending on ACs kind. Study III-IV investigate the variability of institutional concepts, showing that the higher the law expertise level, the stronger the concrete/emotional determinants in their representation. Study V introduced a novel interactive task in which abstract and concrete sentences serve as cues to simulate conversation. Analysis of language production revealed that the uncertainty and interactive exchanges increase with abstractness, leading to generating more questions/requests for clarifications with abstract than concrete sentences. Overall, results confirm that ACs are multidimensional, heterogeneous, and flexible constructs and that social and linguistic interactions are crucial to shaping their meanings. Investigating ACs in real-time dialogues may be a promising direction for future research.
Resumo:
With a huge amount of printed documents nowadays, identifying their source is useful for criminal investigations and also to authenticate digital copies of a document. In this paper, we propose novel techniques for laser printer attribution. Our solutions do not need very high resolution scanning of the investigated document and explore the multidirectional, multiscale and low-level gradient texture patterns yielded by printing devices. The main contributions of this work are: (1) the description of printed areas using multidirectional and multiscale co-occurring texture patterns; (2) description of texture on low-level gradient areas by a convolution texture gradient filter that emphasizes textures in specific transition areas and (3) the analysis of printer patterns in segments of interest, which we call frames, instead of whole documents or only printed letters. We show by experiments in a well documented dataset that the proposed methods outperform techniques described in the literature and present near-perfect classification accuracy being very promising for deployment in real-world forensic investigations.
Resumo:
In this paper we present a model of specification-based testing of interactive systems. This model provides the basis for a framework to guide such testing. Interactive systems are traditionally decomposed into a functionality component and a user interface component; this distinction is termed dialogue separation and is the underlying basis for conceptual and architectural models of such systems. Correctness involves both proper behaviour of the user interface and proper computation by the underlying functionality. Specification-based testing is one method used to increase confidence in correctness, but it has had limited application to interactive system development to date.
Resumo:
Background: Newly formed biofilm after implant debridement may challenge the long-term stability of peri-implant therapy. This in vitro study aimed to assess the roughness and adherence of Streptococcus sanguinis after treatment of smooth and rough titanium surfaces with an erbium-doped: yttrium, aluminum, and garnet (Er:YAG) laser, metal and plastic curets, and an air-powder abrasive system. Methods: Forty titanium disks with smooth-machined surfaces and 40 with sand-blasted and acid-etched surfaces were divided into the following treatment groups: Er:YAG laser; plastic curet; metal curet, and air-powder abrasive system. The surface roughness (roughness average [Raj) before and after treatments was determined using a profilometer. S. sanguinis (American Type Culture Collection 10556) was grown on treated and untreated specimens, and the amounts of retained bacteria on the surfaces were measured by the culture method. Rough and smooth surfaces with and without a suspension of S. sanguinis were also analyzed using scanning electron microscopy (SEM). Results: For smooth surfaces, the roughest surfaces were produced by metal curets (repeated - measures analysis of variance [ANOVA] and Tukey test; P<0.05). The rough-surface profile was not altered by any of the treatments (repeated-measures ANOVA; P>0.05). Rough surfaces treated with metal curets and air-powder abrasion showed the lowest level of bacteria] adhesion (two-way ANOVA and Tukey test; P<0.05). SEM analysis revealed distinct surface profiles produced by all devices. Conclusions: Metal curets are not recommended for smooth titanium surface debridement due to severe texture alteration. Rough surfaces treated with a metal curet and the air-powder abrasive system were less susceptible to bacterial adhesion, probably due to texture modification and the presence of abrasive deposits. J Periodontol 2009;80: 1824-1832.
Resumo:
A dissertação aborda a fragilização dos espaços públicos num contexto de utilização de câmeras de vigilância, temática que será problematizada a partir da vigilância exercida pelas câmeras do município de Vila Velha – ES. Partimos da hipótese de que vivemos cercados por objetos técnicos que continuamente produzem informações sobre os sujeitos sociais e os seus espaços como forma de controle. As câmeras representam o exemplo mais conhecido desses objetos, embora sejam apresentadas pelos discursos das administrações públicas como ferramentas de auxílio à segurança. Utilizando como metodologia a observação participante para acompanhamento do trabalho realizado “por trás” das câmeras, concluímos que uma série de fatores desmistificam esses discursos: as câmeras que não são monitoradas, a ausência de manutenção dos equipamentos do sistema, os baixos salários e as condições trabalhistas daqueles que operam as câmeras, a ausência de articulação com os demais setores da prefeitura, a falta de credibilidade das câmeras com a polícia, etc. Por outro lado, ao fazermos um trabalho “na frente” das câmeras, observando o cotidiano de três áreas vigiadas nos bairros Praia da Costa, Glória e Riviera da Barra, bem como entrevistando transeuntes, moradores e comerciantes, concluímos que a maneira surpreendentemente indiferente com que as pessoas lidam com a vigilância é alimentada quando descobrimos que elas não oferecem a segurança pretendida. Se as câmeras não auxiliam a segurança pública, a sua utilização tem um efeito perverso na fragilização dos espaços públicos de Vila Velha, considerando que a vigilância representa ameaças potenciais e reais às condições que o pressupõem: a pluralidade e a liberdade, pois as câmeras atualizam um estado de vigilância permanente alimentando o estigma sobre determinados grupos sociais, que, por sua vez, são os alvos favoritos da vigilância, o que permite às câmeras, ainda, a potencial função de controle socioespacial direto (função admitida inclusive pelos cidadãos entrevistados) sobre os espaços vigiados; e a individualidade dos cidadãos, que é acintosamente violada. As câmeras, portanto, ao pretenderem garantir qualidade de vida à população (oferecendo segurança), produzem o efeito exatamente inverso
Resumo:
Pós-graduação em Zootecnia - FCAV
Resumo:
A crescente utilização de dispositivos móveis com diferentes finalidades é uma realidade. Com estes dispositivos, o utilizador tem a necessidade de aceder e usar dados em tempo real provenientes de diversas fontes. Uma tendência acentuada passa pela incorporação destes dispositivos móveis no vestuário, designados por dispositivos wearable. Segundo a empresa IMS Research, o mercado deste tipo de dispositivos irá aumentar de 14 milhões de unidades registadas no presente ano (2013), para cerca de 171 milhões em 2016, sendo esta previsão conservadora, segundo o analista da IMS Research, Theo Ahadome [15]. A maioria dos dispositivos portáteis está atualmente projetada para questões de saúde, como a monitorização do nível de glicose e batimento cardíaco. O objetivo deste trabalho passa por definir e implementar um dispositivo wearable para aplicações de saúde com um conjunto de funcionalidades para monitorização dos sinais vitais do utilizador. Posteriormente esta base pode ser aplicada em cenários de aplicação distintos, em que todos os dispositivos comunicam entre si, e fazem o reencaminhamento da informação para onde mais interessar. Foi desenhado e implementado hardware e software, para a construção de aplicações capazes de realizar a monitorização do batimento cardíaco, temperatura e humidade corporal, deteção de quedas, qualidade do sono, e chamadas de emergência. Este trabalho aborda os diferentes cenários e aplicações da utilização deste dispositivo, invocando as necessidades específicas de cada situação, sendo estas necessidades trabalhadas e transformadas em características e especificações do sistema. A plataforma de hardware e software permite criar um ecossistema de aplicações, permitindo usar todas as infraestruturas do sistema desenvolvido em futuros cenários de aplicação.
Resumo:
O desenvolvimento de aplicações para dispositivos móveis já não é uma área recente, contudo continua a crescer a um ritmo veloz. É notório o avanço tecnológico dos últimos anos e a crescente popularidade destes dispositivos. Este avanço deve-se não só à grande evolução no que diz respeito às características destes dispositivos, mas também à possibilidade de criar aplicações inovadoras, práticas e passíveis de solucionar os problemas dos utilizadores em geral. Nesse sentido, as necessidades do quotidiano obrigam à implementação de soluções que satisfaçam os utilizadores, e nos dias de hoje, essa satisfação muitas vezes passa pelos dispositivos móveis, que já tem um papel fundamental na vida das pessoas. Atendendo ao aumento do número de raptos de crianças e à insegurança que se verifica nos dias de hoje, as quais dificultam a tarefa de todos os pais/cuidadores que procuraram manter as suas crianças a salvo, é relevante criar uma nova ferramenta capaz de os auxiliar nesta árdua tarefa. A partir desta realidade, e com vista a cumprir os aspetos acima mencionados, surge assim esta dissertação de mestrado. Esta aborda o estudo e implementação efetuados no sentido de desenvolver um sistema de monitorização de crianças. Assim, o objetivo deste projeto passa por desenvolver uma aplicação nativa para Android e um back-end, utilizando um servidor de base de dados NoSQL para o armazenamento da informação, aplicando os conceitos estudados e as tecnologias existentes. A solução tem como principais premissas: ser o mais user-friendly possível, a otimização, a escalabilidade para outras situações (outros tipos de monitorizações) e a aplicação das mais recentes tecnologias. Assim sendo, um dos estudos mais aprofundados nesta dissertação de mestrado está relacionado com as bases de dados NoSQL, dada a sua importância no projeto.