857 resultados para Secret Sharing Schemes


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper sets forth a Neo-Kaleckian model of capacity utilization and growth with distribution featuring a profit-sharing arrangement. While a given proportion of firms compensate workers with only a base wage, the remaining proportion do so with a base wage and a share of profits. Consistent with the empirical evidence, workers hired by profit-sharing firms have a higher productivity than their counterparts in base-wage firms. While a higher profit-sharing coefficient raises capacity utilization and growth irrespective of the distribution of compensation strategies across firms, a higher frequency of profit-sharing firms does likewise only if the profit-sharing coefficient is sufficiently high.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, a new family of survival distributions is presented. It is derived by considering that the latent number of failure causes follows a Poisson distribution and the time for these causes to be activated follows an exponential distribution. Three different activation schemes are also considered. Moreover, we propose the inclusion of covariates in the model formulation in order to study their effect on the expected value of the number of causes and on the failure rate function. Inferential procedure based on the maximum likelihood method is discussed and evaluated via simulation. The developed methodology is illustrated on a real data set on ovarian cancer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Paulo CA, Roschel H, Ugrinowitsch C, Kobal R and Tricoli V. Influence of different resistance exercise loading schemes on mechanical power output in work to rest ratio-equated and -nonequated conditions. J Strength Cond Res 26(5): 1308-1312, 2012-It is well known that most sports are characterized by the performance of intermittent high-intensity actions, requiring high muscle power production within different intervals. In fact, the manipulation of the exercise to rest ratio in muscle power training programs may constitute an interesting strategy when considering the specific performance demand of a given sport modality. Thus, the aim of this study was to evaluate the influence of different schemes of rest intervals and number of repetitions per set on muscle power production in the squat exercise between exercise to rest ratio-equated and -nonequated conditions. Nineteen young males (age: 25.7 +/- 4.4 years; weight: 81.3 +/- 13.7 kg; height: 178.1 +/- 5.5 cm) were randomly submitted to 3 different resistance exercise loading schemes, as follows: short-set short-interval condition (SSSI; 12 sets of 3 repetitions with a 27.3-second interval between sets); short-set long-interval condition (SSLI; 12 sets of 3 repetitions with a 60-second interval between sets); long-set long-interval (LSLI; 6 sets of 6 repetitions with a 60-second rest interval between sets). The main finding of the present study is that the lower exercise to rest ratio protocol (SSLI) resulted in greater average power production (601.88 +/- 142.48 W) when compared with both SSSI and LSLI (581.86 +/- 113.18 W; 578 +/- 138.78 W, respectively). Additionally, both the exercise to rest ratio-equated conditions presented similar performance and metabolic results. In summary, these findings suggest that shorter rest intervals may fully restore the individual's ability to produce muscle power if a smaller exercise volume per set is performed and that lower exercise to rest ratio protocols result in greater average power production when compared with higher ratio ones.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang proposed a simple 3PAKE protocol based on elliptic curve cryptography, which is claimed to be secure and to provide superior efficiency when compared with similar-purpose solutions. In this paper, however, we show that the solution is vulnerable to key-compromise impersonation and offline password guessing attacks from system insiders or outsiders, which indicates that the empirical approach used to evaluate the scheme's security is flawed. These results highlight the need of employing provable security approaches when designing and analyzing PAKE schemes. Copyright (c) 2011 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Programa doctorado: Cibernética y Telecomunicación (2002/2004)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The focus of this research is to develop and apply an analytical framework for evaluating the effectiveness and practicability of sustainability certification schemes for biofuels, especially in a developing country’s perspective. The main question that drives the research analysis is “Which are the main elements of and how to develop sustainability certification schemes that would be effective and practicable in certifying the contribution of biofuels in meeting the goals Governments and other stakeholders have set up?”. Biofuels have been identified as a promising tool to reach a variety of goals: climate change protection, energy security, agriculture development, and, especially in developing countries, economic development. Once the goals have been identified, and ambitious mandatory targets for biofuels use agreed at national level, concerns have been raised by the scientific community on the negative externalities that biofuels production and use can have at environment, social and economic level. Therefore certification schemes have been recognized as necessary processes to measure these externalities, and examples of such schemes are in effect, or are in a negotiating phase, both at mandatory and voluntary levels. The research focus has emerged by the concern that the ongoing examples are very demanding in terms of compliance, both for those that are subject to certification and those that have to certify, on the quantity and quality of information to be reported. A certification system, for reasons linked to costs, lack of expertise, inadequate infrastructure, absence of an administrative and legislative support, can represent an intensive burden and can act as a serious impediment for the industrial and agriculture development of developing countries, going against the principle of equity and level playing field. While this research recognizes the importance of comprehensiveness and ambition in designing an important tool for the measurement of sustainability effects of biofuels production and use, it stresses the need to focus on the effectiveness and practicability of this tool in measuring the compliance with the goal. This research that falls under the rationale of the Sustainability Science Program housed at Harvard Kennedy School, has as main objective to close the gap between the research and policy makers worlds in the field of sustainability certification schemes for biofuels.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis presents the outcomes of my Ph.D. course in telecommunications engineering. The focus of my research has been on Global Navigation Satellite Systems (GNSS) and in particular on the design of aiding schemes operating both at position and physical level and the evaluation of their feasibility and advantages. Assistance techniques at the position level are considered to enhance receiver availability in challenging scenarios where satellite visibility is limited. Novel positioning techniques relying on peer-to-peer interaction and exchange of information are thus introduced. More specifically two different techniques are proposed: the Pseudorange Sharing Algorithm (PSA), based on the exchange of GNSS data, that allows to obtain coarse positioning where the user has scarce satellite visibility, and the Hybrid approach, which also permits to improve the accuracy of the positioning solution. At the physical level, aiding schemes are investigated to improve the receiver’s ability to synchronize with satellite signals. An innovative code acquisition strategy for dual-band receivers, the Cross-Band Aiding (CBA) technique, is introduced to speed-up initial synchronization by exploiting the exchange of time references between the two bands. In addition vector configurations for code tracking are analyzed and their feedback generation process thoroughly investigated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Advanced optical biosensor platforms exploiting long range surface plasmons (LRSPs) and responsive N-isopropylacrylamide (NIPAAm) hydrogel binding matrix for the detection of protein and bacterial pathogen analytes were carried out. LRSPs are optical waves that originate from coupling of surface plasmons on the opposite sites of a thin metallic film embedded between two dielectrics with similar refractive indices. LRSPs exhibit orders of magnitude lower damping and more extended profile of field compared to regular surface plasmons (SPs). Their excitation is accompanied with narrow resonance and provides stronger enhancement of electromagnetic field intensity that can advance the sensitivity of surface plasmon resonance (SPR) and surface plasmon-enhanced fluorescence spectroscopy (SPFS) biosensors. Firstly, we investigated thin gold layers deposited on fluoropolymer surface for the excitation of LRSPs. The study indicates that the morphological, optical and electrical properties of gold film can be changed by the surface energy of fluoropolymer and affect the performance of a SPFS biosensor. A photo-crosslinkable NIPAAm hydrogel was grafted to the sensor surface in order to serve as a binding matrix. It was modified with bio-recognition elements (BREs) via amine coupling chemistry and offered the advantage of large binding capacity, stimuli responsive properties and good biocompatibility. Through experimental observations supported by numerical simulations describing diffusion mass transfer and affinity binding of target molecules in the hydrogel, the hydrogel binding matrix thickness, concentration of BREs and the profile of the probing evanescent field was optimized. Hydrogel with a up to micrometer thickness was shown to support additional hydrogel optical waveguide (HOW) mode which was employed for probing affinity binding events in the gel by means of refractometric and fluorescence measurements. These schemes allow to reach limits of detection (LODs) at picomolar and femtomolar levels, respectively. Besides hydrogel based experiments for detection of molecular analytes, long range surface plasmon-enhanced fluorescence spectroscopy (LRSP-FS) was employed for detection of bacterial pathogens. The influence of capture efficiency of bacteria on surfaces and the profile of the probing field on sensor response were investigated. The potential of LRSP-FS with extended evanescent field is demonstrated for detection of pathogenic E. coli O157:H7 on sandwich immunoassays . LOD as low as 6 cfu mL-1 with a detection time of 40 minutes was achieved.rn

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sviluppo applicazione per condividere contatti da SugarCRM con Google Contacts

Relevância:

20.00% 20.00%

Publicador:

Resumo:

La prova informatica richiede l’adozione di precauzioni come in un qualsiasi altro accertamento scientifico. Si fornisce una panoramica sugli aspetti metodologici e applicativi dell’informatica forense alla luce del recente standard ISO/IEC 27037:2012 in tema di trattamento del reperto informatico nelle fasi di identificazione, raccolta, acquisizione e conservazione del dato digitale. Tali metodologie si attengono scrupolosamente alle esigenze di integrità e autenticità richieste dalle norme in materia di informatica forense, in particolare della Legge 48/2008 di ratifica della Convenzione di Budapest sul Cybercrime. In merito al reato di pedopornografia si offre una rassegna della normativa comunitaria e nazionale, ponendo l’enfasi sugli aspetti rilevanti ai fini dell’analisi forense. Rilevato che il file sharing su reti peer-to-peer è il canale sul quale maggiormente si concentra lo scambio di materiale illecito, si fornisce una panoramica dei protocolli e dei sistemi maggiormente diffusi, ponendo enfasi sulla rete eDonkey e il software eMule che trovano ampia diffusione tra gli utenti italiani. Si accenna alle problematiche che si incontrano nelle attività di indagine e di repressione del fenomeno, di competenza delle forze di polizia, per poi concentrarsi e fornire il contributo rilevante in tema di analisi forensi di sistemi informatici sequestrati a soggetti indagati (o imputati) di reato di pedopornografia: la progettazione e l’implementazione di eMuleForensic consente di svolgere in maniera estremamente precisa e rapida le operazioni di analisi degli eventi che si verificano utilizzando il software di file sharing eMule; il software è disponibile sia in rete all’url http://www.emuleforensic.com, sia come tool all’interno della distribuzione forense DEFT. Infine si fornisce una proposta di protocollo operativo per l’analisi forense di sistemi informatici coinvolti in indagini forensi di pedopornografia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is primarily based on three core chapters, focused on the fundamental issues of trade secrets law. The goal of this thesis is to come up with policy recommendations to improve legal structure governing trade secrets. The focal points of this research are the following. What is the optimal scope of trade secrets law? How does it depend on the market characteristics such as degree of product differentiation between competing products? What factors need to be considered to balance the contradicting objectives of promoting innovation and knowledge diffusion? The second strand of this research focuses on the desirability of lost profits or unjust enrichment damage regimes in case of misappropriation of a trade secret. A comparison between these regimes is made and simple policy implications are extracted from the analysis. The last part of this research is an empirical analysis of a possible relationship between trade secrets sharing and misappropriation instances faced by firms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the most undervalued problems by smartphone users is the security of data on their mobile devices. Today smartphones and tablets are used to send messages and photos and especially to stay connected with social networks, forums and other platforms. These devices contain a lot of private information like passwords, phone numbers, private photos, emails, etc. and an attacker may choose to steal or destroy this information. The main topic of this thesis is the security of the applications present on the most popular stores (App Store for iOS and Play Store for Android) and of their mechanisms for the management of security. The analysis is focused on how the architecture of the two systems protects users from threats and highlights the real presence of malware and spyware in their respective application stores. The work described in subsequent chapters explains the study of the behavior of 50 Android applications and 50 iOS applications performed using network analysis software. Furthermore, this thesis presents some statistics about malware and spyware present on the respective stores and the permissions they require. At the end the reader will be able to understand how to recognize malicious applications and which of the two systems is more suitable for him. This is how this thesis is structured. The first chapter introduces the security mechanisms of the Android and iOS platform architectures and the security mechanisms of their respective application stores. The Second chapter explains the work done, what, why and how we have chosen the tools needed to complete our analysis. The third chapter discusses about the execution of tests, the protocol followed and the approach to assess the “level of danger” of each application that has been checked. The fourth chapter explains the results of the tests and introduces some statistics on the presence of malicious applications on Play Store and App Store. The fifth chapter is devoted to the study of the users, what they think about and how they might avoid malicious applications. The sixth chapter seeks to establish, following our methodology, what application store is safer. In the end, the seventh chapter concludes the thesis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

L'elaborato si propone di indagare il tema della Sharing Economy e i relativi presupposti di sviluppo, studiando casi realmente esistenti. Si affronta la ricerca validando i modelli ipotizzati per ricercare e confrontare le soluzioni esistenti al fine di trovare le caratteristiche ritenute fondamentali per la digital sharing economy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

La seguente tesi tratta: nel primo capitolo la sharing economy, nel secondo si focalizza sul modello di sviluppo Android, mentre nel terzo viene presentata un'applicazione da me ideata e sviluppata che consente la condivisione di parcheggi.