893 resultados para COBERTURA – FORWARDS
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistringuishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the receipient in the private domain. "Non-trivial filtering" can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicaly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
My quantitative study asks how Chinese Australians’ “Chineseness” and their various resources influence their Chinese language proficiency, using online survey and snowball sampling. ‘Operationalization’ is a challenging process which ensures that the survey design talks back to the informing theory and forwards to the analysis model. It requires the attention to two core methodological concerns, namely ‘validity’ and ‘reliability’. Construction of a high-quality questionnaire is critical to the achievement of valid and reliable operationalization. A series of strategies were chosen to ensure the quality of the questions, and thus the eventual data. These strategies enable the use of structural equation modelling to examine how well the data fits the theoretical framework, which was constructed in light of Bourdieu’s theory of habitus, capital and field.
Resumo:
Normanton2020 This exhibition showcases the work of 3rd -4th year undergraduate landscape architecture, architecture, Interior Design, Environmental Engineering, Civil Engineering students in response to issues of sustainability in the Gulf of Carpentaria town of Normanton. 16 students and four staff set off on a 2488km journey to undertake the second half of the Carpentaria Project (following Linking Karumba: Creating Sustainable Connections 2008), in the other Carpentaria Shire town of Normanton. This project, Get EnGulfed: Normanton 2020, looked back and forwards to propose strategies strengthening local and regional identities. Our project partners recognised the need for a strategic approach to developing future visions for Normanton’s growth as a socially, culturally, economically and ecologically sustainable town in the decade to 2020. They proposed: Project aims to foster: • Enhanced liveability; • A strengthened expression of town identity; • Expanded sustainable tourism. Primary challenges & opportunities: • Remoteness; • Two seasons: wet & dry; • Local economy; • Society and Cultural Heritage. The Exhibition Four groups of four students produced four strategic planning and design options toward this future: Mud Maps of Normanton: Rhys Belnap, AJ Humphries, Amos Shirreff, Haiku Van Keuk Normanton: Stay Another Day: Belle Dalton, Tom Jordan, Josh Nielsen, Carla Ramsland The Sweet Spot on the Savannah Way: Daniel Lapham, Yvonne Phillips, Patrick Poon, Dan Young Resilience Through Diversity: Jillian Kenny, Tania Metcher, Stephen Orr, Evan Thompson
Resumo:
Get EnGulfed: Normanton2020 This exhibition showcases the work of 3rd -4th year undergraduate landscape architecture, architecture, Interior Design, Environmental Engineering, Civil Engineering students in response to issues of sustainability in the Gulf of Carpentaria town of Normanton. It presented the work to QUT staff from across the university, as well as industry partners and invited guests. 16 students and four staff set off on a 2488km journey to undertake the second half of the Carpentaria Project (following Linking Karumba: Creating Sustainable Connections 2008), in the other Carpentaria Shire town of Normanton. This project, Get EnGulfed: Normanton 2020, looked back and forwards to propose strategies strengthening local and regional identities. Our project partners recognised the need for a strategic approach to developing future visions for Normanton’s growth as a socially, culturally, economically and ecologically sustainable town in the decade to 2020. They proposed: Project aims to foster: • Enhanced liveability; • A strengthened expression of town identity; • Expanded sustainable tourism. • Primary challenges & opportunities: • Remoteness; • Two seasons: wet & dry; • Local economy; • Society and Cultural Heritage. The Exhibition Four groups of four students produced four strategic planning and design options toward this future: Mud Maps of Normanton: Rhys Belnap, AJ Humphries, Amos Shirreff, Haiku Van Keuk Normanton: Stay Another Day: Belle Dalton, Tom Jordan, Josh Nielsen, Carla Ramsland The Sweet Spot on the Savannah Way: Daniel Lapham, Yvonne Phillips, Patrick Poon, Dan Young Resilience Through Diversity: Jillian Kenny, Tania Metcher, Stephen Orr, Evan Thompson
Resumo:
The ethnic identity and commitment of Heritage Language Learners play salient roles in Heritage Language learning process. The mutually constitutive effect amongst Heritage Language Learner's ethnic identity, commitment, and Heritage Language proficiency has been well documented in social psychological and poststructuralist literatures. Both social psychological and poststructural schools offer meaningful insights into particular contexts but receive critiques from other contexts. In addition, the two schools largely oppose each other. This study uses Bourdieu's sociological triad of habitus, capital, and field to reconcile the two schools through the examination of Chinese Heritage Language Learners in Australia, an idiosyncratic social, cultural, and historical context for these learners. Specifically, this study investigates how young Chinese Australian adults (18-35 in age) negotiate their 'Chineseness' and capitalise on resources through Chinese Heritage Language learning in the lived world. The study adopts an explanatory mixed methods design to combine the quantitative approach with the qualitative approach. The initial quantitative phase addresses the first research question: Is Chinese Heritage Language proficiency of young Chinese Australian adults influenced by their investment of capital, the strength of their habitus of 'Chineseness', or both? The subsequent qualitative phase addresses the second research question: How do young Chinese Australian adults understand their Chinese Heritage Language learning in relation to (potential) profits produced by this linguistic capital in given fields? The initial quantitative phase applies Structural Equation Modelling to analyse the data from an online survey with 230 respondents. Findings indicate the statistically significant positive contribution made by the habitus of 'Chineseness' and by investment of capital to Chinese Heritage Language proficiency (r = .71 and r = .86 respectively). Subsequent multiple regression analysis demonstrates that 62% of the variance of Chinese Heritage Language proficiency can be accounted for by the joint contribution of 'Chineseness' and 'capital'. The qualitative phase of the study uses multiple interviews with five participants. It reveals that Chinese Heritage Language offers meaningful benefits for participants in the forms of capital production and habitus capture or recapture. Findings from the two phases talk to each other in terms of the inherent entanglement amongst habitus of 'Chineseness', investment of capital, and Chinese Heritage Language proficiency. The study offers important contributions. Theoretically, by virtue of Bourdieu's signature concepts of habitus, capital, and field, the study provides answers to questions that both social psychological and poststructuralist theories have long been struggling to answer. Methodologically, the position of 'pluralism' talks back to Bourdieu's theory and forwards to the mixed methods design. Particularly, the study makes a methodological breakthrough: A set of instruments was developed and validated to quantify Bourdieu's key concepts of capital and habitus within certain social fields. Practically, understanding Chinese Australians' heterogeneity and the potential drivers behind Chinese Heritage Language learning contributes to the growing interest in Chinese Australians' contemporary life experiences and helps to better accommodate linguistically diverse Chinese Heritage Language Learners in Chinese language courses. In addition, this study is very timely. It resonates with the recently released Australia in the Asian Century White Paper: Chinese Australians, with sound knowledge of Chinese culture and language obtained through negotiating their 'Chineseness' and capitalising on diverse resources for learning, will help to serve Australia's economic, social, and political needs in unique ways.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the recipient in the private domain. “Non-trivial filtering'' can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
Invited – and inspired – by Rikki Gunn of GhostNets Australia, in September 2008 sixteen Queensland University of Technology (QUT) design and engineering students and four staff set off on a 2488km journey to spend a fortnight in Karumba on the Gulf of Carpentaria. We went to undertake a strategic planning project we called Linking Karumba, to encourage social, economic, environmental and cultural linkages across the town. During this visit, we and our local project partners realised there should be a second half to the project, in the other Carpentaria Shire town of Normanton, which saw another group of us travelling north again in 2010 to undertake Get EnGulfed: Normanton2020, looking back and forwards to propose strategies to strengthen local and regional identities. The responsiveness of our students’ work to the character of Carpentarian culture and environment indicate remarkable levels of immersion, and the community expressed their enjoyment of the process and outcomes. As for us - QUT staff and students - we had a marvellous time doing these projects, and this little book is the story of our finding of the landscapes and communities of Carpentaria “where the outback meets the sea”, and of the project work we did together with locals in the two towns. We go to press as news arrives of the official opening of the Karumba Walking track, linking the two parts of the town. We can’t wait to return and make the walk. Shannon Satherley, 2013
Resumo:
Élet [pronounced air-let] is the Hungarian word for Life. The work is informed by the lyrics of six songs performed by French cover band Nouvelle Vague. Whilst Élet [Life] is created to be absorbed and interpreted openly by each individual, at the core of the choreography lies a desire to move forwards, to communicate – to be seen and heard. The work embraces aspects such as loneliness, joy and tension that we experience in our lives and relationships. As the movement opens out from these ideas, the physical shapes of our personal moments are infused with the elements of sound, colour and rhythm. A rich translation of personal movements through life.
Resumo:
Twitter and other social networking sites play an ever more present role in the spread of current events. The dynamics of information dissemination through digital network structures are still relatively unexplored, however. At what time an issue is taken up by whom? Who forwards a message when to whom else? What role do individual communication participants, existing digital communities or the technical foundations of each network platform play in the spread of news? In this chapter we discuss, using the example of a video on a current sociopolitical issue in Australia that was shared on Twitter, a number of new methods for the dynamic visualisation and analysis of communication processes. Our method combines temporal and spatial analytical approaches and provides new insights into the spread of news in digital networks. [Social media dienen immer häufger als Disseminationsmechanismen für Medieninhalte. Auf Twitter ermöglicht besonders die Retweet-Funktion den schnellen und weitläufgen Transfer von Nachrichten. In diesem Beitrag etablieren neue methodische Ansätze zur Erfassung, Visualisierung und Analyse von Retweet-Ketten. Insbesondere heben wir hervor, wie bestehende Netzwerkanalysemethoden ergänzt werden können, um den Ablauf der Weiterleitung sowohl temporal als auch spatial zu erfassen. Unsere Fallstudie demonstriert die verbreitung des videoclips einer am 9. Oktober 2012 spontan gehaltenen Wutrede der australischen Premierministerin Julia Gillard, in der sie Oppositionsführer Tony Abbott als Frauenhasser brandmarkte. Durch die Erfassung von Hintergrunddaten zu den jeweiligen NutzerInnen, die sich an der Weiterleitung des Videoclips beteiligten, erstellen wir ein detailliertes Bild des Disseminationsablaufs im vorliegenden Fall. So lassen sich die wichtigsten AkteurInnen und der Ablauf der Weiterleitung darstellen und analysieren. Daraus entstehen Einblicke in die allgemeinen verbreitungsmuster von Nachrichten auf Twitter].
Resumo:
Orthodox notions of peace built on liberal institutionalism have been critiqued for their lack of attention to the local and the people who populate these structures. The concept of an ‘everyday peace’ seeks to take into account the agency and activity of those frequently marginalised or excluded and use these experiences as the basis for a more responsive way of understanding peace. Further, reconceptualising and complicating a notion of ‘everyday peace’ as embodied recognises marginalised people as competent commentators and observers of their world, and capable of engaging with the practices, routines and radical events that shape their everyday resistances and peacebuilding. Peace, in this imagining, is not abstract, but built through everyday practices amidst violence. Young people, in particular, are often marginalised or rendered passive in discussions of the violences that affect them. In recognising this limited engagement, this paper responds through drawing on fieldwork conducted with conflict-affected young people in a peri-urban barrio community near Colombia’s capital Bogota to forward a notion of an embodied everyday peace. This involves exploring the presence and voices of young people as stakeholders in a negotiation of what it means to build peace within daily experience in the context of local and broader violence and marginalisation. By centring young people’s understandings of and contributions within the everyday, this paper responds to the inadequacies of liberal peacebuilding narratives, and forwards a more complex rendering of everyday peace as embodied.
Resumo:
Dynamic Bayesian Networks (DBNs) provide a versatile platform for predicting and analysing the behaviour of complex systems. As such, they are well suited to the prediction of complex ecosystem population trajectories under anthropogenic disturbances such as the dredging of marine seagrass ecosystems. However, DBNs assume a homogeneous Markov chain whereas a key characteristics of complex ecosystems is the presence of feedback loops, path dependencies and regime changes whereby the behaviour of the system can vary based on past states. This paper develops a method based on the small world structure of complex systems networks to modularise a non-homogeneous DBN and enable the computation of posterior marginal probabilities given evidence in forwards inference. It also provides an approach for an approximate solution for backwards inference as convergence is not guaranteed for a path dependent system. When applied to the seagrass dredging problem, the incorporation of path dependency can implement conditional absorption and allows release from the zero state in line with environmental and ecological observations. As dredging has a marked global impact on seagrass and other marine ecosystems of high environmental and economic value, using such a complex systems model to develop practical ways to meet the needs of conservation and industry through enhancing resistance and/or recovery is of paramount importance.
Resumo:
Tension-band castration of cattle is gaining favour because it is relatively simple to perform and is promoted by retailers of the devices as a humane castration method. Furthermore, retailers encourage delaying castration to exploit the superior growth rates of bulls compared with steers. Two experiments were conducted, under tropical conditions, comparing tension banding and surgical castration of weaner (7–10 months old) and mature (22–25 months old) Bos indicus bulls with and without pain management (ketoprofen or saline injected intramuscularly immediately prior to castration). Welfare outcomes were assessed using a wide range of measures; this paper reports on the behavioural responses of the bulls and an accompanying paper reports on other measures. Behavioural data were collected at intervals by direct observation and continuously via data loggers on the hind leg of the bulls to 4 weeks post-castration. Tension-banded bulls performed less movement in the crush/chute than the surgically castrated bulls during the procedures (weaner: 2.63 vs. 5.69, P < 0.001; mature: 1.00 vs. 5.94; P < 0.001 for tension-band and surgical castration, respectively), indicating that tension banding was less painful then surgical castration during conduct. To 1.5 h post-castration, tension-banded bulls performed significantly (all P < 0.05) more active behavioural responses indicative of pain compared with surgical castrates, e.g., percentage time walking forwards (weaner: 15.0% vs. 8.1%; mature: 22.3% vs. 15.1%), walking backwards (weaner: 4.3% vs. 1.4%; mature: 2.4% vs. 0.5%), numbers of tail movements (weaner: 21.9 vs. 1.4; mature: 51.5 vs. 39.4) and leg movements (weaner: 12.9 vs. 0.9; mature: 8.5 vs. 1.5), respectively. In contrast, surgically castrated bulls performed more immobile behaviours compared with tension-banded bulls (e.g., standing in mature bulls was 56.6% vs. 34.4%, respectively, P = 0.002). Ketoprofen administration appeared effective in moderating pain-related behaviours in the mature bulls from 1.5 to 3 h, e.g., reducing abnormal standing (0.0% vs. 7.7%, P = 0.009) and increasing feeding (12.7% vs. 0.0%, P = 0.048) in NSAID- and saline-treated bulls, respectively. There were few behavioural differences subsequent to 24 h post-castration, but some limited evidence of chronic pain (3–4 weeks post-castration) with both methods. Interpretation, however, was difficult from behaviours alone. Thus, tension banding is less painful than surgical castration during conduct of the procedures and pain-related behavioural responses differ with castration method (active restlessness in response to tension banding and minimisation of movement in response to surgical castration). Ketoprofen administered immediately prior to castration was somewhat effective in reducing pain, particularly in the mature bulls.
Resumo:
Event-based systems are seen as good candidates for supporting distributed applications in dynamic and ubiquitous environments because they support decoupled and asynchronous many-to-many information dissemination. Event systems are widely used, because asynchronous messaging provides a flexible alternative to RPC (Remote Procedure Call). They are typically implemented using an overlay network of routers. A content-based router forwards event messages based on filters that are installed by subscribers and other routers. The filters are organized into a routing table in order to forward incoming events to proper subscribers and neighbouring routers. This thesis addresses the optimization of content-based routing tables organized using the covering relation and presents novel data structures and configurations for improving local and distributed operation. Data structures are needed for organizing filters into a routing table that supports efficient matching and runtime operation. We present novel results on dynamic filter merging and the integration of filter merging with content-based routing tables. In addition, the thesis examines the cost of client mobility using different protocols and routing topologies. We also present a new matching technique called temporal subspace matching. The technique combines two new features. The first feature, temporal operation, supports notifications, or content profiles, that persist in time. The second feature, subspace matching, allows more expressive semantics, because notifications may contain intervals and be defined as subspaces of the content space. We also present an application of temporal subspace matching pertaining to metadata-based continuous collection and object tracking.
Resumo:
This thesis examines the interrelationship and dynamics between the Indian United Progressive Alliance government’s foreign policy and its nuclear weapons policy. The purpose of the study is to situate nuclear policy within a foreign policy framework, and the fundamental research problem is thus how does the Indian nuclear policy reflect and respond to the Indian foreign policy? The study examines the intentions in the Indian foreign and nuclear policies, and asks whether these intentions are commensurable or incommensurable. Moreover, the thesis asks whether the UPA government differs from its predecessors, most notably the Bharatiya Janata Party-led National Democratic Alliance government in its foreign and nuclear policies. Answers to these questions are based on the interpretation of political texts and speeches as suggested by Quentin Skinner’s notion of meaning3, what does a writer or speaker mean by what he or she says in a given text, and by J.L. Austin’s speech act theory. This linguistic perspective and the approach of intertextualizing, place the political acts within their contingent intellectual and political contexts. The notion of strategic culture is therefore introduced to provide context for these juxtapositions. The thesis firstly analyses the societal, historical and intellectual context of India’s foreign and nuclear policy. Following from this analysis the thesis then examines the foreign and nuclear policies of Prime Minister Manmo-han Singh’s UPA government. This analysis focuses on the texts, speeches and statements of Indian authorities between 2004 and 2008. This study forwards the following claims: firstly, the UPA Government conducts a foreign policy that is mainly and explicitly inclusive, open and enhancing, and it conducts a nuclear policy that is mainly and implicitly excluding, closed and protective. Secondly, despite the fact that the notion of military security is widely appreciated and does not, as such, necessarily collide with foreign policy, the UPA Government conducts a nuclear policy that is incommensurable with its foreign policy. Thirdly, the UPA Gov-ernment foreign and nuclear policies are, nevertheless, commensurable re-garding their internal intentions. Finally, the UPA Government is conduct-ing a nuclear policy that is gradually leading India towards having a triad of nuclear weapons with various platforms and device designs and a function-ing and robust command and control system encompassing political and military planning, decision-making and execution. Regarding the question of the possible differences between the UPA and NDA governments this thesis claims that, despite their different ideological roots and orientations in domestic affairs, the Indian National Congress Party conducts, perhaps surprisingly, quite a similar foreign and nuclear policy to the Bharatiya Janata Party.
Resumo:
In many applications of wireless ad hoc networks, wireless nodes are owned by rational and intelligent users. In this paper, we call nodes selfish if they are owned by independent users and their only objective is to maximize their individual goals. In such situations, it may not be possible to use the existing protocols for wireless ad hoc networks as these protocols assume that nodes follow the prescribed protocol without deviation. Stimulating cooperation among these nodes is an interesting and challenging problem. Providing incentives and pricing the transactions are well known approaches to stimulate cooperation. In this paper, we present a game theoretic framework for truthful broadcast protocol and strategy proof pricing mechanism called Immediate Predecessor Node Pricing Mechanism (IPNPM). The phrase strategy proof here means that truth revelation of cost is a weakly dominant-strategy (in game theoretic terms) for each node. In order to steer our mechanism-design approach towards practical implementation, we compute the payments to nodes using a distributed algorithm. We also propose a new protocol for broadcast in wireless ad hoc network with selfish nodes based on IPNPM. The features of the proposed broadcast protocol are reliability and a significantly reduced number of packet forwards compared to the number of network nodes, which in turn leads to less system-wide power consumption to broadcast a single packet. Our simulation results show the efficacy of the proposed broadcast protocol.