990 resultados para Oja signed ranks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we consider the problem of document ranking in a non-traditional retrieval task, called subtopic retrieval. This task involves promoting relevant documents that cover many subtopics of a query at early ranks, providing thus diversity within the ranking. In the past years, several approaches have been proposed to diversify retrieval results. These approaches can be classified into two main paradigms, depending upon how the ranks of documents are revised for promoting diversity. In the first approach subtopic diversification is achieved implicitly, by choosing documents that are different from each other, while in the second approach this is done explicitly, by estimating the subtopics covered by documents. Within this context, we compare methods belonging to the two paradigms. Furthermore, we investigate possible strategies for integrating the two paradigms with the aim of formulating a new ranking method for subtopic retrieval. We conduct a number of experiments to empirically validate and contrast the state-of-the-art approaches as well as instantiations of our integration approach. The results show that the integration approach outperforms state-of-the-art strategies with respect to a number of measures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The central document governing the global organization of Air Navigation Services (ANS) is the Convention on International Civil Aviation, commonly referred to as the “Chicago Convention,” whose original version was signed in that city in 1944. In the Convention, Contracting States agreed to ensure the minimum standards of ANS established by ICAO, a specialized United Nations agency created by the Convention. Emanating from obligations under the Chicago Convention, ANS has traditionally provided by departments of national governments. However, there is a widespread trend toward transferring delivery of ANS services outside of line departments of national governments to independent agencies or corporations. The Civil Air Navigation Services Organisation (CANSO), which is the trade association for independent ANS providers, currently counts approximately 60 members, and is steadily growing. However, whatever delivery mechanisms are chosen, national governments remain ultimately responsible for ensuring that adequate ANS services are available. The provision by governments of ANS reflects the responsibility of the state for safety, international relations, and indirectly, the macroeconomic benefits of ensuring a sound infrastructure for aviation. ANS is a “public good” and an “essential good” provided to all aircraft using a country’s airfields and airspace. However, ANS also represents a service that directly benefits only a limited number of users, notably aircraft owners and operators. The idea that the users of the system, rather than the taxpaying public, should incur the costs associated with ANS provision is inherent in the commercialization process. However, ICAO sets out broad principles for the establishment of user charges, which member states are expected to comply with. ICAO states that only distance flown and aircraft weights are acceptable parameters for use in a charging system. These two factors are considered to be easy to measure, bear a reasonable relationship to the value of service received, and do not discriminate due to factors such as where the flight originated or the nation of aircraft registration.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Implementation of an electronic tendering (e-tendering) systems requires careful attention to the needs of the system and its various participants. Fairness in an e-tendering is of utmost importance. Current proposals and implementations do not provide fairness and thus, are vulnerable to collusion and favourism. Dishonest participants, either the principal or tenderer may collude to alter or view competing tenders which would give the favoured tenderer a greater chance of winning the contract. This paper proposes an e-tendering system that is secure and fair to all participants. We employ the techniques of anonymous token system along with signed commitment approach to achieve a publicly verifiable fair e-tendering protocol. We also provide an analysis of the protocol that confirms the security of our proposal against security goals for an e-tendering system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the TREC Web Diversity track, novelty-biased cumulative gain (α-NDCG) is one of the official measures to assess retrieval performance of IR systems. The measure is characterised by a parameter, α, the effect of which has not been thoroughly investigated. We find that common settings of α, i.e. α=0.5, may prevent the measure from behaving as desired when evaluating result diversification. This is because it excessively penalises systems that cover many intents while it rewards those that redundantly cover only few intents. This issue is crucial since it highly influences systems at top ranks. We revisit our previously proposed threshold, suggesting α be set on a query-basis. The intuitiveness of the measure is then studied by examining actual rankings from TREC 09-10 Web track submissions. By varying α according to our query-based threshold, the discriminative power of α-NDCG is not harmed and in fact, our approach improves α-NDCG's robustness. Experimental results show that the threshold for α can turn the measure to be more intuitive than using its common settings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we consider the problem of document ranking in a non-traditional retrieval task, called subtopic retrieval. This task involves promoting relevant documents that cover many subtopics of a query at early ranks, providing thus diversity within the ranking. In the past years, several approaches have been proposed to diversify retrieval results. These approaches can be classified into two main paradigms, depending upon how the ranks of documents are revised for promoting diversity. In the first approach subtopic diversification is achieved implicitly, by choosing documents that are different from each other, while in the second approach this is done explicitly, by estimating the subtopics covered by documents. Within this context, we compare methods belonging to the two paradigms. Furthermore, we investigate possible strategies for integrating the two paradigms with the aim of formulating a new ranking method for subtopic retrieval. We conduct a number of experiments to empirically validate and contrast the state-of-the-art approaches as well as instantiations of our integration approach. The results show that the integration approach outperforms state-of-the-art strategies with respect to a number of measures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Hospital disaster resilience can be defined as a hospital’s ability to resist, absorb, and respond to the shock of disasters while maintaining critical functions, and then to recover to its original state or adapt to a new one. This study aims to explore the status of resilience among tertiary hospitals in Shandong Province, China. Methods: A stratified random sample (n = 50) was derived from tertiary A, tertiary B, and tertiary C hospitals in Shandong Province, and was surveyed by questionnaire. Data on hospital characteristics and 8 key domains of hospital resilience were collected and analysed. Variables were binary, and analysed using descriptive statistics such as frequencies. Results: A response rate of 82% (n = 41) was attained. Factor analysis identified four key factors from eight domains which appear to reflect the overall level of disaster resilience. These were hospital safety, disaster management mechanisms, disaster resources and disaster medical care capability. The survey demonstrated that in regard to hospital safety, 93% had syndromic surveillance systems for infectious diseases and 68% had evaluated their safety standards. In regard to disaster management mechanisms, all had general plans, while only 20% had specific plans for individual hazards. 49% had a public communication protocol and 43.9% attended the local coordination meetings. In regard to disaster resources, 75.6% and 87.5% stockpiled emergency drugs and materials respectively, while less than a third (30%) had a signed Memorandum of Understanding with other hospitals to share these resources. Finally in regard to medical care, 66% could dispatch an on-site medical rescue team, but only 5% had a ‘portable hospital’ function and 36.6% and 12% of the hospitals could surge their beds and staff capacity respectively. The average beds surge capacity within 1 day was 13%. Conclusions: This study validated the broad utility of a framework for understanding and measuring the level of hospital resilience. The survey demonstrated considerable variability in disaster resilience arrangements of tertiary hospitals in Shandong province, and the difference between tertiary A hospitals and tertiary B hospitals was also identified in essential areas.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when no verifier designation is performed, it is natural to ask how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. We show how this can be efficiently achieved, and provide proofs of security for our schemes in the random oracle model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most signature schemes are randomised and allow many possible signatures for a single message. In this case, it may be possible to produce a new signature on a previously signed message. Some applications require that this type of forgery also be prevented – this requirement is called strong unforgeability. At PKC2006, Boneh Shen and Waters presented an efficient transform based on any randomised trapdoor hash function which converts a weakly unforgeable signature into a strongly unforgeable signature and applied it to construct a strongly unforgeable signature based on the CDH problem. However, the transform of Boneh et al only applies to a class of so-called partitioned signatures. Although many schemes fall in this class, some do not, for example the DSA signature. Hence it is natural to ask whether one can obtain a truly generic efficient transform based on any randomised trapdoor hash function which converts any weakly unforgeable signature into a strongly unforgeable one. We answer this question in the positive by presenting a simple modification of the Boneh-Shen-Waters transform. Our modified transform uses two randomised trapdoor hash functions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Motivated by privacy issues associated with dissemination of signed digital certificates, we define a new type of signature scheme called a ‘Universal Designated-Verifier Signature’ (UDVS). A UDVS scheme can function as a standard publicly-verifiable digital signature but has additional functionality which allows any holder of a signature (not necessarily the signer) to designate the signature to any desired designated-verifier (using the verifier’s public key). Given the designated-signature, the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. We propose an efficient deterministic UDVS scheme constructed using any bilinear group-pair. Our UDVS scheme functions as a standard Boneh-Lynn-Shacham (BLS) signature when no verifier-designation is performed, and is therefore compatible with the key-generation, signing and verifying algorithms of the BLS scheme. We prove that our UDVS scheme is secure in the sense of our unforgeability and privacy notions for UDVS schemes, under the Bilinear Diffie-Hellman (BDH) assumption for the underlying group-pair, in the random-oracle model. We also demonstrate a general constructive equivalence between a class of unforgeable and unconditionally-private UDVS schemes having unique signatures (which includes the deterministic UDVS schemes) and a class of ID-Based Encryption (IBE) schemes which contains the Boneh-Franklin IBE scheme but not the Cocks IBE scheme.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2012, the only South East Asian countries that have ratified the 1951 Convention relating to the Status of Refugees and the 1967 Protocol Relating to the Status of Refugees (hereafter referred to as the 1951 Convention and 1967 Protocol) is Philippines (signed 1954), Cambodia (signed 1995) and Timor Leste (signed 2001). Countries such as Indonesia, Malaysia and Thailand have annual asylum seeking populations from Myanmar, South Asia and Middle East, that are estimated to be at 15 000-20 000 per country (UNHCR 2012). The lack of a permanent and formal asylum processing process in these countries means that that asylum-seeking populations in the region are reliant on the local offices of the United Nations High Commission for Refugees based in the region to process their claims. These offices rely upon the good will of these governments to have a presence near detection camps and in capital cities to process claims of those who manage to reach the UNHCR representative office. The only burden sharing mechanism within the region primarily exists under the Bali Process on People Smuggling, Trafficking in Persons and Related Transnational Crime (the Bali Process), introduced in 2002. The Bali Process refers to an informal cooperative agreement amongst the states from the Asia-Pacific region, with Australia and Indonesia as the co-chairs, which discusses its namesake: primarily anti-people smuggling activities and migration protocols. There is no provision within this process to discuss the development of national asylum seeking legislation, processes for domestic processing of asylum claims or burden sharing in contrast to other regions such as Africa and South America (i.e. 2009 African Union Convention for the Protection and Assistance of the Internally Displaced, 1969 African Union Convention Governing the Specific Aspects of Refugee Problems in Africa and 1984 Cartagena Declaration on Refugees [Americas]) (PEF 2010: 19).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Independent Music Project is centred around the development and creation of new music, and includes research into copyright, business models of the future, new technologies, and new audiences. The music industry is undergoing the most radical changes it has faced in almost a century. New digital technologies have made the production, distribution, and promotion of recorded music accessible to anyone with a personal computer. People can now make high-quality digital copies of music and distribute them globally within minutes. Even bastions of the established industries, such as EMI and Columbia, are struggling to make sense of the new industry terrain. The whole employment picture has changed just as radically for people who wish to make a living from music. In Australia, many of the avenues that provided employment for musicians have either disappeared or dramatically shrunk. The advertising industry no longer provides the level of employment it used to prior to the Federal deregulation of the industry in 1992. In many places, new legislative pressures on inner-city and suburban venues have diminished the number of performance spaces that musicians can work in. Just as quickly, new sectors have opened to professional musicians: computer games, ringtones, sound-enabled toys and web advertising all present new opportunities to the enterprising musician. The opportunity to distribute music internationally without being signed to a major label is very attractive to many aspiring and established professionals. No doubt the music industry will face many more challenges as technologies continue to change, as global communication gets easier and faster, and as the challenges to copyright proliferate and change. These challenges cannot be successfully met on a single front. They require research and expertise from all sectors being affected, and this is why the independent music project (IMP) exists.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Independent Music Project is centred around the development and creation of new music, and includes research into copyright, business models of the future, new technologies, and new audiences. The music industry is undergoing the most radical changes it has faced in almost a century. New digital technologies have made the production, distribution, and promotion of recorded music accessible to anyone with a personal computer. People can now make high-quality digital copies of music and distribute them globally within minutes. Even bastions of the established industries, such as EMI and Columbia, are struggling to make sense of the new industry terrain. The whole employment picture has changed just as radically for people who wish to make a living from music. In Australia, many of the avenues that provided employment for musicians have either disappeared or dramatically shrunk. The advertising industry no longer provides the level of employment it used to prior to the Federal deregulation of the industry in 1992. In many places, new legislative pressures on inner-city and suburban venues have diminished the number of performance spaces that musicians can work in. Just as quickly, new sectors have opened to professional musicians: computer games, ringtones, sound-enabled toys and web advertising all present new opportunities to the enterprising musician. The opportunity to distribute music internationally without being signed to a major label is very attractive to many aspiring and established professionals. No doubt the music industry will face many more challenges as technologies continue to change, as global communication gets easier and faster, and as the challenges to copyright proliferate and change. These challenges cannot be successfully met on a single front. They require research and expertise from all sectors being affected, and this is why the independent music project (IMP) exists.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Independent Music Project is centred around the development and creation of new music, and includes research into copyright, business models of the future, new technologies, and new audiences. The music industry is undergoing the most radical changes it has faced in almost a century. New digital technologies have made the production, distribution, and promotion of recorded music accessible to anyone with a personal computer. People can now make high-quality digital copies of music and distribute them globally within minutes. Even bastions of the established industries, such as EMI and Columbia, are struggling to make sense of the new industry terrain. The whole employment picture has changed just as radically for people who wish to make a living from music. In Australia, many of the avenues that provided employment for musicians have either disappeared or dramatically shrunk. The advertising industry no longer provides the level of employment it used to prior to the Federal deregulation of the industry in 1992. In many places, new legislative pressures on inner-city and suburban venues have diminished the number of performance spaces that musicians can work in. Just as quickly, new sectors have opened to professional musicians: computer games, ringtones, sound-enabled toys and web advertising all present new opportunities to the enterprising musician. The opportunity to distribute music internationally without being signed to a major label is very attractive to many aspiring and established professionals. No doubt the music industry will face many more challenges as technologies continue to change, as global communication gets easier and faster, and as the challenges to copyright proliferate and change. These challenges cannot be successfully met on a single front. They require research and expertise from all sectors being affected, and this is why the independent music project (IMP) exists.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Independent Music Project is centred around the development and creation of new music, and includes research into copyright, business models of the future, new technologies, and new audiences. The music industry is undergoing the most radical changes it has faced in almost a century. New digital technologies have made the production, distribution, and promotion of recorded music accessible to anyone with a personal computer. People can now make high-quality digital copies of music and distribute them globally within minutes. Even bastions of the established industries, such as EMI and Columbia, are struggling to make sense of the new industry terrain. The whole employment picture has changed just as radically for people who wish to make a living from music. In Australia, many of the avenues that provided employment for musicians have either disappeared or dramatically shrunk. The advertising industry no longer provides the level of employment it used to prior to the Federal deregulation of the industry in 1992. In many places, new legislative pressures on inner-city and suburban venues have diminished the number of performance spaces that musicians can work in. Just as quickly, new sectors have opened to professional musicians: computer games, ringtones, sound-enabled toys and web advertising all present new opportunities to the enterprising musician. The opportunity to distribute music internationally without being signed to a major label is very attractive to many aspiring and established professionals. No doubt the music industry will face many more challenges as technologies continue to change, as global communication gets easier and faster, and as the challenges to copyright proliferate and change. These challenges cannot be successfully met on a single front. They require research and expertise from all sectors being affected, and this is why the independent music project (IMP) exists.