936 resultados para static random access memory
Resumo:
The world is increasingly moving towards more open models of publishing and communication. The UK government has demonstrated a firm commitment to ensuring that academic research outputs are made available to all who might benefit from access to them, and its open access policy attempts to make academic publications freely available to readers, rather than being locked behind pay walls or only available to researchers with access to well-funded university libraries. Open access policies have an important role to play in fostering an open innovation ecosystem and ensuring that maximum value is derived from investments in university-based research. But are we ready to embrace this change?
Resumo:
Research suggests that the length and quality of police-citizen encounters affect policing outcomes. The Koper Curve, for example, shows that the optimal length for police presence in hot spots is between 14 and 15 minutes, with diminishing returns observed thereafter. Our study, using data from the Queensland Community Engagement Trial (QCET), examines the impact of encounter length on citizen perceptions of police performance. QCET involved a randomised field trial, where 60 random breath test (RBT) traffic stop operations were randomly allocated to an experimental condition involving a procedurally just encounter or a business-as-usual control condition. Our results show that the optimal length of time for procedurally just encounters during RBT traffic stops is just less than 2 minutes. We show, therefore, that it is important to encourage and facilitate positive police–citizen encounters during RBTat traffic stops, while ensuring that the length of these interactions does not pass a point of diminishing returns.
Resumo:
Many emerging economies are dangling the patent system to stimulate bio-technological innovations with the ultimate premise that these will improve their economic and social growth. The patent system mandates full disclosure of the patented invention in exchange of a temporary exclusive patent right. Recently, however, patent offices have fallen short of complying with such a mandate, especially for genetic inventions. Most patent offices provide only static information about disclosed patent sequences and even some do not keep track of the sequence listing data in their own database. The successful partnership of QUT Library and Cambia exemplifies advocacy in Open Access, Open Innovation and User Participation. The library extends its services to various departments within the university, builds and encourages research networks to complement skills needed to make a contribution in the real world.
Resumo:
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in an adaptive-identity attack the adversary is allowed to choose this identity adaptively. Our first system—BB1—is based on the well studied decisional bilinear Diffie–Hellman assumption, and extends naturally to systems with hierarchical identities, or HIBE. Our second system—BB2—is based on a stronger assumption which we call the Bilinear Diffie–Hellman Inversion assumption and provides another approach to building IBE systems. Our first system, BB1, is very versatile and well suited for practical applications: the basic hierarchical construction can be efficiently secured against chosen-ciphertext attacks, and further extended to support efficient non-interactive threshold decryption, among others, all without using random oracles. Both systems, BB1 and BB2, can be modified generically to provide “full” IBE security (i.e., against adaptive-identity attacks), either using random oracles, or in the standard model at the expense of a non-polynomial but easy-to-compensate security reduction.
Resumo:
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.
Resumo:
This article investigates the discourses of academic legitimacy that surround the production, consumption, and accreditation of online scholarship. Using the web-based media and cultural studies journal (http://journal.media-culture.org.au) as a case study, it examines how online scholarly journals often position themselves as occupying a space between the academic and the popular and as having a functional advantage over print-based media in promoting a spirit of public intellectualism. The current research agenda of both government and academe prioritises academic research that is efficient, self-promoting, and relevant to the public. Yet, although the cost-effectiveness and public-intellectual focus of online scholarship speak to these research priorities, online journals such as M/C Journal have occupied, and continue to occupy, an unstable position in relation to the perceived academic legitimacy of their content. Although some online scholarly journals have achieved a limited form of recognition within a system of accreditation that still privileges print-based scholarship, I argue that this, nevertheless, points to the fact that traditional textual notions of legitimate academic work continue to pervade the research agenda of an academe that increasingly promotes flexible delivery of teaching and online research initiatives.
Resumo:
We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted.
Resumo:
The purpose of this paper is to describe a new decomposition construction for perfect secret sharing schemes with graph access structures. The previous decomposition construction proposed by Stinson is a recursive method that uses small secret sharing schemes as building blocks in the construction of larger schemes. When the Stinson method is applied to the graph access structures, the number of such “small” schemes is typically exponential in the number of the participants, resulting in an exponential algorithm. Our method has the same flavor as the Stinson decomposition construction; however, the linear programming problem involved in the construction is formulated in such a way that the number of “small” schemes is polynomial in the size of the participants, which in turn gives rise to a polynomial time construction. We also show that if we apply the Stinson construction to the “small” schemes arising from our new construction, both have the same information rate.
Resumo:
For the purpose of developing collaborative support in design studio environments, we have carried out ethnographic fieldwork in professional and academic product design studios. Our intention was to understand design practices beyond the productivity point of view and take into account the experiential, inspirational and aesthetical aspects of design practices. Using examples from our fieldwork, we develop our results around three broad themes by which design professionals support communication and collaboration: (1) use of artefacts, (2) use of space and (3) designerly practices. We use the results of our fieldwork for drawing implications for designing technologies for the design studio culture.
Resumo:
Physical design objects such as sketches, drawings, collages, storyboards and models play an important role in supporting communication and coordination in design studios. CAM (Cooperative Artefact Memory) is a mobile-tagging based messaging system that allows designers to collaboratively store relevant information onto their design objects in the form of messages, annotations and external web links. We studied the use of CAM in a Product Design studio over three weeks, involving three different design teams. In this paper, we briefly describe CAM and show how it serves as 'object memory'.
Resumo:
Australia has been populated for more than 40,000 years with Indigenous Australians joined by European settlers only 230 years ago. The first settlers consisted of convicts from more than 28 countries and members of the British army who arrived in 1788 to establish a British penal colony. Mass migration in the nineteenth century with one and a half million immigrants from Europe, principally from the United Kingdom and Ireland (Haines and Shlomowitz, 1992), established the continent as an Anglo society in the Pacific. In the twentieth century immigrants came from many European countries and in the latter decades from many parts of Asia and the Middle East (Collins, 1991, pp.10-13). In the 21st century Australia has an ethnically and culturally diverse population. The original Indigenous population of Australia accounts for approximately 460,000 or 2.5 per cent of the total population (ABS, 2006a). Estimates are that around 4.5m. persons in the population (close to 20 per cent), were born outside Australia with the majority of these arriving from Europe, principally the United Kingdom, and New Zealand (ABS, 2006b). Like many other countries, Australia has a legacy of discrimination and inequality in employment. Propelled by racist ideologies and the male breadwinner ideology, Indigenous Australians, and non-European immigrants, and women were barred from certain jobs and paid less for their work than any white male counterpart. These conditions were legally sanctioned through the industrial relations system and other laws in the nineteenth and first half of the twentieth century. Since the 1960s a dramatic change has occurred in social policy and national legislation and Australia today has an extensive array of laws which forbid employment discrimination on race, ethnicity, gender and many other characteristics, and other approaches which promote proactive organizational plans and actions to achieve equity in employment. This chapter outlines these developments.
Resumo:
Here, we investigate the genetic basis of human memory in healthy individuals and the potential role of two polymorphisms, previously implicated in memory function. We have explored aspects of retrospective and prospective memory including semantic, short term, working and long-term memory in conjunction with brain derived neurotrophic factor (BDNF) and tumor necrosis factor-alpha (TNF-alpha). The memory scores for healthy individuals in the population were obtained for each memory type and the population was genotyped via restriction fragment length polymorphism for the BDNF rs6265 (Val66Met) SNP and via pyrosequencing for the TNF-alpha rs113325588 SNP. Using univariate ANOVA, a significant association of the BDNF polymorphism with visual and spatial memory retention and a significant association of the TNF-alpha polymorphism was observed with spatial memory retention. In addition, a significant interactive effect between BDNF and TNF-alpha polymorphisms was observed in spatial memory retention. In practice visual memory involves spatial information and the two memory systems work together, however our data demonstrate that individuals with the Val/Val BDNF genotype have poorer visual memory but higher spatial memory retention, indicating a level of interaction between TNF-alpha and BDNF in spatial memory retention. This is the first study to use genetic analysis to determine the interaction between BDNF and TNF-alpha in relation to memory in normal adults and provides important information regarding the effect of genetic determinants and gene interactions on human memory.
Resumo:
Background Directed cell migration is essential for normal development. In most of the migratory cell populations that have been analysed in detail to date, all of the cells migrate as a collective from one location to another. However, there are also migratory cell populations that must populate the areas through which they migrate, and thus some cells get left behind while others advance. Very little is known about how individual cells behave to achieve concomitant directional migration and population of the migratory route. We examined the behavior of enteric neural crest-derived cells (ENCCs), which must both advance caudally to reach the anal end and populate each gut region. Results The behaviour of individual ENCCs was examined using live imaging and mice in which ENCCs express a photoconvertible protein. We show that individual ENCCs exhibit very variable directionalities and speed; as the migratory wavefront of ENCCs advances caudally, each gut region is populated primarily by some ENCCs migrating non-directionally. After populating each region, ENCCs remain migratory for at least 24 hours. Endothelin receptor type B (EDNRB) signaling is known to be essential for the normal advance of the ENCC population. We now show that perturbation of EDNRB principally affects individual ENCC speed rather than directionality. The trajectories of solitary ENCCs, which occur transiently at the wavefront, were consistent with an unbiased random walk and so cell-cell contact is essential for directional migration. ENCCs migrate in close association with neurites. We showed that although ENCCs often use neurites as substrates, ENCCs lead the way, neurites are not required for chain formation and neurite growth is more directional than the migration of ENCCs as a whole. Conclusions Each gut region is initially populated by sub-populations of ENCCs migrating non-directionally, rather than stopping. This might provide a mechanism for ensuring a uniform density of ENCCs along the growing gut.
Resumo:
Event report on the Open Access and Research 2013 conference which focused on recent developments and the strategic advantages they bring to the research sector.