872 resultados para traditional signatures


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Performance comparisons between File Signatures and Inverted Files for text retrieval have previously shown several significant shortcomings of file signatures relative to inverted files. The inverted file approach underpins most state-of-the-art search engine algorithms, such as Language and Probabilistic models. It has been widely accepted that traditional file signatures are inferior alternatives to inverted files. This paper describes TopSig, a new approach to the construction of file signatures. Many advances in semantic hashing and dimensionality reduction have been made in recent times, but these were not so far linked to general purpose, signature file based, search engines. This paper introduces a different signature file approach that builds upon and extends these recent advances. We are able to demonstrate significant improvements in the performance of signature file based indexing and retrieval, performance that is comparable to that of state of the art inverted file based systems, including Language models and BM25. These findings suggest that file signatures offer a viable alternative to inverted files in suitable settings and positions the file signatures model in the class of Vector Space retrieval models.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

One-time proxy signatures are one-time signatures for which a primary signer can delegate his or her signing capability to a proxy signer. In this work we propose two one-time proxy signature schemes with different security properties. Unlike other existing one-time proxy signatures that are constructed from public key cryptography, our proposed schemes are based one-way functions without trapdoors and so they inherit the communication and computation efficiency from the traditional one-time signatures. Although from a verifier point of view, signatures generated by the proxy are indistinguishable from those created by the primary signer, a trusted authority can be equipped with an algorithm that allows the authority to settle disputes between the signers. In our constructions, we use a combination of one-time signatures, oblivious transfer protocols and certain combinatorial objects. We characterise these new combinatorial objects and present constructions for them.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper is about localising across extreme lighting and weather conditions. We depart from the traditional point-feature-based approach as matching under dramatic appearance changes is a brittle and hard thing. Point feature detectors are fixed and rigid procedures which pass over an image examining small, low-level structure such as corners or blobs. They apply the same criteria applied all images of all places. This paper takes a contrary view and asks what is possible if instead we learn a bespoke detector for every place. Our localisation task then turns into curating a large bank of spatially indexed detectors and we show that this yields vastly superior performance in terms of robustness in exchange for a reduced but tolerable metric precision. We present an unsupervised system that produces broad-region detectors for distinctive visual elements, called scene signatures, which can be associated across almost all appearance changes. We show, using 21km of data collected over a period of 3 months, that our system is capable of producing metric localisation estimates from night-to-day or summer-to-winter conditions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving—a form of self-enforcement—and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer; we show an additional application of these new extractable trapdoor functions to standard digital signatures.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A goal of phylogeography is to relate patterns of genetic differentiation to potential historical geographic isolating events. Quaternary glaciations, particularly the one culminating in the Last Glacial Maximum ~21 ka (thousands of years ago), greatly affected the distributions and population sizes of temperate marine species as their ranges retreated southward to escape ice sheets. Traditional genetic models of glacial refugia and routes of recolonization include these predictions: low genetic diversity in formerly glaciated areas, with a small number of alleles/haplotypes dominating disproportionately large areas, and high diversity including "private" alleles in glacial refugia. In the Northern Hemisphere, low diversity in the north and high diversity in the south are expected. This simple model does not account for the possibility of populations surviving in relatively small northern periglacial refugia. If these periglacial populations experienced extreme bottlenecks, they could have the low genetic diversity expected in recolonized areas with no refugia, but should have more endemic diversity (private alleles) than recently recolonized areas. This review examines evidence of putative glacial refugia for eight benthic marine taxa in the temperate North Atlantic. All data sets were reanalyzed to allow direct comparisons between geographic patterns of genetic diversity and distribution of particular clades and haplotypes including private alleles. We contend that for marine organisms the genetic signatures of northern periglacial and southern refugia can be distinguished from one another. There is evidence for several periglacial refugia in northern latitudes, giving credence to recent climatic reconstructions with less extensive glaciation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Stress response pathways allow cells to sense and respond to environmental changes and adverse pathophysiological states. Pharmacological modulation of cellular stress pathways has implications in the treatment of human diseases, including neurodegenerative disorders, cardiovascular disease, and cancer. The quinone methide triterpene celastrol, derived from a traditional Chinese medicinal herb, has numerous pharmacological properties, and it is a potent activator of the mammalian heat shock transcription factor HSF1. However, its mode of action and spectrum of cellular targets are poorly understood. We show here that celastrol activates Hsf1 in Saccharomyces cerevisiae at a similar effective concentration seen in mammalian cells. Transcriptional profiling revealed that celastrol treatment induces a battery of oxidant defense genes in addition to heat shock genes. Celastrol activated the yeast Yap1 oxidant defense transcription factor via the carboxy-terminal redox center that responds to electrophilic compounds. Antioxidant response genes were likewise induced in mammalian cells, demonstrating that the activation of two major cell stress pathways by celastrol is conserved. We report that celastrol's biological effects, including inhibition of glucocorticoid receptor activity, can be blocked by the addition of excess free thiol, suggesting a chemical mechanism for biological activity based on modification of key reactive thiols by this natural product.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, the transport simulation of large road networks has become far more rapid and detailed, and many exciting developments in this field have emerged. In this perspective, the authors describe the simulation of automobile, pedestrian and rail traffic, coupled to new applications, such as the embedding of traffic simulation into driving simulators, to give a more realistic environment of driver behavior surrounding the subject vehicle.