23,214 research outputs found

    Is the Mind Massively Modular?

    Get PDF
    Articl

    A Dualist Account of Phenomenal Concepts

    Get PDF
    The phenomenal concept strategy is considered a powerful response to anti-physicalist arguments. This physicalist strategy aims to provide a satisfactory account of dualist intuitions without being committed to ontological dualist conclusions. In this paper I first argue that physicalist accounts of phenomenal concepts fail to explain their cognitive role. Second, I develop an encapsulation account of phenomenal concepts that best explains their particularities. Finally, I argue that the encapsulation account, which features self-representing experiences, implies non-physical referents. Therefore, the account of phenomenal concepts that has strong explanatory power does not explain away dualist intuitions—rather, it reinforces dualism

    Design and analysis of group key exchange protocols

    Get PDF
    A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol

    Encapsulated social perception of emotional expressions

    Get PDF
    In this paper I argue that the detection of emotional expressions is, in its early stages, informationally encapsulated. I clarify and defend such a view via the appeal to data from social perception on the visual processing of faces, bodies, facial and bodily expressions. Encapsulated social perception might exist alongside processes that are cognitively penetrated, and that have to do with recognition and categorization, and play a central evolutionary function in preparing early and rapid responses to the emotional stimuli

    Encapsulation and Aggregation

    Get PDF
    A notion of object ownership is introduced as a solution to difficult problems of specifying and reasoning about complex linked structures and of modeling aggregates (composit objects). Syntax and semantics are provided for extending Eiffel with language support for object ownership annotation and checking. The ideas also apply to other OOPLs such as C++

    Layers in the Fabric of Mind: A Critical Review of Cognitive Ontogeny

    Get PDF
    The essay is critically examines the conceptual problems with the influential modularity model of mind. We shall see that one of the essential characters of modules, namely informational encapsulation, is not only inessential, it ties a knot at a crucial place blocking the solution to the problem of understanding the formation of concepts from percepts (nodes of procedural knowledge). Subsequently I propose that concept formation takes place by modulation of modules leading to cross-representations, which were otherwise prevented by encapsulation. It must be noted that the argument is not against modular architecture, but a variety of an architecture that prevents interaction among modules. This is followed by a brief argument demonstrating that module without modularization, i.e. without developmental history, is impossible. Finally the emerging picture of cognitive development is drawn in the form of the layers in the fabric of mind, with a brief statement of the possible implications

    FoCaLiZe: Inside an F-IDE

    Full text link
    For years, Integrated Development Environments have demonstrated their usefulness in order to ease the development of software. High-level security or safety systems require proofs of compliance to standards, based on analyses such as code review and, increasingly nowadays, formal proofs of conformance to specifications. This implies mixing computational and logical aspects all along the development, which naturally raises the need for a notion of Formal IDE. This paper examines the FoCaLiZe environment and explores the implementation issues raised by the decision to provide a single language to express specification properties, source code and machine-checked proofs while allowing incremental development and code reusability. Such features create strong dependencies between functions, properties and proofs, and impose an particular compilation scheme, which is described here. The compilation results are runnable OCaml code and a checkable Coq term. All these points are illustrated through a running example.Comment: In Proceedings F-IDE 2014, arXiv:1404.578
    • 

    corecore