60,978 research outputs found
Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication
We investigate the secret key agreement from correlated Gaussian sources in
which the legitimate parties can use the public communication with limited
rate. For the class of protocols with the one-way public communication, we show
a closed form expression of the optimal trade-off between the rate of key
generation and the rate of the public communication. Our results clarify an
essential difference between the key agreement from discrete sources and that
from continuous sources.Comment: 9 pages, no figure, Version 2 is a published version. The results are
not changed from version 1. Explanations are polishe
Two-Dimensional Source Coding by Means of Subblock Enumeration
A technique of lossless compression via substring enumeration (CSE) attains
compression ratios as well as popular lossless compressors for one-dimensional
(1D) sources. The CSE utilizes a probabilistic model built from the circular
string of an input source for encoding the source.The CSE is applicable to
two-dimensional (2D) sources such as images by dealing with a line of pixels of
2D source as a symbol of an extended alphabet. At the initial step of the CSE
encoding process, we need to output the number of occurrences of all symbols of
the extended alphabet, so that the time complexity increase exponentially when
the size of source becomes large. To reduce the time complexity, we propose a
new CSE which can encode a 2D source in block-by-block instead of line-by-line.
The proposed CSE utilizes the flat torus of an input 2D source as a
probabilistic model for encoding the source instead of the circular string of
the source. Moreover, we analyze the limit of the average codeword length of
the proposed CSE for general sources.Comment: 5 pages, Submitted to ISIT201
Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding
By extending the notion of minimum rank distance, this paper introduces two
new relative code parameters of a linear code C_1 of length n over a field
extension and its subcode C_2. One is called the relative
dimension/intersection profile (RDIP), and the other is called the relative
generalized rank weight (RGRW). We clarify their basic properties and the
relation between the RGRW and the minimum rank distance. As applications of the
RDIP and the RGRW, the security performance and the error correction capability
of secure network coding, guaranteed independently of the underlying network
code, are analyzed and clarified. We propose a construction of secure network
coding scheme, and analyze its security performance and error correction
capability as an example of applications of the RDIP and the RGRW. Silva and
Kschischang showed the existence of a secure network coding in which no part of
the secret message is revealed to the adversary even if any dim C_1-1 links are
wiretapped, which is guaranteed over any underlying network code. However, the
explicit construction of such a scheme remained an open problem. Our new
construction is just one instance of secure network coding that solves this
open problem.Comment: IEEEtran.cls, 25 pages, no figure, accepted for publication in IEEE
Transactions on Information Theor
Secret Key Agreement by Soft-decision of Signals in Gaussian Maurer's Model
We consider the problem of secret key agreement in Gaussian Maurer's Model.
In Gaussian Maurer's model, legitimate receivers, Alice and Bob, and a
wire-tapper, Eve, receive signals randomly generated by a satellite through
three independent memoryless Gaussian channels respectively. Then Alice and Bob
generate a common secret key from their received signals. In this model, we
propose a protocol for generating a common secret key by using the result of
soft-decision of Alice and Bob's received signals. Then, we calculate a lower
bound on the secret key rate in our proposed protocol. As a result of
comparison with the protocol that only uses hard-decision, we found that the
higher rate is obtained by using our protocol.Comment: 10 pages, 4 figures, to be appear in Proc. of 2008 IEEE International
Symposium on Information Theory in Toronto, Canad
Regulating capital flows in emerging markets: The IMF and the global financial crisis
In the wake of the financial crisis the International Monetary Fund (IMF) began to publicly express support for what have traditionally been referred to as ‘capital controls’. This paper empirically examines the extent to which the change in IMF discourse on these matters has resulted in significant changes in actual IMF policy advice. By creating and analyzing a database of IMF Article IV reports, we examine whether the financial crisis had an independent impact on IMF support for capital controls. We find that the IMF’s level of support for capital controls has increased as a result of the crisis and as the vulnerabilities associated with capital flows accentuate
Recommended from our members
The narrative coherence of witness transcripts in children on the autism spectrum
Background and Aims. Autistic children often recall fewer details about witnessed events than typically developing children (of comparable age and ability), although the information they recall is generally no less accurate. Previous research has not examined the narrative coherence of such accounts, despite higher quality narratives potentially being perceived more favourably by criminal justice professionals and juries. This study compared the narrative coherence of witness transcripts produced by autistic and typically developing (TD) children (ages 6-11 years, IQs 70+).
Methods and Procedures. Secondary analysis was carried out on interview transcripts from a subset of 104 participants (autism=52, TD=52) who had taken part in a larger study of eyewitness skills in autistic and TD children. Groups were matched on chronological age, IQ and receptive language ability. Coding frameworks were adopted from existing narrative research, featuring elements of ‘story grammar’.
Outcomes and Results. Whilst fewer event details were reported by autistic children, there were no group differences in narrative coherence (number and diversity of ‘story grammar’ elements used), narrative length or semantic diversity.
Conclusions and Implications. These findings suggest that the narrative coherence of autistic children’s witness accounts is equivalent to TD peers of comparable age and ability
- …