99,323 research outputs found
Johann Gottlieb Fichte, and the Trap of Inhalt (Content) and Form: An Information Perspective on Music Copyright
In the digital environment, copyright law has become trapped in an assessment of what
has been taken, rather than what has been done with copied materials and elements. This
expands the scope of copyright into areas where it should not find infringement (such as
sampling, mash-ups and other transformative uses) while encouraging activities that are
problematic (such as hiding sources). This article argues that the trap was laid by the
German idealist philosopher Johann Gottlieb Fichte whose influential 1793 article Proof
of the Unlawfulness of Reprinting for the first time distinguishes Inhalt (i.e. content free
to all) and Form (i.e. the authorâs inalienable expression) as copyright categories. It is
shown that Fichteâs structure conflates norms of communication and norms of
transaction. An alternative path for copyright law in an information society is sketched
from a separation of these norms: copying should be assessed from (i) the attribution of
sources, and (ii) the degree to which original and derivative materials compete with each
other. Throughout the article, transformative practices in music set the scene
A semantic foundation for hidden state
We present the first complete soundness proof of the antiframe
rule, a recently proposed proof rule for capturing information hiding
in the presence of higher-order store. Our proof involves solving a
non-trivial recursive domain equation, and it helps identify some of the
key ingredients for soundness
Steganography of vector graphics and typography in infrared security printing
The paper elaborates on linear graphics and typographic elements in the function of hiding information in security printing. Hidden information is introduced with the goal to protect the originality of the produced graphic designs so their counterfeiting would be impossible. Those graphic designs are made with programmed linear and typographical elements that have different response in the part of the spectrum visible to the human eye, and in the near infrared part of the spectrum observed with instruments. In order to have different response in the said spectrum parts, in each of the two designs colors are separated in two different ways. In order to achieve unique results, complex algorithms and random numbers are used for color separation. Unique graphic designs have been obtained by merging design and security against counterfeiting
Patterns of the electric organ discharge during courtship and spawning in the mormyrid fish, Pollimyrus isidori
Pollimyrus isidori's electric organ discharge (EOD) is of the pulse type. Patterns of EOD intervals were investigated prior to, during and following spawning behaviors as related with overt behaviors, and with the sound production by the nestbuilding male. Prior to the time of reproduction, isolated and socially interacting fish (n=15) showed characteristic discharge interval patterns for resting, swimming, probing, hovering and hiding activities. Males (n=8) and females (n=6) did not differ in their mean EOD repetition rates during resting (11.6±2.5 Hz), nor Short Bursts/min (less than 20 intervals of 8â13 ms). In interacting fish Long Bursts (greater than 20 intervals of 8â13 ms, lasting for more than 300 ms) were observed only during the attack and bite sequence. A pursuing fish displayed a rapid alternation of Long Bursts with Discharge Breaks (300â1000 ms silence) during the chase behavior. Avoidance behavior which followed from several attacks was correlated with a Medium Uniform Rate (8â12 Hz) normally lasting for 20 to 60 s, or a Discharge Arrest (silence greater than 1 s) in the submissive fish. The nocturnal courtship behavior began soon after dark (1900 h). Spawning typically started 2 to 5 h after dark, continuing for 2 to 6 h until about 0200 h. During courtship and spawning the female's brief visits (15â25 s) to the male's territory recurred every 30â60 s. At all other times the female was aggressively excluded from the nest region. Courtship and spawning behaviors are described along with the electrical displays identified from 19 spawnings in three fish pairs (from a total of 37 spawnings in 4 males and 4 females). Just prior to the onset of courtship behavior, with male territorial aggression beginning to decline, females switched from a Medium Sporadic Rate pattern (resting and hiding patterns; 13 Hz) to a Medium Uniform Rate pattern (6â8 Hz) while still in their hiding area. Females continued to display this uniform rate throughout the courship and spawning period, including the courtship and spawning bouts when Discharge Breaks or Arrests also occurred. This persistance distinguishes the courtship pattern from the similar avoidance pattern (see above). The male courtship and spawning EOD pattern was similar to the female's and unique for a territorial male. He switched from a High Sporadic Rate (swimming EOD pattern; about 18 Hz) to a regularized Medium Uniform Rate (about 9 to 11 Hz) only during courtship and spawning bouts, including 1â3 EOD Breaks during Vent-to-Vent coupling (average interval: 272±71 ms, n=37). No sooner had the female left the spawning site than he resumed displaying a High Sporadic Rate. This temporal correlation of reproductive behaviors with electrical displays suggests their instrumental role in mutual acceptance of mates. Males showed their sex-specific type of EOD phase-locking, the Preferred Latency Response, only during the first few hours of entry of a fish in their tank. Two females with EOD waveform features more typical of males also spawned repeatedly; waveform does not appear to be critical. Males stopped their nocturnal sound production for the later part of courtship and the whole spawning period. Except for infrequent attacks on the female between spawning bouts, the male did not resume singing until the end of spawning when all eggs were shed (around 0200 h); from this time on the male sang until dawn. The sequencing of the three acoustic elements (moans, grunts, growls) are described. A catalogue of discharge patterns correlated with overt behaviors (Tables 1, 2), and an integrated summary time table of P. isidori's complex reproductive behavior are presented
Integrating the common variability language with multilanguage annotations for web engineering
Web applications development involves managing a high diversity of files and resources like code, pages or style sheets, implemented in different languages. To deal with the automatic generation of
custom-made configurations of web applications, industry usually adopts annotation-based approaches even though the majority of studies encourage the use of composition-based approaches to implement
Software Product Lines. Recent work tries to combine both approaches to get the complementary benefits. However, technological companies are reticent to adopt new development paradigms
such as feature-oriented programming or aspect-oriented programming.
Moreover, it is extremely difficult, or even impossible, to apply
these programming models to web applications, mainly because of
their multilingual nature, since their development involves multiple
types of source code (Java, Groovy, JavaScript), templates (HTML,
Markdown, XML), style sheet files (CSS and its variants, such as
SCSS), and other files (JSON, YML, shell scripts). We propose to
use the Common Variability Language as a composition-based approach
and integrate annotations to manage fine grained variability
of a Software Product Line for web applications. In this paper, we (i)
show that existing composition and annotation-based approaches,
including some well-known combinations, are not appropriate to
model and implement the variability of web applications; and (ii)
present a combined approach that effectively integrates annotations
into a composition-based approach for web applications. We implement
our approach and show its applicability with an industrial
real-world system.Universidad de MĂĄlaga. Campus de Excelencia Internacional AndalucĂa Tech
Execution Integrity with In-Place Encryption
Instruction set randomization (ISR) was initially proposed with the main goal
of countering code-injection attacks. However, ISR seems to have lost its
appeal since code-injection attacks became less attractive because protection
mechanisms such as data execution prevention (DEP) as well as code-reuse
attacks became more prevalent.
In this paper, we show that ISR can be extended to also protect against
code-reuse attacks while at the same time offering security guarantees similar
to those of software diversity, control-flow integrity, and information hiding.
We present Scylla, a scheme that deploys a new technique for in-place code
encryption to hide the code layout of a randomized binary, and restricts the
control flow to a benign execution path. This allows us to i) implicitly
restrict control-flow targets to basic block entries without requiring the
extraction of a control-flow graph, ii) achieve execution integrity within
legitimate basic blocks, and iii) hide the underlying code layout under
malicious read access to the program. Our analysis demonstrates that Scylla is
capable of preventing state-of-the-art attacks such as just-in-time
return-oriented programming (JIT-ROP) and crash-resistant oriented programming
(CROP). We extensively evaluate our prototype implementation of Scylla and show
feasible performance overhead. We also provide details on how this overhead can
be significantly reduced with dedicated hardware support
Supporting Focus and Context Awareness in 3D Modelling Tasks Using Multi-Layered Displays
Most 3D modelling software have been developed for conventional 2D displays, and as such, lack support for true depth perception. This contributes to making polygonal 3D modelling tasks challenging, particularly when models are complex and consist of a large number of overlapping components (e.g. vertices, edges) and objects (i.e. parts). Research has shown that users of 3D modelling software often encounter a range of difficulties, which collectively can be defined as focus and context awareness problems. These include maintaining position and orientation awarenesses, as well as recognizing distance between individual components and objects in 3D spaces. In this paper, we present five visualization and interaction techniques we have developed for multi-layered displays, to better support focus and context awareness in 3D modelling tasks. The results of a user study we conducted shows that three of these five techniques improve users' 3D modelling task performance
- âŠ