99,323 research outputs found

    Johann Gottlieb Fichte, and the Trap of Inhalt (Content) and Form: An Information Perspective on Music Copyright

    Get PDF
    In the digital environment, copyright law has become trapped in an assessment of what has been taken, rather than what has been done with copied materials and elements. This expands the scope of copyright into areas where it should not find infringement (such as sampling, mash-ups and other transformative uses) while encouraging activities that are problematic (such as hiding sources). This article argues that the trap was laid by the German idealist philosopher Johann Gottlieb Fichte whose influential 1793 article Proof of the Unlawfulness of Reprinting for the first time distinguishes Inhalt (i.e. content free to all) and Form (i.e. the author’s inalienable expression) as copyright categories. It is shown that Fichte’s structure conflates norms of communication and norms of transaction. An alternative path for copyright law in an information society is sketched from a separation of these norms: copying should be assessed from (i) the attribution of sources, and (ii) the degree to which original and derivative materials compete with each other. Throughout the article, transformative practices in music set the scene

    A semantic foundation for hidden state

    Get PDF
    We present the first complete soundness proof of the antiframe rule, a recently proposed proof rule for capturing information hiding in the presence of higher-order store. Our proof involves solving a non-trivial recursive domain equation, and it helps identify some of the key ingredients for soundness

    Steganography of vector graphics and typography in infrared security printing

    Get PDF
    The paper elaborates on linear graphics and typographic elements in the function of hiding information in security printing. Hidden information is introduced with the goal to protect the originality of the produced graphic designs so their counterfeiting would be impossible. Those graphic designs are made with programmed linear and typographical elements that have different response in the part of the spectrum visible to the human eye, and in the near infrared part of the spectrum observed with instruments. In order to have different response in the said spectrum parts, in each of the two designs colors are separated in two different ways. In order to achieve unique results, complex algorithms and random numbers are used for color separation. Unique graphic designs have been obtained by merging design and security against counterfeiting

    Patterns of the electric organ discharge during courtship and spawning in the mormyrid fish, Pollimyrus isidori

    Get PDF
    Pollimyrus isidori's electric organ discharge (EOD) is of the pulse type. Patterns of EOD intervals were investigated prior to, during and following spawning behaviors as related with overt behaviors, and with the sound production by the nestbuilding male. Prior to the time of reproduction, isolated and socially interacting fish (n=15) showed characteristic discharge interval patterns for resting, swimming, probing, hovering and hiding activities. Males (n=8) and females (n=6) did not differ in their mean EOD repetition rates during resting (11.6±2.5 Hz), nor Short Bursts/min (less than 20 intervals of 8–13 ms). In interacting fish Long Bursts (greater than 20 intervals of 8–13 ms, lasting for more than 300 ms) were observed only during the attack and bite sequence. A pursuing fish displayed a rapid alternation of Long Bursts with Discharge Breaks (300–1000 ms silence) during the chase behavior. Avoidance behavior which followed from several attacks was correlated with a Medium Uniform Rate (8–12 Hz) normally lasting for 20 to 60 s, or a Discharge Arrest (silence greater than 1 s) in the submissive fish. The nocturnal courtship behavior began soon after dark (1900 h). Spawning typically started 2 to 5 h after dark, continuing for 2 to 6 h until about 0200 h. During courtship and spawning the female's brief visits (15–25 s) to the male's territory recurred every 30–60 s. At all other times the female was aggressively excluded from the nest region. Courtship and spawning behaviors are described along with the electrical displays identified from 19 spawnings in three fish pairs (from a total of 37 spawnings in 4 males and 4 females). Just prior to the onset of courtship behavior, with male territorial aggression beginning to decline, females switched from a Medium Sporadic Rate pattern (resting and hiding patterns; 13 Hz) to a Medium Uniform Rate pattern (6–8 Hz) while still in their hiding area. Females continued to display this uniform rate throughout the courship and spawning period, including the courtship and spawning bouts when Discharge Breaks or Arrests also occurred. This persistance distinguishes the courtship pattern from the similar avoidance pattern (see above). The male courtship and spawning EOD pattern was similar to the female's and unique for a territorial male. He switched from a High Sporadic Rate (swimming EOD pattern; about 18 Hz) to a regularized Medium Uniform Rate (about 9 to 11 Hz) only during courtship and spawning bouts, including 1–3 EOD Breaks during Vent-to-Vent coupling (average interval: 272±71 ms, n=37). No sooner had the female left the spawning site than he resumed displaying a High Sporadic Rate. This temporal correlation of reproductive behaviors with electrical displays suggests their instrumental role in mutual acceptance of mates. Males showed their sex-specific type of EOD phase-locking, the Preferred Latency Response, only during the first few hours of entry of a fish in their tank. Two females with EOD waveform features more typical of males also spawned repeatedly; waveform does not appear to be critical. Males stopped their nocturnal sound production for the later part of courtship and the whole spawning period. Except for infrequent attacks on the female between spawning bouts, the male did not resume singing until the end of spawning when all eggs were shed (around 0200 h); from this time on the male sang until dawn. The sequencing of the three acoustic elements (moans, grunts, growls) are described. A catalogue of discharge patterns correlated with overt behaviors (Tables 1, 2), and an integrated summary time table of P. isidori's complex reproductive behavior are presented

    Integrating the common variability language with multilanguage annotations for web engineering

    Get PDF
    Web applications development involves managing a high diversity of files and resources like code, pages or style sheets, implemented in different languages. To deal with the automatic generation of custom-made configurations of web applications, industry usually adopts annotation-based approaches even though the majority of studies encourage the use of composition-based approaches to implement Software Product Lines. Recent work tries to combine both approaches to get the complementary benefits. However, technological companies are reticent to adopt new development paradigms such as feature-oriented programming or aspect-oriented programming. Moreover, it is extremely difficult, or even impossible, to apply these programming models to web applications, mainly because of their multilingual nature, since their development involves multiple types of source code (Java, Groovy, JavaScript), templates (HTML, Markdown, XML), style sheet files (CSS and its variants, such as SCSS), and other files (JSON, YML, shell scripts). We propose to use the Common Variability Language as a composition-based approach and integrate annotations to manage fine grained variability of a Software Product Line for web applications. In this paper, we (i) show that existing composition and annotation-based approaches, including some well-known combinations, are not appropriate to model and implement the variability of web applications; and (ii) present a combined approach that effectively integrates annotations into a composition-based approach for web applications. We implement our approach and show its applicability with an industrial real-world system.Universidad de MĂĄlaga. Campus de Excelencia Internacional AndalucĂ­a Tech

    Execution Integrity with In-Place Encryption

    Full text link
    Instruction set randomization (ISR) was initially proposed with the main goal of countering code-injection attacks. However, ISR seems to have lost its appeal since code-injection attacks became less attractive because protection mechanisms such as data execution prevention (DEP) as well as code-reuse attacks became more prevalent. In this paper, we show that ISR can be extended to also protect against code-reuse attacks while at the same time offering security guarantees similar to those of software diversity, control-flow integrity, and information hiding. We present Scylla, a scheme that deploys a new technique for in-place code encryption to hide the code layout of a randomized binary, and restricts the control flow to a benign execution path. This allows us to i) implicitly restrict control-flow targets to basic block entries without requiring the extraction of a control-flow graph, ii) achieve execution integrity within legitimate basic blocks, and iii) hide the underlying code layout under malicious read access to the program. Our analysis demonstrates that Scylla is capable of preventing state-of-the-art attacks such as just-in-time return-oriented programming (JIT-ROP) and crash-resistant oriented programming (CROP). We extensively evaluate our prototype implementation of Scylla and show feasible performance overhead. We also provide details on how this overhead can be significantly reduced with dedicated hardware support

    Supporting Focus and Context Awareness in 3D Modelling Tasks Using Multi-Layered Displays

    Get PDF
    Most 3D modelling software have been developed for conventional 2D displays, and as such, lack support for true depth perception. This contributes to making polygonal 3D modelling tasks challenging, particularly when models are complex and consist of a large number of overlapping components (e.g. vertices, edges) and objects (i.e. parts). Research has shown that users of 3D modelling software often encounter a range of difficulties, which collectively can be defined as focus and context awareness problems. These include maintaining position and orientation awarenesses, as well as recognizing distance between individual components and objects in 3D spaces. In this paper, we present five visualization and interaction techniques we have developed for multi-layered displays, to better support focus and context awareness in 3D modelling tasks. The results of a user study we conducted shows that three of these five techniques improve users' 3D modelling task performance
    • 

    corecore