129,065 research outputs found
A framework for proving the correctness of cryptographic protocol properties by linear temporal logic
In this paper, a framework for cryptographic protocol analysis using linear temporal logic is proposed. The framework can be used to specify and analyse security protocols. It aims to investigate and analyse the security protocols properties that are secure or have any flaws. The framework extends the linear temporal logic by including the knowledge of participants in each status that may change over the time. It includes two main parts, the Language of Temporal Logic (LTL) and the domain knowledge. The ability of the framework is demonstrated by analysing the Needham-Schroeder public key protocol and the Andrew Secure RPC protocol as examples
THE NATURE OF FEEDBACK:HOW DIFFERENT TYPES OF PEER FEEDBACK AFFECT WRITING PERFORMANCE
Although providing feedback is commonly practiced in education, there is general agreement regarding what type of feedback is most helpful and why it is helpful. This study examined the relationship between various types of feedback, potential internal mediators, and the likelihood of implementing feedback. Five main predictions were developed from the feedback literature in writing, specifically regarding feedback features (summarization, identifying problems, providing solutions, localization, explanations, scope, praise, and mitigating language) as they relate to potential causal mediators of problem or solution understand and problem or solution agreement, leading to the final outcome of feedback implementation.To empirically test the proposed feedback model, 1073 feedback segments from writing assessed by peers was analyzed. Feedback was collected using SWoRD, an online peer review system. Each segment was coded for each of the feedback features, implementation, agreement, and understanding. The correlations between the feedback features, levels of mediating variables, and implementation rates revealed several significant relationships. Understanding was the only significant mediator of implementation. Several feedback features were associated with understanding: including solutions, a summary of the performance, and the location of the problem were associated with increased understanding; and explanations to problems were associated with decreased understanding. Implications of these results are discussed
Formal nursing terminology systems: a means to an end
In response to the need to support diverse and complex information requirements, nursing has developed a number of different terminology systems. The two main kinds of systems that have emerged are enumerative systems and combinatorial systems, although some systems have characteristics of both approaches. Differences in the structure and content of terminology systems, while useful at a local level, prevent effective wider communication, information sharing, integration of record systems, and comparison of nursing elements of healthcare information at a more global level. Formal nursing terminology systems present an alternative approach. This paper describes a number of recent initiatives and explains how these emerging approaches may help to augment existing nursing terminology systems and overcome their limitations through mediation. The development of formal nursing terminology systems is not an end in itself and there remains a great deal of work to be done before success can be claimed. This paper presents an overview of the key issues outstanding and provides recommendations for a way forward
Verified Correctness and Security of mbedTLS HMAC-DRBG
We have formalized the functional specification of HMAC-DRBG (NIST 800-90A),
and we have proved its cryptographic security--that its output is
pseudorandom--using a hybrid game-based proof. We have also proved that the
mbedTLS implementation (C program) correctly implements this functional
specification. That proof composes with an existing C compiler correctness
proof to guarantee, end-to-end, that the machine language program gives strong
pseudorandomness. All proofs (hybrid games, C program verification, compiler,
and their composition) are machine-checked in the Coq proof assistant. Our
proofs are modular: the hybrid game proof holds on any implementation of
HMAC-DRBG that satisfies our functional specification. Therefore, our
functional specification can serve as a high-assurance reference.Comment: Appearing in CCS '1
Probabilistic Hybrid Action Models for Predicting Concurrent Percept-driven Robot Behavior
This article develops Probabilistic Hybrid Action Models (PHAMs), a realistic
causal model for predicting the behavior generated by modern percept-driven
robot plans. PHAMs represent aspects of robot behavior that cannot be
represented by most action models used in AI planning: the temporal structure
of continuous control processes, their non-deterministic effects, several modes
of their interferences, and the achievement of triggering conditions in
closed-loop robot plans.
The main contributions of this article are: (1) PHAMs, a model of concurrent
percept-driven behavior, its formalization, and proofs that the model generates
probably, qualitatively accurate predictions; and (2) a resource-efficient
inference method for PHAMs based on sampling projections from probabilistic
action models and state descriptions. We show how PHAMs can be applied to
planning the course of action of an autonomous robot office courier based on
analytical and experimental results
False claims about false memory research
Pezdek and Lam [Pezdek, K. & Lam, S. (2007). What research paradigms have cognitive psychologists used to study âFalse memory,â and what are the implications of these choices? Consciousness and Cognition] claim that the majority of research into false memories has been misguided. Specifically, they charge that false memory scientists have been (1) misusing the term âfalse memory,â (2) relying on the wrong methodologies to study false memories, and (3) misapplying false memory research to real world situations. We review each of these claims and highlight the problems with them. We conclude that several types of false memory research have advanced our knowledge of autobiographical and recovered memories, and that future research will continue to make significant contributions to how we understand memory and memory errors
- âŠ