129,065 research outputs found

    A framework for proving the correctness of cryptographic protocol properties by linear temporal logic

    Get PDF
    In this paper, a framework for cryptographic protocol analysis using linear temporal logic is proposed. The framework can be used to specify and analyse security protocols. It aims to investigate and analyse the security protocols properties that are secure or have any flaws. The framework extends the linear temporal logic by including the knowledge of participants in each status that may change over the time. It includes two main parts, the Language of Temporal Logic (LTL) and the domain knowledge. The ability of the framework is demonstrated by analysing the Needham-Schroeder public key protocol and the Andrew Secure RPC protocol as examples

    THE NATURE OF FEEDBACK:HOW DIFFERENT TYPES OF PEER FEEDBACK AFFECT WRITING PERFORMANCE

    Get PDF
    Although providing feedback is commonly practiced in education, there is general agreement regarding what type of feedback is most helpful and why it is helpful. This study examined the relationship between various types of feedback, potential internal mediators, and the likelihood of implementing feedback. Five main predictions were developed from the feedback literature in writing, specifically regarding feedback features (summarization, identifying problems, providing solutions, localization, explanations, scope, praise, and mitigating language) as they relate to potential causal mediators of problem or solution understand and problem or solution agreement, leading to the final outcome of feedback implementation.To empirically test the proposed feedback model, 1073 feedback segments from writing assessed by peers was analyzed. Feedback was collected using SWoRD, an online peer review system. Each segment was coded for each of the feedback features, implementation, agreement, and understanding. The correlations between the feedback features, levels of mediating variables, and implementation rates revealed several significant relationships. Understanding was the only significant mediator of implementation. Several feedback features were associated with understanding: including solutions, a summary of the performance, and the location of the problem were associated with increased understanding; and explanations to problems were associated with decreased understanding. Implications of these results are discussed

    Formal nursing terminology systems: a means to an end

    Get PDF
    In response to the need to support diverse and complex information requirements, nursing has developed a number of different terminology systems. The two main kinds of systems that have emerged are enumerative systems and combinatorial systems, although some systems have characteristics of both approaches. Differences in the structure and content of terminology systems, while useful at a local level, prevent effective wider communication, information sharing, integration of record systems, and comparison of nursing elements of healthcare information at a more global level. Formal nursing terminology systems present an alternative approach. This paper describes a number of recent initiatives and explains how these emerging approaches may help to augment existing nursing terminology systems and overcome their limitations through mediation. The development of formal nursing terminology systems is not an end in itself and there remains a great deal of work to be done before success can be claimed. This paper presents an overview of the key issues outstanding and provides recommendations for a way forward

    Verified Correctness and Security of mbedTLS HMAC-DRBG

    Full text link
    We have formalized the functional specification of HMAC-DRBG (NIST 800-90A), and we have proved its cryptographic security--that its output is pseudorandom--using a hybrid game-based proof. We have also proved that the mbedTLS implementation (C program) correctly implements this functional specification. That proof composes with an existing C compiler correctness proof to guarantee, end-to-end, that the machine language program gives strong pseudorandomness. All proofs (hybrid games, C program verification, compiler, and their composition) are machine-checked in the Coq proof assistant. Our proofs are modular: the hybrid game proof holds on any implementation of HMAC-DRBG that satisfies our functional specification. Therefore, our functional specification can serve as a high-assurance reference.Comment: Appearing in CCS '1

    Probabilistic Hybrid Action Models for Predicting Concurrent Percept-driven Robot Behavior

    Full text link
    This article develops Probabilistic Hybrid Action Models (PHAMs), a realistic causal model for predicting the behavior generated by modern percept-driven robot plans. PHAMs represent aspects of robot behavior that cannot be represented by most action models used in AI planning: the temporal structure of continuous control processes, their non-deterministic effects, several modes of their interferences, and the achievement of triggering conditions in closed-loop robot plans. The main contributions of this article are: (1) PHAMs, a model of concurrent percept-driven behavior, its formalization, and proofs that the model generates probably, qualitatively accurate predictions; and (2) a resource-efficient inference method for PHAMs based on sampling projections from probabilistic action models and state descriptions. We show how PHAMs can be applied to planning the course of action of an autonomous robot office courier based on analytical and experimental results

    False claims about false memory research

    Get PDF
    Pezdek and Lam [Pezdek, K. & Lam, S. (2007). What research paradigms have cognitive psychologists used to study “False memory,” and what are the implications of these choices? Consciousness and Cognition] claim that the majority of research into false memories has been misguided. Specifically, they charge that false memory scientists have been (1) misusing the term “false memory,” (2) relying on the wrong methodologies to study false memories, and (3) misapplying false memory research to real world situations. We review each of these claims and highlight the problems with them. We conclude that several types of false memory research have advanced our knowledge of autobiographical and recovered memories, and that future research will continue to make significant contributions to how we understand memory and memory errors
    • 

    corecore