16,504 research outputs found

    Dynamic trust models for ubiquitous computing environments

    Get PDF
    A significant characteristic of ubiquitous computing is the need for interactions of highly mobile entities to be secure: secure both for the entity and the environment in which the entity operates. Moreover, ubiquitous computing is also characterised by partial views over the state of the global environment, implying that we cannot guarantee that an environment can always verify the properties of the mobile entity that it has just received. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. an entity might encrypt a deliberately incorrect answer to a legitimate request). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two entities during an interaction in a ubiquitous environment

    California Energy Commission

    Get PDF

    Object Matching in Distributed Video Surveillance Systems by LDA-Based Appearance Descriptors

    Full text link
    Establishing correspondences among object instances is still challenging in multi-camera surveillance systems, especially when the cameras’ fields of view are non-overlapping. Spatiotemporal constraints can help in solving the correspondence problem but still leave a wide margin of uncertainty. One way to reduce this uncertainty is to use appearance information about the moving objects in the site. In this paper we present the preliminary results of a new method that can capture salient appearance characteristics at each camera node in the network. A Latent Dirichlet Allocation (LDA) model is created and maintained at each node in the camera network. Each object is encoded in terms of the LDA bag-of-words model for appearance. The encoded appearance is then used to establish probable matching across cameras. Preliminary experiments are conducted on a dataset of 20 individuals and comparison against Madden’s I-MCHR is reported

    Blood rheology, cardiovascular risk factors, and cardiovascular disease: The West of Scotland Coronary Prevention Study

    Get PDF
    The West of Scotland Coronary Prevention Study (WOSCOPS) showed that pravastatin reduced the risk of coronary heart disease (CHD) events in 6,595 middle-aged hypercholesterolaemic men aged 45-64 years without prior myocardial infarction followed for an average of 4.9 years. We hypothesised prospectively (a) that baseline levels of haemorheological variables were related to baseline and incident CHD and to mortality; and (b) that reduction in lipoproteins by pravastatin would lower plasma and blood viscosity, a potential contributory mechanism to CHD events. We therefore studied plasma and blood viscosity, fibrinogen, haematocrit, and blood cell counts at baseline and 1 year. At baseline, plasma and blood viscosity were related to risk factors, CHD measures, and claudication. On univariate analysis, baseline levels of all rheological variables (except platelet count) were related to incident CHD; CHD mortality; and total mortality. On multivariate analysis including baseline CHD and risk factors, plasma and blood viscosity, haematocrit and white cell count each remained significantly associated with incident CHD; while fibrinogen remained an independent predictor of mortality (all p<0.03). After one year, lipoprotein reduction by pravastatin was associated with significant reductions (about one quarter of a standard deviation) in plasma viscosity (mean difference 0.02 mPa.s, p<0.001) and in blood viscosity (mean difference 0.06 mPa.s, p<0.001), but was not associated with significant changes in other rheological variables. We therefore suggest that pravastatin therapy, which reduces elevated lipoproteins in hypercholesterolaemic men, may lower risks of CHD and mortality partly by lowering plasma and blood viscosity. Further studies are required to test this hypothesis

    Maser Source Finding Methods in HOPS

    Full text link
    The {\bf H}2_2{\bf O} Southern Galactic {\bf P}lane {\bf S}urvey (HOPS) has observed 100 square degrees of the Galactic plane, using the Mopra radio telescope to search for emission from multiple spectral lines in the 12\,mm band (19.5\,--\,27.5\,GHz). Perhaps the most important of these spectral lines is the 22.2\,GHz water maser transition. We describe the methods used to identify water maser candidates and subsequent confirmation of the sources. Our methods involve a simple determination of likely candidates by searching peak emission maps, utilising the intrinsic nature of water maser emission - spatially unresolved and spectrally narrow-lined. We estimate completeness limits and compare our method with results from the {\sc Duchamp} source finder. We find that the two methods perform similarly. We conclude that the similarity in performance is due to the intrinsic limitation of the noise characteristics of the data. The advantages of our method are that it is slightly more efficient in eliminating spurious detections and is simple to implement. The disadvantage is that it is a manual method of finding sources and so is not practical on datasets much larger than HOPS, or for datasets with extended emission that needs to be characterised. We outline a two-stage method for the most efficient means of finding masers, using {\sc Duchamp}.Comment: 8 pages, 1 table, 4 figures. Accepted for publication in PASA special issue on Source Finding & Visualisatio

    AdS/CFT and the Information Paradox

    Get PDF
    The information paradox in the quantum evolution of black holes is studied within the framework of the AdS/CFT correspondence. The unitarity of the CFT strongly suggests that all information about an initial state that forms a black hole is returned in the Hawking radiation. The CFT dynamics implies an information retention time of order the black hole lifetime. This fact determines many qualitative properties of the non-local effects that must show up in a semi-classical effective theory in the bulk. We argue that no violations of causality are apparent to local observers, but the semi-classical theory in the bulk duplicates degrees of freedom inside and outside the event horizon. Non-local quantum effects are required to eliminate this redundancy. This leads to a breakdown of the usual classical-quantum correspondence principle in Lorentzian black hole spacetimes.Comment: 16 pages, harvmac, reference added, minor correction

    Deduction with XOR Constraints in Security API Modelling

    Get PDF
    We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module. We also show how our technique can be applied to standard security protocols

    Nonsingular Black Hole Evaporation and ``Stable'' Remnants

    Get PDF
    We examine the evaporation of two--dimensional black holes, the classical space--times of which are extended geometries, like for example the two--dimensional section of the extremal Reissner--Nordstrom black hole. We find that the evaporation in two particular models proceeds to a stable end--point. This should represent the generic behavior of a certain class of two--dimensional dilaton--gravity models. There are two distinct regimes depending on whether the back--reaction is weak or strong in a certain sense. When the back--reaction is weak, evaporation proceeds via an adiabatic evolution, whereas for strong back--reaction, the decay proceeds in a somewhat surprising manner. Although information loss is inevitable in these models at the semi--classical level, it is rather benign, in that the information is stored in another asymptotic region.Comment: 23 pages, 6 figures, harvmac and epsf, RU-93-12, PUPT-1399, NSF-ITP-93-5
    • 

    corecore