188 research outputs found

    Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing

    Get PDF
    For the sake of practicability of cloud computing, fine-grained data access is frequently required in the sense that users with different attributes should be granted different levels of access privileges. However, most of existing access control solutions are not suitable for resource-constrained users because of large computation costs, which linearly increase with the complexity of access policies. In this paper, we present an access control system based on ciphertext-policy attribute-based encryption. The proposed access control system enjoys constant computation cost and is proven secure in the random oracle model under the decision Bilinear Diffie-Hellman Exponent assumption. Our access control system supports AND-gate access policies with multiple values and wildcards, and it can efficiently support direct user revocation. Performance comparisons indicate that the proposed solution is suitable for resource-constrained environment

    Acquisition of interpreting strategies by student interpreters

    Get PDF
    To explore the acquisition of interpreting strategies by student interpreters, the present study first built a framework of 22 strategies based on a thorough literature review, and then identified and compared 21 strategies adopted by 66 student interpreters in a task of B-to-A consecutive interpreting (CI) between two training stages (2nd month and end of an academic year). Quantitative and qualitative analyses of interpreting performance, substantiated by retrospection and interview data, resulted in two major findings. First, as interpreting training proceeded, these students employed more frequently the strategies that interpreting instructors recommended (Type-A strategies, e.g. explicitation), and less frequently the strategies that the instructors advised them to use with caution (Type-B strategies, e.g. approximation) and the strategies that the instructors did not recommend (Type-C strategies, e.g. guessing). Second, the frequency of Type-A strategies positively correlated with interpreting performance, and that of Type-C strategies negatively correlated, especially at Stage 2. In addition, our retrospection and interview data indicated that, for these unbalanced L2 learners, strategy use mostly aimed for better information accuracy and completeness, especially at Stage 2. These results suggest that strategy training is effective, and strategy acquisition is plausible

    Genome-wide analysis of CCCH zinc finger family in Arabidopsis and rice

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Genes in the CCCH family encode zinc finger proteins containing the motif with three cysteines and one histidine residues. They have been known to play important roles in RNA processing as RNA-binding proteins in animals. To date, few plant CCCH proteins have been studied functionally.</p> <p>Results</p> <p>In this study, a comprehensive computational analysis identified 68 and 67 CCCH family genes in Arabidopsis and rice, respectively. A complete overview of this gene family in Arabidopsis was presented, including the gene structures, phylogeny, protein motifs, and chromosome locations. In addition, a comparative analysis between these genes in Arabidopsis and rice was performed. These results revealed that the CCCH families in Arabidopsis and rice were divided into 11 and 8 subfamilies, respectively. The gene duplication contributed to the expansion of the CCCH gene family in Arabidopsis genome. Expression studies indicated that CCCH proteins exhibit a variety of expression patterns, suggesting diverse functions. Finally, evolutionary analysis showed that one subfamily is higher plant specific. The expression profile indicated that most members of this subfamily are regulated by abiotic or biotic stresses, suggesting that they could have an effective role in stress tolerance.</p> <p>Conclusion</p> <p>Our comparative genomics analysis of CCCH genes and encoded proteins in two model plant species provides the first step towards the functional dissection of this emerging family of potential RNA-binding proteins.</p

    Attribute-based encryption for cloud computing access control: A survey

    Get PDF
    National Research Foundation (NRF) Singapore; AXA Research Fun

    Security and privacy in smart health: Efficient policy-hiding attribute-based access control

    Get PDF
    AXA Research Fund Singapor

    A Survey of Natural Language Generation

    Full text link
    This paper offers a comprehensive review of the research on Natural Language Generation (NLG) over the past two decades, especially in relation to data-to-text generation and text-to-text generation deep learning methods, as well as new applications of NLG technology. This survey aims to (a) give the latest synthesis of deep learning research on the NLG core tasks, as well as the architectures adopted in the field; (b) detail meticulously and comprehensively various NLG tasks and datasets, and draw attention to the challenges in NLG evaluation, focusing on different evaluation methods and their relationships; (c) highlight some future emphasis and relatively recent research issues that arise due to the increasing synergy between NLG and other artificial intelligence areas, such as computer vision, text and computational creativity.Comment: Accepted by ACM Computing Survey (CSUR) 202
    corecore