297 research outputs found

    Informació i comentaris. Margarida Xirgu

    Get PDF

    Contribution to the construction of fingerprinting and watermarking schemes to protect mobile agents and multimedia content

    Get PDF
    The main characteristic of fingerprinting codes is the need of high error-correction capacity due to the fact that they are designed to avoid collusion attacks which will damage many symbols from the codewords. Moreover, the use of fingerprinting schemes depends on the watermarking system that is used to embed the codeword into the content and how it honors the marking assumption. In this sense, even though fingerprinting codes were mainly used to protect multimedia content, using them on software protection systems seems an option to be considered. This thesis, studies how to use codes which have iterative-decoding algorithms, mainly turbo-codes, to solve the fingerprinting problem. Initially, it studies the effectiveness of current approaches based on concatenating tradicioanal fingerprinting schemes with convolutional codes and turbo-codes. It is shown that these kind of constructions ends up generating a high number of false positives. Even though this thesis contains some proposals to improve these schemes, the direct use of turbo-codes without using any concatenation with a fingerprinting code as inner code has also been considered. It is shown that the performance of turbo-codes using the appropiate constituent codes is a valid alternative for environments with hundreds of users and 2 or 3 traitors. As constituent codes, we have chosen low-rate convolutional codes with maximum free distance. As for how to use fingerprinting codes with watermarking schemes, we have studied the option of using watermarking systems based on informed coding and informed embedding. It has been discovered that, due to different encodings available for the same symbol, its applicability to embed fingerprints is very limited. On this sense, some modifications to these systems have been proposed in order to properly adapt them to fingerprinting applications. Moreover the behavior and impact over a video produced as a collusion of 2 users by the YouTube’s s ervice has been s tudied. We have also studied the optimal parameters for viable tracking of users who have used YouTube and conspired to redistribute copies generated by a collusion attack. Finally, we have studied how to implement fingerprinting schemes and software watermarking to fix the problem of malicious hosts on mobile agents platforms. In this regard, four different alternatives have been proposed to protect the agent depending on whether you want only detect the attack or avoid it in real time. Two of these proposals are focused on the protection of intrusion detection systems based on mobile agents. Moreover, each of these solutions has several implications in terms of infrastructure and complexity.Els codis fingerprinting es caracteritzen per proveir una alta capacitat correctora ja que han de fer front a atacs de confabulació que malmetran una part important dels símbols de la paraula codi. D'atra banda, la utilització de codis de fingerprinting en entorns reals està subjecta a que l'esquema de watermarking que gestiona la incrustació sigui respectuosa amb la marking assumption. De la mateixa manera, tot i que el fingerprinting neix de la protecció de contingut multimèdia, utilitzar-lo en la protecció de software comença a ser una aplicació a avaluar. En aquesta tesi s'ha estudiat com aplicar codis amb des codificació iterativa, concretament turbo-codis, al problema del rastreig de traïdors en el context del fingerprinting digital. Inicialment s'ha qüestionat l'eficàcia dels enfocaments actuals en la utilització de codis convolucionals i turbo-codis que plantegen concatenacions amb esquemes habituals de fingerprinting. S'ha demostrat que aquest tipus de concatenacions portaven, de forma implícita, a una elevada probabilitat d'inculpar un usuari innocent. Tot i que s'han proposat algunes millores sobre aquests esquemes , finalment s'ha plantejat l'ús de turbocodis directament, evitant així la concatenació amb altres esquemes de fingerprinting. S'ha demostrat que, si s'utilitzen els codis constituents apropiats, el rendiment del turbo-descodificador és suficient per a ser una alternativa aplicable en entorns amb varis centenars d'usuaris i 2 o 3 confabuladors . Com a codis constituents s'ha optat pels codis convolucionals de baix ràtio amb distància lliure màxima. Pel que fa a com utilitzar els codis de fingerprinting amb esquemes de watermarking, s'ha estudiat l'opció d'utilitzar sistemes de watermarking basats en la codificació i la incrustació informada. S'ha comprovat que, degut a la múltiple codificació del mateix símbol, la seva aplicabilitat per incrustar fingerprints és molt limitada. En aquest sentit s'ha plantejat algunes modificacions d'aquests sistemes per tal d'adaptar-los correctament a aplicacions de fingerprinting. D'altra banda s'ha avaluat el comportament i l'impacte que el servei de YouTube produeix sobre un vídeo amb un fingerprint incrustat. A més , s'ha estudiat els paràmetres òptims per a fer viable el rastreig d'usuaris que han confabulat i han utilitzat YouTube per a redistribuir la copia fruït de la seva confabulació. Finalment, s'ha estudiat com aplicar els esquemes de fingerprinting i watermarking de software per solucionar el problema de l'amfitrió maliciós en agents mòbils . En aquest sentit s'han proposat quatre alternatives diferents per a protegir l'agent en funció de si és vol només detectar l'atac o evitar-lo en temps real. Dues d'aquestes propostes es centren en la protecció de sistemes de detecció d'intrusions basats en agents mòbils. Cadascuna de les solucions té diverses implicacions a nivell d'infrastructura i de complexitat.Postprint (published version

    Joan Esculies, Via fora, lladres! El separatisme català i el teatre patriòtic

    Get PDF

    Albert de Quintana, polític d'ordre

    Get PDF

    Phase diagram for a single flexible Stockmayer polymer at zero field

    Get PDF
    The equilibrium conformations of a flexible permanent magnetic chain that consists of a sequence of linked magnetic colloidal nanoparticles with short-ranged Lennard-Jones attractive interactions (Stockmayer polymer) are thoroughly analysed via Langevin dynamics simulations. A tentative phase diagram is presented for a chain of length N=100N=100. The phase diagram exhibits several unusual conformational phases when compared with the non-magnetic chains. These phases are characterised by a large degree of conformational anisotropy, and consist of closed chains, helicoidal-like states, partially collapsed states, and very compact disordered states. The phase diagram contains several interesting features like the existence of at least two 'triple points'

    Más allá de lo escrito : la hipertextualidad y la multimodalidad en los blogs como estrategias discursivas de la comunicación digital

    Get PDF
    Esta comunicación analiza la hipertextualidad y la multimodalidad de las entradas de blog como características interrelacionadas con el texto escrito, y muestra el uso que los alumnos del Máster de Formación de Profesores de E/LE, de la Universidad de Barcelona realizan para el desarrollo de su literacidad digital.This paper analyses the hypertextuality and multimodality of blog posts taking into account their interrelation with the written text, and shows the use that the students of the Masters degree i n Teaching Spanish as a Foreign Language at the University of Barcelona make in the development of their digital literacy

    Educació ambiental per a un nou mil·lenni

    Get PDF
    Abstract not availabl

    Hyperfine splittings of heavy quarkonium hybrids

    Full text link
    In the framework of the Born-Oppenheimer Effective Field Theory, the hyperfine structure of heavy quarkonium hybrids at leading order in the 1/m Q expansion is determined by two potentials. We estimate those potentials by interpolating between the known short distance behavior and the long distance behavior calculated in the QCD Effective String Theory. The long distance behavior depends, at leading order, on two parameters which can be obtained from the long distance behavior of the heavy quarkonium potentials (up to sign ambiguities). The short distance behavior depends, at leading order, on two extra paramentes, which are obtained from a lattice calculation of the lower lying charmonium hybrid multiplets. This allows us to predict the hyperfine splitting both of bottomonium hybrids and of higher multiplets of charmonium hybrids. We carry out a careful error analysis and compare with other approaches.Comment: 10 pages, 3 figures, 5 tables, matches journal versio

    Analysing E-tutoring Strategies to Foster Pre-service Language Teachers' Reflective Practice in the First Stages of Building an E-portfolio

    Get PDF
    This study aims to analyse the tutoring strategies that three e-tutors employed in online written interactions with two of their corresponding pre-service teachers in the first stages of the development of their e-portfolio within a master's degree in online language teaching. Building on the data collected from thirty-four documents, which include the written drafts of the initial document of their e-portfolios (the Starting Point), the final versions of this document and their email exchanges, and the study identifies six types of discursive-pedagogical strategies: Suggesting; Inquiring for reflection; Providing information and instructions; Correcting; Giving positive feedback; and Using affective moves. This article provides examples of each strategy, which illustrate the diverse ways in which the e-tutors tried to foster the pre-service language teachers' reflection. The results are relevant for a deeper understanding of the effective processes involved in e-tutoring and the development of reflective practice in the creation of an e-portfolio
    corecore