Search results for "Crypt"

showing 10 items of 1111 documents

Exploiting Correlation between Body Gestures and Spoken Sentences for Real-time Emotion Recognition

2017

Humans communicate their affective states through different media, both verbal and non-verbal, often used at the same time. The knowledge of the emotional state plays a key role to provide personalized and context-related information and services. This is the main reason why several algorithms have been proposed in the last few years for the automatic emotion recognition. In this work we exploit the correlation between one's affective state and the simultaneous body expressions in terms of speech and gestures. Here we propose a system for real-time emotion recognition from gestures. In a first step, the system builds a trusted dataset of association pairs (motion data -> emotion pattern), a…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniGround truthSettore INF/01 - InformaticaExploitK-nearest neighborbusiness.industrySpeech recognitioncomputer.software_genreMotion (physics)CorrelationDynamic Time Warping Emotion Recognition K-nearest neighborEmotion RecognitionKey (cryptography)Artificial intelligenceState (computer science)businessAssociation (psychology)PsychologycomputerNatural language processingGestureDynamic Time Warping
researchProduct

Secure random number generation in wireless sensor networks

2011

The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverseapplications, ranging from environmental monitoring to home automation, has raised more and more atten-tion to the issues related to the design of specifically customized security mechanisms. The scarcity ofcomputational, storage, and bandwidth resources cannot definitely be disregarded in such context, and thismakes the implementation of security algorithms particularly challenging. This paper proposes a securityframework for the generation of true random numbers, which are paramount as the core building blockfor many security algorithms; the intrinsic nature of wireless sensor nodes …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniLeader electionleader election random numbers generation wireless sensor networksRandom number generationbusiness.industryComputer scienceDistributed computingKey distribution in wireless sensor networksTrue random numbers generatorRobustness (computer science)Mobile wireless sensor networknetwork securityWirelessbusinesswireless sensor networksWireless sensor networkRandomnessComputer Science::Cryptography and SecurityComputer network
researchProduct

Simulation and anticipation as tools for coordinating with the future

2013

A key goal in designing an artificial intelligence capable of performing complex tasks is a mechanism that allows it to efficiently choose appropriate and relevant actions in a variety of situations and contexts. Nowhere is this more obvious than in the case of building a general intelligence, where the contextual choice and application of actions must be done in the presence of large numbers of alternatives, both subtly and obviously distinct from each other. We present a framework for action selection based on the concurrent activity of multiple forward and inverse models. A key characteristic of the proposed system is the use of simulation to choose an action: the system continuously sim…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMechanism (biology)Computer sciencebusiness.industryAction selectionOutcome (game theory)AnticipationVariety (cybernetics)Domain (software engineering)Action SelectionAction (philosophy)Anticipation (artificial intelligence)Key (cryptography)Artificial intelligencebusinessMachine learning techniquesSimulation
researchProduct

SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications

2020

Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniModularity (networks)General Computer ScienceExploitEdge devicebusiness.industryComputer scienceDistributed computingHuman Activity RecognitionCyber SecurityCloud computingCryptographic protocolEncryptionlcsh:Q350-390lcsh:QA75.5-76.95Artificial Intelligencelcsh:Information theoryMobile Crowdsensinglcsh:Electronic computers. Computer scienceEnhanced Data Rates for GSM EvolutionbusinessProtocol (object-oriented programming)
researchProduct

Bayesian System for Differential Cryptanalysis of DES

2014

AbstractThis paper proposes a new formalization for the differential cryptanalysis of DES (Data Encryption Standard) based on Bayesian Networks (BN), an artificial intelligence framework used for reasoning on data affected by uncertainty. Through the proposed approach it is possible to analyze DES from a novel point of view, thus paving the way for the development of a new class of cryptanalysis methods.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNeural cryptographyTheoretical computer scienceDifferential cryptanalysisbusiness.industryBayesian probabilityBayesian networkCryptographyData_CODINGANDINFORMATIONTHEORYEncryptionDESlaw.inventionBayesian Networks;lawCryptographyBayesian NetworksPoint (geometry)Cryptanalysisbusinessdifferential cryptanalysiMathematicsdifferential cryptanalysisIERI Procedia
researchProduct

A Structural Approach to Infer Recurrent Relations in Data

2014

Extracting knowledge from a great amount of collected data has been a key problem in Artificial Intelligence during the last decades. In this context, the word "knowledge" refers to the non trivial new relations not easily deducible from the observation of the data. Several approaches have been used to accomplish this task, ranging from statistical to structural methods, often heavily dependent on the particular problem of interest. In this work we propose a system for knowledge extraction that exploits the power of an ontology approach. Ontology is used to describe, organise and discover new knowledge. To show the effectiveness of our system in extracting and generalising the knowledge emb…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniOntology learningbusiness.industryComputer scienceContext (language use)Ontology (information science)Machine learningcomputer.software_genrePattern recognition MDL OntologiesGrammar inductionKnowledge extractionKey (cryptography)OntologyArtificial intelligencebusinesscomputerWord (computer architecture)
researchProduct

A TRNG Exploiting Multi-Source Physical Data

2010

In recent years, the considerable progress of miniaturization and the consequent increase of the efficiency of digital circuits has allowed a great diffusion of the wireless sensor network technology. This has led to the growth of applications and protocols for applying these networks to several scenarios, such as the military one, where it is essential to deploy security protocols in order to prevent opponents from accessing the information exchanged among sensor nodes. This paper analyzes security issues of data processed by the WSN and describes a system able to generate sequences of random numbers, which can be used by security algorithms and protocols. The proposed True Random Number G…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRandom number generationbusiness.industryNetwork securityComputer scienceDistributed computingNode (networking)Cryptographic protocolTrusted third partyKey distribution in wireless sensor networksWireless Sensor Networks Random Number Generator Network SecurityNISTbusinessWireless sensor networkComputer network
researchProduct

Retargeting Framework Based on Monte-carlo Sampling

2015

Advance in image technology and proliferation of acquisition devices like smartphones, digital cameras, etc., made the display of digital images ubiquitous. Many displays exist in the market, spanning within a large variety of resolutions and shapes. Thus, displaying content optimizing the available number of pixels has become a very important issue in the multimedia community, and the image retargeting problem is being widely faced. In this work, we propose an image retargeting framework based on monte-carlo sampling. We operate the non-homogeneous resizing as the composition of several simple atomic resizing functions. The shape of such atomic operator can be chosen within a set of tested…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRetargetingSaliencyPixelComputer sciencebusiness.industryComputer Science (all)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONVisualizationSet (abstract data type)Image resizingDigital imageSeam carvingMonte-carloRetargetingKey (cryptography)Computer visionArtificial intelligencebusiness
researchProduct

Investigating Proactive Search Support in Conversations

2018

Conversations among people involve solving disputes, building common ground, and reinforce mutual beliefs and assumptions. Conversations often require external information that can support these human activities. In this paper, we study how a spoken conversation can be supported by a proactive search agent that listens to the conversation, detects entities mentioned in the conversation, and proactively retrieves and presents information related to the conversation. A total of 24 participants (12 pairs) were involved in informal conversations, using either the proactive search agent or a control condition that did not support conversational analysis or proactive information retrieval. Data c…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniStructure (mathematical logic)Settore INF/01 - InformaticaComputer sciencemedia_common.quotation_subject05 social sciencesControl (management)Common ground02 engineering and technology113 Computer and information sciencesvoice interfacesWorld Wide Web020204 information systems0202 electrical engineering electronic engineering information engineeringKey (cryptography)Natural (music)0501 psychology and cognitive sciencesConversationbackground speechspoken conversation supportproactive search050107 human factorsmedia_common
researchProduct

Verso l'euro digitale: la moneta legale nell'epoca della digitalizzazione

2022

The essay aims to evaluate the potential repercussions of the introduction of the new central bank digital currencies and, in particular, of the digital euro ECB’s project, on the concept of legal money in the European and domestic legal system. In the era of crypto-currency and cash crisis, a reasoning is started on the relationship between public and private and market dimensions within the monetary institution.

Settore IUS/05 - Diritto Dell'Economiacryptocurrencielegal moneycryptoassetMoneySettore IUS/01 - Diritto Privatocentral bank digital currenciesdigital euro
researchProduct