Search results for "Crypt"

showing 10 items of 1111 documents

Canonical Retina-to-Cortex Vision Model Ready for Automatic Differentiation

2020

Canonical vision models of the retina-to-V1 cortex pathway consist of cascades of several Linear+Nonlinear layers. In this setting, parameter tuning is the key to obtain a sensible behavior when putting all these multiple layers to work together. Conventional tuning of these neural models very much depends on the explicit computation of the derivatives of the response with regard to the parameters. And, in general, this is not an easy task. Automatic differentiation is a tool developed by the deep learning community to solve similar problems without the need of explicit computation of the analytic derivatives. Therefore, implementations of canonical visual neuroscience models that are ready…

Theoretical computer scienceComputer scienceAutomatic differentiationbusiness.industryComputationDeep learningPython (programming language)Task (project management)Nonlinear systemDistortionKey (cryptography)Artificial intelligencebusinesscomputercomputer.programming_language
researchProduct

Evaluation of changes in space control due to passing behavior in elite soccer using Voronoi-cells

2015

A soccer player’s ability to make an “effective” pass in a play situation is considered one of the key skills characterizing successful performance in elite soccer.

Theoretical computer scienceComputer scienceComputerApplications_GENERALControl (management)EliteComputingMilieux_PERSONALCOMPUTINGKey (cryptography)Space (commercial competition)Voronoi diagramComputingMethodologies_ARTIFICIALINTELLIGENCEhuman activitiesSimulation
researchProduct

On the role of non-effective code in linear genetic programming

2019

In linear variants of Genetic Programming (GP) like linear genetic programming (LGP), structural introns can emerge, which are nodes that are not connected to the final output and do not contribute to the output of a program. There are claims that such non-effective code is beneficial for search, as it can store relevant and important evolved information that can be reactivated in later search phases. Furthermore, introns can increase diversity, which leads to higher GP performance. This paper studies the role of non-effective code by comparing the performance of LGP variants that deal differently with non-effective code for standard symbolic regression problems. As we find no decrease in p…

Theoretical computer scienceComputer scienceIntronContrast (statistics)Genetic programming0102 computer and information sciences02 engineering and technology01 natural sciences010201 computation theory & mathematicsLinear genetic programming0202 electrical engineering electronic engineering information engineeringCode (cryptography)020201 artificial intelligence & image processingSymbolic regressionProceedings of the Genetic and Evolutionary Computation Conference
researchProduct

HOW SMART DOES AN AGENT NEED TO BE?

2005

The classic distributed computation is done by atoms, molecules or spins in vast numbers, each equipped with nothing more than the knowledge of their immediate neighborhood and the rules of statistical mechanics. These agents, 1023 or more, are able to form liquids and solids from gases, realize extremely complex ordered states, such as liquid crystals, and even decode encrypted messages. We will describe a study done for a sensor-array "challenge problem" in which we have based our approach on old-fashioned simulated annealing to accomplish target acquisition and tracking under the rules of statistical mechanics. We believe the many additional constraints that occur in the real problem ca…

Theoretical computer scienceComputer sciencebusiness.industryComputationDistributed computingMulti-agent systemGeneral Physics and AstronomyStatistical and Nonlinear PhysicsStatistical mechanicsEncryptionTarget acquisitionComputer Science ApplicationsNetwork managementComputational Theory and MathematicsSimulated annealingStochastic optimizationbusinessMathematical PhysicsInternational Journal of Modern Physics C
researchProduct

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks

2020

Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…

Theoretical computer scienceFacebookComputer scienceInformation privacyCyber SecurityGroup communicationJoinsEncryptionEncryptioncomputer.software_genreKey managementSet (abstract data type)Peer-to-peer computingElectrical and Electronic EngineeringFocus (computing)VegetationSocial networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)Composition (combinatorics)Decentralized Online Social NetworksDecentralized Online Social Networks; Encryption; Facebook; Group communication; Information privacy; Key management; Peer-to-peer computing; Privacy; Vegetation; Electrical and Electronic EngineeringPrivacyContent (measure theory)Decentralized online social networkData miningbusinesscomputerData privacy
researchProduct

Quantum Computers and Quantum Automata

2000

Quantum computation is a most challenging project involving research both by physicists and computer scientists. The principles of quantum computation differ from the principles of classical computation very much. When quantum computers become available, the public-key cryptography will change radically. It is no exaggeration to assert that building a quantum computer means building a universal code-breaking machine. Quantum finite automata are expected to appear much sooner. They do not generalize deterministic finite automata. Their capabilities are incomparable.

Theoretical computer scienceFinite-state machinebusiness.industryComputationTheoryofComputation_GENERALCryptographyQuantum circuitDeterministic finite automatonRegular languageComputerSystemsOrganization_MISCELLANEOUSQuantum finite automatabusinessMathematicsQuantum computer
researchProduct

New Representations for Multidimensional Functions Based on Kolmogorov Superposition Theorem. Applications on Image Processing

2012

Mastering the sorting of the data in signal (nD) can lead to multiple applications like new compression, transmission, watermarking, encryption methods and even new processing methods for image. Some authors in the past decades have proposed to use these approaches for image compression, indexing, median filtering, mathematical morphology, encryption. A mathematical rigorous way for doing such a study has been introduced by Andrei Nikolaievitch Kolmogorov (1903-1987) in 1957 and recent results have provided constructive ways and practical algorithms for implementing the Kolmogorov theorem. We propose in this paper to present those algorithms and some preliminary results obtained by our team…

Theoretical computer science[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image Processingbusiness.industry[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingSortingimage progressive transmissionImage processingimage encryption[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingMathematical morphologyEncryptionimage watermarkingimage compressionImage (mathematics)multi-variables function representation[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingKolmogorov superposition theoremMedian filterbusinessDigital watermarkingAlgorithm[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingImage compressionMathematics[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct

Properties and constraints of cheating-immune secret sharing schemes

2006

AbstractA secret sharing scheme is a cryptographic protocol by means of which a dealer shares a secret among a set of participants in such a way that it can be subsequently reconstructed by certain qualified subsets. The setting we consider is the following: in a first phase, the dealer gives in a secure way a piece of information, called a share, to each participant. Then, participants belonging to a qualified subset send in a secure way their shares to a trusted party, referred to as a combiner, who computes the secret and sends it back to the participants.Cheating-immune secret sharing schemes are secret sharing schemes in the above setting where dishonest participants, during the recons…

TheoryofComputation_MISCELLANEOUSHomomorphic secret sharingCryptography0102 computer and information sciences02 engineering and technologyShared secretComputer securitycomputer.software_genre01 natural sciencesSecret sharingCheating0202 electrical engineering electronic engineering information engineeringDiscrete Mathematics and CombinatoricsSecret sharingMathematicsbusiness.industryApplied MathematicsCryptographic protocol16. Peace & justiceShamir's Secret Sharing010201 computation theory & mathematicsResilient functionsCryptographySecure multi-party computation020201 artificial intelligence & image processingVerifiable secret sharingbusinesscomputerDiscrete Applied Mathematics
researchProduct

Metazoan Circadian Rhythm: Toward an Understanding of a Light-Based Zeitgeber in Sponges

2013

In all eukaryotes, the 24-h periodicity in the environment contributed to the evolution of the molecular circadian clock. We studied some elements of a postulated circadian clock circuit in the lowest metazoans, the siliceous sponges. First, we identified in the demosponge Suberites domuncula the enzyme luciferase that generates photons. Then (most likely), the photons generated by luciferase are transmitted via the biosilica glass skeleton of the sponges and are finally harvested by cryptochrome in the same individual; hence, cryptochrome is acting as a photosensor. This information-transduction system, generation of light (luciferase), photon transmission (through the siliceous spicules),…

Time FactorsLightCircadian clockPlant Science03 medical and health sciencesDemospongeCryptochromeZeitgeberAnimalsLuciferasesGlycoproteins030304 developmental biologyRegulation of gene expression0303 health sciencesbiologyChemistry030302 biochemistry & molecular biologyNuclear Proteinsbiology.organism_classificationCircadian RhythmPoriferaCell biologyCryptochromesSuberites domunculaSpongeGene Expression RegulationGlucosyltransferasesAnimal Science and ZoologyExoribonuclease activitySignal TransductionTranscription Factors
researchProduct

Proteasome comprising a beta1 inducible subunit acts as a negative regulator of NADPH oxidase during elicitation of plant defense reactions.

2005

Elicitation of defense reactions in tobacco by cryptogein, triggered a production of active oxygen species (AOS) via the NADPH oxidase, NtrbohD, and an accumulation of beta1din, a defense induced beta-type subunit of 20S proteasome. The proteasome inhibitor, MG132, stimulated this AOS production. Tobacco cells transformed with sense constructs of beta1din showed an inhibition of the AOS production following elicitin treatment, whereas the antisense transformed cells showed a strongly enhanced AOS production. In cells transformed with sense construct of beta1din, the NtrbohD transcripts failed to be induced by cryptogein as observed in control and antisense transformed cells. Conversely, in …

Tobacco BY-2 cellsHypersensitive responseProteasome Endopeptidase ComplexLeupeptinsBiophysics[SDV.BC]Life Sciences [q-bio]/Cellular BiologyBiologyCysteine Proteinase InhibitorsBiochemistrychemistry.chemical_compoundStructural BiologyMG132Sense (molecular biology)TobaccoGeneticsmedicineNADPH OXIDASEPROTEASOMEMolecular Biology[SDV.BC] Life Sciences [q-bio]/Cellular BiologyComputingMilieux_MISCELLANEOUSPlant ProteinsCRYPTOGEINNADPH oxidaseTOBACCO BY-2 CELLSNADPH OxidasesElicitinCell BiologyOligonucleotides AntisenseProtein SubunitsProteasomechemistryBiochemistryProteasome inhibitorbiology.proteinPLANT DEFENSEAOS PRODUCTIONReactive Oxygen SpeciesProteasome Inhibitorsmedicine.drugFEBS letters
researchProduct