Search results for "Crypt"
showing 10 items of 1111 documents
Canonical Retina-to-Cortex Vision Model Ready for Automatic Differentiation
2020
Canonical vision models of the retina-to-V1 cortex pathway consist of cascades of several Linear+Nonlinear layers. In this setting, parameter tuning is the key to obtain a sensible behavior when putting all these multiple layers to work together. Conventional tuning of these neural models very much depends on the explicit computation of the derivatives of the response with regard to the parameters. And, in general, this is not an easy task. Automatic differentiation is a tool developed by the deep learning community to solve similar problems without the need of explicit computation of the analytic derivatives. Therefore, implementations of canonical visual neuroscience models that are ready…
Evaluation of changes in space control due to passing behavior in elite soccer using Voronoi-cells
2015
A soccer player’s ability to make an “effective” pass in a play situation is considered one of the key skills characterizing successful performance in elite soccer.
On the role of non-effective code in linear genetic programming
2019
In linear variants of Genetic Programming (GP) like linear genetic programming (LGP), structural introns can emerge, which are nodes that are not connected to the final output and do not contribute to the output of a program. There are claims that such non-effective code is beneficial for search, as it can store relevant and important evolved information that can be reactivated in later search phases. Furthermore, introns can increase diversity, which leads to higher GP performance. This paper studies the role of non-effective code by comparing the performance of LGP variants that deal differently with non-effective code for standard symbolic regression problems. As we find no decrease in p…
HOW SMART DOES AN AGENT NEED TO BE?
2005
The classic distributed computation is done by atoms, molecules or spins in vast numbers, each equipped with nothing more than the knowledge of their immediate neighborhood and the rules of statistical mechanics. These agents, 1023 or more, are able to form liquids and solids from gases, realize extremely complex ordered states, such as liquid crystals, and even decode encrypted messages. We will describe a study done for a sensor-array "challenge problem" in which we have based our approach on old-fashioned simulated annealing to accomplish target acquisition and tracking under the rules of statistical mechanics. We believe the many additional constraints that occur in the real problem ca…
A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks
2020
Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…
Quantum Computers and Quantum Automata
2000
Quantum computation is a most challenging project involving research both by physicists and computer scientists. The principles of quantum computation differ from the principles of classical computation very much. When quantum computers become available, the public-key cryptography will change radically. It is no exaggeration to assert that building a quantum computer means building a universal code-breaking machine. Quantum finite automata are expected to appear much sooner. They do not generalize deterministic finite automata. Their capabilities are incomparable.
New Representations for Multidimensional Functions Based on Kolmogorov Superposition Theorem. Applications on Image Processing
2012
Mastering the sorting of the data in signal (nD) can lead to multiple applications like new compression, transmission, watermarking, encryption methods and even new processing methods for image. Some authors in the past decades have proposed to use these approaches for image compression, indexing, median filtering, mathematical morphology, encryption. A mathematical rigorous way for doing such a study has been introduced by Andrei Nikolaievitch Kolmogorov (1903-1987) in 1957 and recent results have provided constructive ways and practical algorithms for implementing the Kolmogorov theorem. We propose in this paper to present those algorithms and some preliminary results obtained by our team…
Properties and constraints of cheating-immune secret sharing schemes
2006
AbstractA secret sharing scheme is a cryptographic protocol by means of which a dealer shares a secret among a set of participants in such a way that it can be subsequently reconstructed by certain qualified subsets. The setting we consider is the following: in a first phase, the dealer gives in a secure way a piece of information, called a share, to each participant. Then, participants belonging to a qualified subset send in a secure way their shares to a trusted party, referred to as a combiner, who computes the secret and sends it back to the participants.Cheating-immune secret sharing schemes are secret sharing schemes in the above setting where dishonest participants, during the recons…
Metazoan Circadian Rhythm: Toward an Understanding of a Light-Based Zeitgeber in Sponges
2013
In all eukaryotes, the 24-h periodicity in the environment contributed to the evolution of the molecular circadian clock. We studied some elements of a postulated circadian clock circuit in the lowest metazoans, the siliceous sponges. First, we identified in the demosponge Suberites domuncula the enzyme luciferase that generates photons. Then (most likely), the photons generated by luciferase are transmitted via the biosilica glass skeleton of the sponges and are finally harvested by cryptochrome in the same individual; hence, cryptochrome is acting as a photosensor. This information-transduction system, generation of light (luciferase), photon transmission (through the siliceous spicules),…
Proteasome comprising a beta1 inducible subunit acts as a negative regulator of NADPH oxidase during elicitation of plant defense reactions.
2005
Elicitation of defense reactions in tobacco by cryptogein, triggered a production of active oxygen species (AOS) via the NADPH oxidase, NtrbohD, and an accumulation of beta1din, a defense induced beta-type subunit of 20S proteasome. The proteasome inhibitor, MG132, stimulated this AOS production. Tobacco cells transformed with sense constructs of beta1din showed an inhibition of the AOS production following elicitin treatment, whereas the antisense transformed cells showed a strongly enhanced AOS production. In cells transformed with sense construct of beta1din, the NtrbohD transcripts failed to be induced by cryptogein as observed in control and antisense transformed cells. Conversely, in …