Search results for "Cryptography"

showing 10 items of 657 documents

Comments on “Failure, Identity Loss and Living Information Systems” by P. Kanellis, M. Lycett, and R.J. Paul

2000

Information system (IS) failure is a pervasive phenomenon. Like the paper’s introduction, common sense and statistics show information system failure is common and also important, because huge amounts of human effort and economic resources are spent without much gain. The issue of failure is also related to FRISCO report and the theme of the conference in two ways. First our concepts and ideas about information system and the nature of information system development can affect either positively or negatively our intellectual and technical capabilities to influence the likelihood of IS failure. Second, because information system definition forms one key concept and focus of the FRISCO report…

Psychoanalysisbusiness.industrymedia_common.quotation_subjectInternet privacyIdentity (social science)Common senseAffect (psychology)Focus (linguistics)PhenomenonKey (cryptography)Information systemSociologybusinessTheme (narrative)media_common
researchProduct

A Dynamic Viewpoint to Design Performance Management Systems in Academic Institutions: Theory and Practice

2014

This article illustrates how to design and apply Performance Management systems in academic institutions by identifying and modeling those factors affecting academic performance through a dynamic performance management view. Particularly, combining performance management with System Dynamics modeling may allow academic decision-makers to better identify key performance drivers for pursuing a sustainable performance improvement in universities. In the second section of the article, a number of examples based on empirical findings from a field project aimed at designing a dynamic performance management model for the University of Palermo (Italy) are discussed.

Public AdministrationPerformance managementComputer scienceacademic institutionperformance management systemField (computer science)System dynamicsManagementEngineering managementSettore SECS-P/07 - Economia AziendalePerformance engineeringKey (cryptography)system dynamics modelingBusiness and International ManagementPerformance improvementdynamic performance management viewfield projectacademic institutions performance management systems dynamic performance management view System Dynamics modeling field project
researchProduct

Privacy Preserving Client/Vertical-Servers Classification

2019

We present a novel client/vertical-servers architecture for hybrid multi-party classification problem. The model consists of clients whose attributes are distributed on multiple servers and remain secret during training and testing. Our solution builds privacy-preserving random forests and completes them with a special private set intersection protocol that provides a central commodity server with anonymous conditional statistics. Subsequently, the private set intersection protocol can be used to privately classify the queries of new clients using the commodity server’s statistics. The proviso is that the commodity server must not collude with other parties. In cases where this restriction …

Public-key cryptographyComputer sciencebusiness.industryServerCommoditySecure multi-party computationEffective methodArchitecturebusinessProtocol (object-oriented programming)Random forestComputer network
researchProduct

Improved Magic Ink Signatures Using Hints

1999

We introduce two improvements to the recently proposed so called magic ink DSS signatures. A first improvement is that we reduce the overhead for tracing without noticeably increasing any other cost. The tracing cost is linear in the number of generated signatures in the original proposal; our improved version reduces this to a logarithmic cost in the common case. A second improvement is that we introduce a method for determining whether forged currency is in circulation, without affecting the privacy of honest users. Our improvements rely on our introducing a so called hint value. This is an encryption of the signature transcript received, submitted by the signature receiver. Part of the p…

Public-key cryptographyTheoretical computer sciencebusiness.industryComputer scienceMagic (programming)PlaintextCryptographyEncryptionbusinessAlgorithmSecret sharing
researchProduct

Energy-Efficiency and Coverage Quality Management for Reliable Diagnostics in Wireless Sensor Networks

2020

International audience; The processing of data and signals provided by sensors aims at extracting rnrelevant features which can be used to assess and diagnose the health state rnof the monitored targets. Nevertheless, Wireless Sensor Networks (WSNs) present rna number of shortcomings that have an impact on the quality of the gathered rndata at the sink level, leading to imprecise diagnostics rnof the observed targets. To improve data accuracy, two main critical and related issues, namely the energy consumption and coverage quality, need to be considered. The goal is to maximize the network lifetime while guaranteeing the complete coverage of all the targets. Unfortunately, these performance…

Quality managementComputer scienceComputer Networks and CommunicationsReal-time computingCorrectness proofs020206 networking & telecommunicationsEnergy consumption02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science Applications[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Distributed algorithmControl and Systems Engineering[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Data accuracy0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor networkEfficient energy use
researchProduct

"Table 4" of "Lowest Q**2 measurement of the gamma* p --> delta reaction: Probing the pionic contribution."

2006

Measured value of SIG(C=LTP) as a function of the pion angle relative to the virtual photon direction.

Quantitative Biology::Neurons and CognitionElectron productionQuantitative Biology::Molecular NetworksNuclear TheoryIntegrated Cross SectionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONCross SectionSIG7.950E-017.950E-01E- P --> E- PI0 PExclusiveNuclear Experiment1.221ComputingMethodologies_COMPUTERGRAPHICSComputer Science::Cryptography and Security
researchProduct

Molecular topology as a novel approach for drug discovery

2012

Molecular topology (MT) has emerged in recent years as a powerful approach for the in silico generation of new drugs. One key part of MT is that, in the process of drug design/discovery, there is no need for an explicit knowledge of a drug's mechanism of action unlike other drug discovery methods.In this review, the authors introduce the topic by explaining briefly the most common methodology used today in drug design/discovery and address the most important concepts of MT and the methodology followed (QSAR equations, LDA, etc.). Furthermore, the significant results achieved, from this approach, are outlined and discussed.The results outlined herein can be explained by considering that MT r…

Quantitative structure–activity relationshipDrug IndustryDrug discoveryProcess (engineering)Computer sciencebusiness.industryIn silicoQuantitative Structure-Activity RelationshipModels TheoreticalMachine learningcomputer.software_genreField (computer science)Pharmaceutical PreparationsDrug DesignDrug DiscoveryKey (cryptography)AnimalsComputer-Aided DesignHumansData miningArtificial intelligenceExplicit knowledgeMolecular topologybusinesscomputerExpert Opinion on Drug Discovery
researchProduct

A single photon source based on NV centers in diamond nanocrystals

2009

The development of reliable devices to generate single photons is crucial for applications in quantum cryptography, as well as for fundamental quantum optics experiments. Due to their extremely high photostability at room temperature, optically active defects in solids, the so called color centers, are among the most promising candidates. Single NV(nitrogen-vacancy) centers in diamond have been demonstrated to be able to generate single photons and have already shown advantages compared to attenuated laser pulses in a quantum cryptography experiment [1]. The nitrogen-vacancy center (NV center) in diamond consists of a substitutional nitrogen atom and an adjacent vacancy. This complex exhibi…

Quantum opticsMaterials sciencePhotonbusiness.industryDiamondengineering.materialLaserlaw.inventionQuantum cryptographylawSingle-photon sourceengineeringOptoelectronicsPhotonicsbusinessNitrogen-vacancy center
researchProduct

Activating remote entanglement in a quantum network by local counting of identical particles

2019

Quantum information and communication processing within quantum networks usually employs identical particles. Despite this, the physical role of quantum statistical nature of particles in large-scale networks remains elusive. Here, we show that just the indistinguishability of fermions makes it possible a new mechanism of entanglement transfer in many-node quantum networks. This process activates remote entanglement among distant sites, which do not share a common past, by only locally counting identical particles and classical communication. These results constitute the key achievement of the present technique and open the way to a more stable multistage transfer of nonlocal quantum correl…

Quantum protocolsPhysicsQuantum networkQuantum PhysicsProcess (computing)FOS: Physical sciencesQuantum entanglementFermion01 natural sciencesSettore FIS/03 - Fisica Della Materia010305 fluids & plasmasQuantum entanglement[PHYS.QPHY]Physics [physics]/Quantum Physics [quant-ph]0103 physical sciencesQuantum information processingKey (cryptography)Identical particleStatistical physicsQuantum information010306 general physicsQuantum Physics (quant-ph)QuantumIdentical particles
researchProduct

"Table 10" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"

2014

Gaussian radii and intercept parameters in PbPb collisions versus Nch at low KT3.

R lambdaInclusive2760.0Physics::Instrumentation and DetectorsAstrophysics::Earth and Planetary AstrophysicsPB PB --> PI+ XNuclear ExperimentPB PB --> PI- XComputer Science::Cryptography and Security
researchProduct