Search results for "Cryptography"

showing 10 items of 657 documents

Simulation and anticipation as tools for coordinating with the future

2013

A key goal in designing an artificial intelligence capable of performing complex tasks is a mechanism that allows it to efficiently choose appropriate and relevant actions in a variety of situations and contexts. Nowhere is this more obvious than in the case of building a general intelligence, where the contextual choice and application of actions must be done in the presence of large numbers of alternatives, both subtly and obviously distinct from each other. We present a framework for action selection based on the concurrent activity of multiple forward and inverse models. A key characteristic of the proposed system is the use of simulation to choose an action: the system continuously sim…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMechanism (biology)Computer sciencebusiness.industryAction selectionOutcome (game theory)AnticipationVariety (cybernetics)Domain (software engineering)Action SelectionAction (philosophy)Anticipation (artificial intelligence)Key (cryptography)Artificial intelligencebusinessMachine learning techniquesSimulation
researchProduct

Bayesian System for Differential Cryptanalysis of DES

2014

AbstractThis paper proposes a new formalization for the differential cryptanalysis of DES (Data Encryption Standard) based on Bayesian Networks (BN), an artificial intelligence framework used for reasoning on data affected by uncertainty. Through the proposed approach it is possible to analyze DES from a novel point of view, thus paving the way for the development of a new class of cryptanalysis methods.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNeural cryptographyTheoretical computer scienceDifferential cryptanalysisbusiness.industryBayesian probabilityBayesian networkCryptographyData_CODINGANDINFORMATIONTHEORYEncryptionDESlaw.inventionBayesian Networks;lawCryptographyBayesian NetworksPoint (geometry)Cryptanalysisbusinessdifferential cryptanalysiMathematicsdifferential cryptanalysisIERI Procedia
researchProduct

A Structural Approach to Infer Recurrent Relations in Data

2014

Extracting knowledge from a great amount of collected data has been a key problem in Artificial Intelligence during the last decades. In this context, the word "knowledge" refers to the non trivial new relations not easily deducible from the observation of the data. Several approaches have been used to accomplish this task, ranging from statistical to structural methods, often heavily dependent on the particular problem of interest. In this work we propose a system for knowledge extraction that exploits the power of an ontology approach. Ontology is used to describe, organise and discover new knowledge. To show the effectiveness of our system in extracting and generalising the knowledge emb…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniOntology learningbusiness.industryComputer scienceContext (language use)Ontology (information science)Machine learningcomputer.software_genrePattern recognition MDL OntologiesGrammar inductionKnowledge extractionKey (cryptography)OntologyArtificial intelligencebusinesscomputerWord (computer architecture)
researchProduct

Retargeting Framework Based on Monte-carlo Sampling

2015

Advance in image technology and proliferation of acquisition devices like smartphones, digital cameras, etc., made the display of digital images ubiquitous. Many displays exist in the market, spanning within a large variety of resolutions and shapes. Thus, displaying content optimizing the available number of pixels has become a very important issue in the multimedia community, and the image retargeting problem is being widely faced. In this work, we propose an image retargeting framework based on monte-carlo sampling. We operate the non-homogeneous resizing as the composition of several simple atomic resizing functions. The shape of such atomic operator can be chosen within a set of tested…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRetargetingSaliencyPixelComputer sciencebusiness.industryComputer Science (all)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONVisualizationSet (abstract data type)Image resizingDigital imageSeam carvingMonte-carloRetargetingKey (cryptography)Computer visionArtificial intelligencebusiness
researchProduct

Investigating Proactive Search Support in Conversations

2018

Conversations among people involve solving disputes, building common ground, and reinforce mutual beliefs and assumptions. Conversations often require external information that can support these human activities. In this paper, we study how a spoken conversation can be supported by a proactive search agent that listens to the conversation, detects entities mentioned in the conversation, and proactively retrieves and presents information related to the conversation. A total of 24 participants (12 pairs) were involved in informal conversations, using either the proactive search agent or a control condition that did not support conversational analysis or proactive information retrieval. Data c…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniStructure (mathematical logic)Settore INF/01 - InformaticaComputer sciencemedia_common.quotation_subject05 social sciencesControl (management)Common ground02 engineering and technology113 Computer and information sciencesvoice interfacesWorld Wide Web020204 information systems0202 electrical engineering electronic engineering information engineeringKey (cryptography)Natural (music)0501 psychology and cognitive sciencesConversationbackground speechspoken conversation supportproactive search050107 human factorsmedia_common
researchProduct

Coherent Conditional Previsions and Proper Scoring Rules

2012

In this paper we study the relationship between the notion of coherence for conditional prevision assessments on a family of finite conditional random quantities and the notion of admissibility with respect to bounded strictly proper scoring rules. Our work extends recent results given by the last two authors of this paper on the equivalence between coherence and admissibility for conditional probability assessments. In order to prove that admissibility implies coherence a key role is played by the notion of Bregman divergence.

Settore MAT/06 - Probabilita' E Statistica Matematicabregman divergenceproper scor- ing rulesConditional prevision assessmentsconditional scoring rulesstrong dominanceConditional probabilityweak dominanceCoherence (statistics)Bregman divergenceConditional prevision assessments coherence proper scoring rules conditional scoring rules weak dominance strong dominance admissibility Bregman divergence.proper scoring rulescoherenceBounded functionKey (cryptography)admissibilityConditional prevision assessments; conditional scoring rules; admissibility; proper scor- ing rules; weak dominance; strong dominanceEquivalence (measure theory)Mathematical economicsconditional prevision assessments; strong dominance; admissibility; proper scoring rules; bregman divergence; weak dominance; conditional scoring rules; coherenceMathematics
researchProduct

A multidimensional hydrodynamic code for structure evolution in cosmology

1996

A cosmological multidimensional hydrodynamic code is described and tested. This code is based on modern high-resolution shock-capturing techniques. It can make use of a linear or a parabolic cell reconstruction as well as an approximate Riemann solver. The code has been specifically designed for cosmological applications. Two tests including shocks have been considered: the first one is a standard shock tube and the second test involves a spherically symmetric shock. Various additional cosmological tests are also presented. In this way, the performance of the code is proved. The usefulness of the code is discussed; in particular, this powerful tool is expected to be useful in order to study…

Shock wavePhysicsAstrophysics (astro-ph)Structure (category theory)FOS: Physical sciencesAstronomy and AstrophysicsAstrophysicsCosmologyRiemann solverShock (mechanics)symbols.namesakeSpace and Planetary ScienceComponent (UML)symbolsCode (cryptography)Statistical physicsShock tube
researchProduct

A Spatial-Temporal Correlation Approach for Data Reduction in Cluster-Based Sensor Networks

2019

International audience; In a resource-constrained Wireless Sensor Networks (WSNs), the optimization of the sampling and the transmission rates of each individual node is a crucial issue. A high volume of redundant data transmitted through the network will result in collisions, data loss, and energy dissipation. This paper proposes a novel data reduction scheme, that exploits the spatial-temporal correlation among sensor data in order to determine the optimal sampling strategy for the deployed sensor nodes. This strategy reduces the overall sampling/transmission rates while preserving the quality of the data. Moreover, a back-end reconstruction algorithm is deployed on the workstation (Sink)…

Signal Processing (eess.SP)FOS: Computer and information sciencesAdaptive samplingGeneral Computer ScienceComputer sciencespatial-temporal correlationReal-time computing02 engineering and technologyData loss[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]data reconstructionQA76Computer Science - Networking and Internet Architecture[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]FOS: Electrical engineering electronic engineering information engineering0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceElectrical Engineering and Systems Science - Signal ProcessingNetworking and Internet Architecture (cs.NI)General EngineeringSampling (statistics)020206 networking & telecommunicationsReconstruction algorithmDissipation[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationWireless sensor networks[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]data reduction020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]lcsh:Electrical engineering. Electronics. Nuclear engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]lcsh:TK1-9971Wireless sensor networkData reduction
researchProduct

Design of SCMA Codebooks using Differential Evolution

2020

Non-orthogonal multiple access (NOMA) is a promising technology which meets the demands of massive connectivity in future wireless networks. Sparse code multiple access (SCMA) is a popular code-domain NOMA technique. The effectiveness of SCMA comes from: (1) the multi-dimensional sparse codebooks offering high shaping gain and (2) sophisticated multi-user detection based on message passing algorithm (MPA). The codebooks of the users play the main role in determining the performance of SCMA system. This paper presents a framework to design the codebooks by taking into account the entire system including the SCMA encoder and the MPA-based detector. The symbol-error rate (SER) is considered as…

Signal Processing (eess.SP)FOS: Computer and information sciencesComputer scienceWireless networkInformation Theory (cs.IT)Computer Science - Information Theory05 social sciencesMessage passingDetector050801 communication & media studiesmedicine.diseaseNoma0508 media and communicationsComputer engineeringDifferential evolution0502 economics and businessFOS: Electrical engineering electronic engineering information engineeringmedicineCode (cryptography)050211 marketingMinificationElectrical Engineering and Systems Science - Signal ProcessingEncoder2020 IEEE International Conference on Communications Workshops (ICC Workshops)
researchProduct

Blind multi-user detection by fast fixed point algorithm without prior knowledge of symbol-level timing

2003

We consider the estimation of the source process of the desired user an the downlink of a code-division multiple access (CDMA) communication system. In downlink signal processing, only the code of the mobile telephone user is known, while the codes of the interfering users are unknown. Blind source separation or independent component analysis is an approach offering the solution to this problem. In this work we apply the fast fixed point algorithm to the separation problem. The algorithm is based on fourth-order statistics optimization. Knowledge about the symbol level timing has to be known only coarsely.

Signal processingCode division multiple accessComputer scienceReal-time computingTelecommunications linkComputer Science::Networking and Internet ArchitectureCode (cryptography)Detection theoryCommunications systemIndependent component analysisBlind signal separationComputer Science::Information TheoryProceedings of the IEEE Signal Processing Workshop on Higher-Order Statistics. SPW-HOS '99
researchProduct