Search results for "cryptography"

showing 10 items of 657 documents

The meaning of biological signals.

2020

We introduce the virtual special issue on content in signalling systems. The issue explores the uses and limits of ideas from evolutionary game theory and information theory for explaining the content of biological signals. We explain the basic idea of the Lewis-Skyrms sender-receiver framework, and we highlight three key themes of the issue: (i) the challenge of accounting for deception, misinformation and false content, (ii) the relevance of partial or total common interest to the evolution of meaningful signals, and (iii) how the sender-receiver framework relates to teleosemantics.

Cognitive scienceHistoryDeceptionComputer sciencemedia_common.quotation_subjectCommunicationEvolutionary game theoryQ Science (General)B Philosophy (General)General MedicineDeceptionInformation theoryBiological EvolutionModels BiologicalAnimal CommunicationMeaning (philosophy of language)History and Philosophy of ScienceGame TheoryKey (cryptography)AnimalsHumansRelevance (information retrieval)MisinformationGame theorymedia_commonStudies in history and philosophy of biological and biomedical sciences
researchProduct

Towards Neural Reusable Neuro-inspired Systems

2018

This chapter presents an overview of some key aspects of the neuro-inspired modelling previously discussed, under the new perspective of the neural reuse theory. Here it is envisaged that the excellent capabilities shown by insects with their small neuron number and relatively low brain complexity, as compared to vertebrates, could be justified if some key neural structures are re-used for different behavioural needs. The chapter recalls some examples, found in the literature for addressing specific topics and reformulates them in relation to the neural reuse theory.

Cognitive scienceRelation (database)Computer sciencePerspective (graphical)Energy Engineering and Power TechnologyReuseSmall neuronEngineering (all)Key (cryptography)Mathematics (all)Biotechnology; Chemical Engineering (all); Mathematics (all); Materials Science (all); Energy Engineering and Power Technology; Engineering (all)Chemical Engineering (all)Materials Science (all)Biotechnology
researchProduct

Differential Learning as a Key Training Approach to Improve Creative and Tactical Behavior in Soccer

2018

The aim of this study was to identify the effects of a differential-learning program, embedded in small-sided games, on the creative and tactical behavior of youth soccer players. Forty players from under-13 (U13) and under-15 (U15) were allocated into control and experimental groups and were tested using a randomized pretest to posttest design using small-sided games situations.The experimental group participated in a 5-month differential-learning program embodied in small-sided games situations, while the control group participated in a typical small-sided games training program. In-game creativity was assessed through notational analyses of the creative components, and the players' posit…

Collective behaviorAdolescentmedia_common.quotation_subjectTeaching methodApplied psychologyGroup behaviorPhysical Therapy Sports Therapy and RehabilitationAthletic PerformanceTraining (civil)CreativityRandom Allocation03 medical and health sciences0302 clinical medicineSoccerHumansLearningOrthopedics and Sports Medicinemedia_commonAge differencesComputingMilieux_PERSONALCOMPUTING030229 sport sciencesGeneral MedicineCreativityNephrologyDifferential learningGeographic Information SystemsKey (cryptography)Psychology030217 neurology & neurosurgeryResearch Quarterly for Exercise and Sport
researchProduct

POLYNOMIAL GROWTH OF THE*-CODIMENSIONS AND YOUNG DIAGRAMS

2001

Let A be an algebra with involution * over a field F of characteristic zero and Id(A, *) the ideal of the free algebra with involution of *-identities of A. By means of the representation theory of the hyperoctahedral group Z 2wrS n we give a characterization of Id(A, *) in case the sequence of its *-codimensions is polynomially bounded. We also exhibit an algebra G 2 with the following distinguished property: the sequence of *-codimensions of Id(G 2, *) is not polynomially bounded but the *-codimensions of any T-ideal U properly containing Id(G 2, *) are polynomially bounded.

CombinatoricsDiscrete mathematicsInvolution (mathematics)Filtered algebraAlgebra and Number TheoryMathematics::Commutative AlgebraFree algebraBounded functionHyperoctahedral groupRepresentation theoryComputer Science::Cryptography and SecurityMathematicsCommunications in Algebra
researchProduct

A generalization of Sardinas and Patterson's algorithm to z-codes

1993

Abstract This paper concerns the framework of z-codes theory. The main contribution consists in an extension of the algorithm of Sardinas and Patterson for deciding whether a finite set of words X is a z-code. To improve the efficiency of this test we have found a tight upper bound on the length of the shortest words that might have a double z-factorization over X. Some remarks on the complexity of the algorithm are also given. Moreover, a slight modification of this algorithm allows us to compute the z-deciphering delay of X.

CombinatoricsSardinas–Patterson algorithmGeneral Computer ScienceGeneralizationCode (cryptography)Extension (predicate logic)Finite setUpper and lower boundsAlgorithmComputer Science(all)Theoretical Computer ScienceMathematicsAutomatonTheoretical Computer Science
researchProduct

Consumer protection in financial services – towards greater transparency with a key information document for packaged retail investment products

2012

Consumer protection in financial services – towards greater transparency with a Key Information Document for Packaged Retail Investment Products

CommerceTransparency (market)business.industryLaw of EuropeKey (cryptography)MarketingConsumer protectionKbusinessInvestment (macroeconomics)LawKJ-KKZFinancial servicesWroclaw Review of Law, Administration & Economics
researchProduct

Implementación y uso clínico de la radioterapia adaptativa. Informe del grupo de trabajo de radioterapia adaptativa de la Sociedad Española de Física…

2021

La radioterapia adaptativa (Adaptive Radiation Therapy, ART) se puede definir como la modificación del plan de tratamiento administrado a un paciente durante el curso de la radioterapia para tener en cuenta los cambios en la anatomía.
 La aplicación de ART supone un cambio en el proceso radioterápico que implica el uso de numerosos recursos adicionales, no estando implementada de forma general. Así, aun tratándose de una idea introducida hace más de 20 años, todavía a fecha de hoy son objeto de estudio muchos de los aspectos que definen la ART: la decisión de proceder a la nueva planificación del tratamiento, el momento óptimo para adaptar el plan, el umbral dosimétrico o anatómico que…

Commercial softwareComputer sciencebusiness.industryProcess (engineering)Principal (computer security)Ocean EngineeringIdentification (information)SoftwareKey (cryptography)Safety Risk Reliability and QualitySoftware engineeringbusinessRadiation treatment planningAdaptation (computer science)Revista de Física Médica
researchProduct

Driving organisational ambidexterity through process management. The key role of cultural change

2013

There is an intense debate in the literature on the impact of process management on innovation, and the division of opinions becomes particularly apparent with regard to radical innovation. Furthermore, organisational ambidexterity, the organisational capability to undertake incremental as well as radical innovation activities, has been underlined as a key source of competitiveness. In this article, we analyse how the cultural divergence driven by process management can affect organisational ambidexterity. Through a survey carried out on a sample of Spanish firms in the furniture and textile sectors, both of which have been drastically hit by competition from Asian firms, we conclude that t…

Competition (economics)Process management (computing)Process managementTotal quality managementDivergence (linguistics)Cultural contextKey (cryptography)BusinessGeneral Business Management and AccountingAmbidexterityTotal Quality Management & Business Excellence
researchProduct

A numerical treatment of wet/dry zones in well-balanced hybrid schemes for shallow water flow

2012

The flux-limiting technology that leads to hybrid, high resolution shock capturing schemes for homogeneous conservation laws has been successfully adapted to the non-homogeneous case by the second and third authors. In dealing with balance laws, a key issue is that of well-balancing, which can be achieved in a rather systematic way by considering the 'homogeneous form' of the balance law.The application of these techniques to the shallow water system requires also an appropriate numerical treatment for the wetting/drying interfaces that appear initially or as a result of the flow evolution. In this paper we propose a numerical treatment for wet/dry interfaces that is specifically designed f…

Computational MathematicsNumerical AnalysisWaves and shallow waterConservation lawShallow water flowHomogeneousApplied MathematicsFlow (psychology)Key (cryptography)MechanicsShallow water equationsMathematicsShock (mechanics)Applied Numerical Mathematics
researchProduct

Hypervisor-based Protection of Code

2019

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…

Computer Networks and CommunicationsComputer science0211 other engineering and technologiesCryptography02 engineering and technologysecurityComputer securitycomputer.software_genreEncryptionkryptografiaObfuscationCode (cryptography)tietoturvavirtual machine monitorsSafety Risk Reliability and QualitySystem bustrusted platform moduleta113021110 strategic defence & security studiescode protectioncryptographybusiness.industryHypervisorVirtualizationObfuscation (software)businesscomputerIEEE Transactions on Information Forensics and Security
researchProduct