Search results for "cryptography"
showing 10 items of 657 documents
The meaning of biological signals.
2020
We introduce the virtual special issue on content in signalling systems. The issue explores the uses and limits of ideas from evolutionary game theory and information theory for explaining the content of biological signals. We explain the basic idea of the Lewis-Skyrms sender-receiver framework, and we highlight three key themes of the issue: (i) the challenge of accounting for deception, misinformation and false content, (ii) the relevance of partial or total common interest to the evolution of meaningful signals, and (iii) how the sender-receiver framework relates to teleosemantics.
Towards Neural Reusable Neuro-inspired Systems
2018
This chapter presents an overview of some key aspects of the neuro-inspired modelling previously discussed, under the new perspective of the neural reuse theory. Here it is envisaged that the excellent capabilities shown by insects with their small neuron number and relatively low brain complexity, as compared to vertebrates, could be justified if some key neural structures are re-used for different behavioural needs. The chapter recalls some examples, found in the literature for addressing specific topics and reformulates them in relation to the neural reuse theory.
Differential Learning as a Key Training Approach to Improve Creative and Tactical Behavior in Soccer
2018
The aim of this study was to identify the effects of a differential-learning program, embedded in small-sided games, on the creative and tactical behavior of youth soccer players. Forty players from under-13 (U13) and under-15 (U15) were allocated into control and experimental groups and were tested using a randomized pretest to posttest design using small-sided games situations.The experimental group participated in a 5-month differential-learning program embodied in small-sided games situations, while the control group participated in a typical small-sided games training program. In-game creativity was assessed through notational analyses of the creative components, and the players' posit…
POLYNOMIAL GROWTH OF THE*-CODIMENSIONS AND YOUNG DIAGRAMS
2001
Let A be an algebra with involution * over a field F of characteristic zero and Id(A, *) the ideal of the free algebra with involution of *-identities of A. By means of the representation theory of the hyperoctahedral group Z 2wrS n we give a characterization of Id(A, *) in case the sequence of its *-codimensions is polynomially bounded. We also exhibit an algebra G 2 with the following distinguished property: the sequence of *-codimensions of Id(G 2, *) is not polynomially bounded but the *-codimensions of any T-ideal U properly containing Id(G 2, *) are polynomially bounded.
A generalization of Sardinas and Patterson's algorithm to z-codes
1993
Abstract This paper concerns the framework of z-codes theory. The main contribution consists in an extension of the algorithm of Sardinas and Patterson for deciding whether a finite set of words X is a z-code. To improve the efficiency of this test we have found a tight upper bound on the length of the shortest words that might have a double z-factorization over X. Some remarks on the complexity of the algorithm are also given. Moreover, a slight modification of this algorithm allows us to compute the z-deciphering delay of X.
Consumer protection in financial services – towards greater transparency with a key information document for packaged retail investment products
2012
Consumer protection in financial services – towards greater transparency with a Key Information Document for Packaged Retail Investment Products
Implementación y uso clínico de la radioterapia adaptativa. Informe del grupo de trabajo de radioterapia adaptativa de la Sociedad Española de Física…
2021
La radioterapia adaptativa (Adaptive Radiation Therapy, ART) se puede definir como la modificación del plan de tratamiento administrado a un paciente durante el curso de la radioterapia para tener en cuenta los cambios en la anatomía.
 La aplicación de ART supone un cambio en el proceso radioterápico que implica el uso de numerosos recursos adicionales, no estando implementada de forma general. Así, aun tratándose de una idea introducida hace más de 20 años, todavía a fecha de hoy son objeto de estudio muchos de los aspectos que definen la ART: la decisión de proceder a la nueva planificación del tratamiento, el momento óptimo para adaptar el plan, el umbral dosimétrico o anatómico que…
Driving organisational ambidexterity through process management. The key role of cultural change
2013
There is an intense debate in the literature on the impact of process management on innovation, and the division of opinions becomes particularly apparent with regard to radical innovation. Furthermore, organisational ambidexterity, the organisational capability to undertake incremental as well as radical innovation activities, has been underlined as a key source of competitiveness. In this article, we analyse how the cultural divergence driven by process management can affect organisational ambidexterity. Through a survey carried out on a sample of Spanish firms in the furniture and textile sectors, both of which have been drastically hit by competition from Asian firms, we conclude that t…
A numerical treatment of wet/dry zones in well-balanced hybrid schemes for shallow water flow
2012
The flux-limiting technology that leads to hybrid, high resolution shock capturing schemes for homogeneous conservation laws has been successfully adapted to the non-homogeneous case by the second and third authors. In dealing with balance laws, a key issue is that of well-balancing, which can be achieved in a rather systematic way by considering the 'homogeneous form' of the balance law.The application of these techniques to the shallow water system requires also an appropriate numerical treatment for the wetting/drying interfaces that appear initially or as a result of the flow evolution. In this paper we propose a numerical treatment for wet/dry interfaces that is specifically designed f…
Hypervisor-based Protection of Code
2019
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…