منابع مشابه
A Closer Look at Preduction
In a recent paper Jun Arima formalises the idea of preduc-tion { a non-monotonic schema providing a common basis for inductive and analogical reasoning. We examine some of the implications of this schema, as well as its connections with prototypes and conceptual spaces. A generalised version of his schema is motivated and developed to address diiculties with asymmetry and disjuncts.
متن کاملA Closer Look at HMAC
Bellare, Canetti and Krawczyk [BCK96] show that cascading an ε-secure (fixed input length) PRF gives an O(εnq)-secure (variable input length) PRF when making at most q prefix-free queries of length n blocks. We observe that this translates to the same bound for NMAC (which is the cascade without the prefix-free requirement but an additional application of the PRF at the end), and give a matchin...
متن کاملA Closer Look at Trumping1
According to Schaffer (2000a), “trumping preemption” is a category of redundant causation distinct from early and late preemption and from overdetermination. I show that the putative causal difference between causal processes in cases thought to be trumping preemption generates early preemption or overdetermination rather than trumping. I draw a novel lesson from cases thought to be trumping: t...
متن کاملA Closer Look at Footers in Website Design
While the importance of website usability is rather well established in the literature, until recently few website designers have looked to the footer as a way to promote usability. That notion appears to be changing as more websites seem to be moving from a traditional (perfunctory) footer to one that is designed to deliver real value to the user experience. To date there has been little resea...
متن کاملA Closer Look at Security in Random Number Generators Design
The issue of random number generation is crucial for the implementation of cryptographic systems. Random numbers are often used in key generation processes, authentication protocols, zeroknowledge protocols, padding, in many digital signature and encryption schemes, and even in some side channel attack countermeasures. For these applications, security depends to a great extent on the quality of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology and Libraries
سال: 2018
ISSN: 2163-5226,0730-9295
DOI: 10.6017/ital.v37i2.10407