Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
See detailHow to measure Collaborative Problem Solving? Some item prototypes
Greiff, Samuel UL; Martin, Romain UL

Presentation (2012, November 12)

Detailed reference viewed: 44 (1 UL)
See detailHow to measure complex problem solving: Ideas, approach & software
Greiff, Samuel UL

Presentation (2009, November 11)

Detailed reference viewed: 49 (1 UL)
Full Text
Peer Reviewed
See detailHow to Measure Motivational Interviewing Fidelity in Randomized Controlled Trials: Practical Recommendations.
Jelsma, J.; Mertens, Vera-Christina UL; Forsberg, L. et al

in Contemporary Clinical Trials (2015), 43

Detailed reference viewed: 93 (1 UL)
See detailHow to prevent cyberbullying and cybergrooming
Steffgen, Georges UL

Conference given outside the academic context (2014)

Detailed reference viewed: 78 (0 UL)
Peer Reviewed
See detailHow to Program Organizations and Roles in the JADE Framework
Baldoni, Matteo; Boella, Guido UL; Genovese, Valerio UL et al

in Multiagent System Technologies, 6th German Conference, MATES 2008, Kaiserslautern, Germany, September 23-26, 2008. Proceedings (2008)

The organization metaphor is often used in the design and implementation of multiagent systems. However, few agent programming languages provide facilities to define them. Several frameworks are proposed ... [more ▼]

The organization metaphor is often used in the design and implementation of multiagent systems. However, few agent programming languages provide facilities to define them. Several frameworks are proposed to coordinate MAS with organizations, but they are not programmable with general purpose languages. In this paper we extend the JADE framework with primitives to program in Java organizations structured in roles, and to enable agents to play roles in organizations. Roles facilitate the coordination of agents inside an organization and offer new abilities (powers) in the context of organizations to the agents which satisfy the requirements necessary to play the roles. To program organizations and roles, we provide primitives which enable an agent to enact a new role in an organization to invoke powers. [less ▲]

Detailed reference viewed: 66 (0 UL)
Full Text
Peer Reviewed
See detailHow to prove the validity of a complex ballot encryption to the voter and the public
Joaquim, Rui UL

in Journal of Information Security and Applications (2014)

One crucial aspect of any verifiable electronic voting system that uses encryption is the proof that the vote encryption is well-formed, i.e. the proof that the vote encryption encrypts a valid vote ... [more ▼]

One crucial aspect of any verifiable electronic voting system that uses encryption is the proof that the vote encryption is well-formed, i.e. the proof that the vote encryption encrypts a valid vote accordingly to the race specification. It makes no sense accepting an encrypted vote if, at the end of the election, the vote cannot be included in the tally because it is badly formed. Proving the validity of a complex vote encryption, without revealing the vote, is a hard problem. This paper first contribution addresses exactly that problem and provides a set of new constructions to create a vote encryption and the corresponding public proof of validity for several types of complex ballots ([kmin,kmax]-out-of-n approval, weighted and ranked ballots). The second contribution is a technique that allows to create a single, constant size, verification code for a ballot containing one or several races of any mix of the race types considered. With this single verification code the voter can verify that her vote was cast-as-intended. Moreover, our constructions can be tuned for either mix net or homomorphic tallying and support both types of tallying in the same multi-race ballot. [less ▲]

Detailed reference viewed: 141 (1 UL)
Full Text
Peer Reviewed
See detailHow to Regulate Bitcoin? Decentralized Regulation for a Decentralized Cryptocurrency
Nabilou, Hossein UL

in International Journal of Law and Information Technology (2019)

Bitcoin is a distributed system. The greatest dilemma it poses to the current legal and regulatory systems is that it is hardly possible to regulate a distributed network in a centralized fashion as ... [more ▼]

Bitcoin is a distributed system. The greatest dilemma it poses to the current legal and regulatory systems is that it is hardly possible to regulate a distributed network in a centralized fashion as decentralized permissionless blockchain-based cryptocurrencies are antithetical to the existing centralized structure of monetary and financial regulation. By shifting the policy debate from whether to regulate bitcoin and other decentralized cryptocurrencies to how to regulate them, this paper proposes a more nuanced policy recommendation for regulatory intervention in the cryptocurrency ecosystem. This policy approach relies on a decentralized regulatory architecture that is built upon the existing regulatory infrastructure and makes use of the existing as well as the emerging middlemen in the industry. It argues that instead of regulating the technology or the cryptocurrencies at the code or protocol layer, which might not be desirable, even if feasible, the regulation should target the applications and use-cases of cryptocurrencies. Such a regulatory strategy can best be implemented through directing the edicts and interdictions of regulation towards the middlemen, and can be enforced by the existing financial market participants and traditional gatekeepers such as banks, payment service providers and exchanges, as well as new emerging participants, such as large and centralized node operators and miners that are likely to replicate the functions of the traditional gatekeepers. [less ▲]

Detailed reference viewed: 361 (12 UL)
Full Text
Peer Reviewed
See detailHow to reveal the secrets of an obscure white-box implementation
Goubin, Louis; Paillier, Pascal; Rivain, Matthieu UL et al

in Journal of Cryptographic Engineering (2019), 10(1), 49--66

White-box cryptography protects key extraction from software implementations of cryptographic primitives. It is widely deployed in DRM and mobile payment applications in which a malicious attacker might ... [more ▼]

White-box cryptography protects key extraction from software implementations of cryptographic primitives. It is widely deployed in DRM and mobile payment applications in which a malicious attacker might control the entire execution environment. So far, no provably secure white- box implementation of AES has been put forward, and all the published practical constructions are vulnerable to differential computation analysis (DCA) and differential fault analysis (DFA). As a consequence, the industry relies on home-made obscure white-box implementations based on secret designs. It is therefore of interest to investigate the achievable resistance of an AES implementation to thwart a white-box adversary in this paradigm. To this purpose, the ECRYPT CSA project has organized the WhibOx contest as the catch the flag challenge of CHES 2017. Researchers and engineers were invited to participate either as designers by submitting the source code of an AES-128 white-box implementation with a freely chosen key, or as breakers by trying to extract the hard-coded keys in the submitted challenges. The participants were not expected to disclose their identities or the underlying designing/attacking techniques. In the end, 94 submitted challenges were all broken and only 13 of them held more than 1 day. The strongest (in terms of surviving time) implementation, submitted by Biryukov and Udovenko, survived for 28 days (which is more than twice as much as the second strongest implementation), and it was broken by a single team, i.e., the authors of the present paper, with reverse engineering and algebraic analysis. In this paper, we give a detailed description of the different steps of our cryptanalysis. We then generalize it to an attack methodology to break further obscure white-box implementations. In particular, we formalize and generalize the linear decoding analysis that we use to extract the key from the encoded intermediate variables of the target challenge. [less ▲]

Detailed reference viewed: 28 (2 UL)
Full Text
Peer Reviewed
See detailHow to revise a total preorder
Booth, Richard UL; Meyer, Thomas

in Journal of Philosophical Logic (2011), 40

Detailed reference viewed: 68 (1 UL)
Peer Reviewed
See detailHow to threaten male gamers: The effects of stereotype threat on video game performance
Wagener, Gary L.; Melzer, André UL

Poster (2018, May)

A total of 70 participants (47.1% men) took part in a lab experiment that manipulated stereotype threat (i.e., the risk of confirming a negative stereotype about one’s group) between playing a video game ... [more ▼]

A total of 70 participants (47.1% men) took part in a lab experiment that manipulated stereotype threat (i.e., the risk of confirming a negative stereotype about one’s group) between playing a video game (Bejeweled 3). Participants performed generally worse after reading a fictitious article on gaming research that women would still play less and perform worse in games than men (ST condition). In contrast to males, however, female participants reported greater frustration from reading this article than their colleagues who read that women and men no longer differ in terms of playing frequency and performance skills (no ST condition). Interestingly, a reverse pattern of results was obtained for male participants, who reported a stronger negative effect of the article in the no ST condition on their ability to show their best gaming performance. Apparently, stereotype threat may affect video game performance both for women and men, but for different reasons. [less ▲]

Detailed reference viewed: 329 (12 UL)
See detailHow to use pragmatism pragmatically: Suggestions for the 21st century
Biesta, Gert UL

in Rud, A. G.; Garrison, J.; Stone, L. (Eds.) John Dewey at 150. Reflections for a New Century. (2009)

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailHow to use pragmatism pragmatically: Suggestions for the 21st century.
Biesta, Gert UL

in Education and Culture: The Journal of the John Dewey Society (2009), 25(2), 34-45

Detailed reference viewed: 67 (2 UL)
Peer Reviewed
See detailHow to win the numerical battle against the finite buffer stochastic fluid flow model
Fiedler, Markus; Voos, Holger UL

in Final report COST 257 (1999)

Detailed reference viewed: 31 (0 UL)
Full Text
Peer Reviewed
See detailHow to work with honest but curious judges? (preliminary report)
Pang, Jun UL; Zhang, C.

in Proc. 7th International Workshop on Security Issues in Concurrency (2009)

Detailed reference viewed: 112 (1 UL)
Full Text
Peer Reviewed
See detailHow to write if you cannot write: collaborative literacy in a Gambian village
Juffermans, Kasper UL

in van de Craats, Ineke; Kurvers, Jeanne (Eds.) Low-educated adult second language and literacy acquisition: Proceedings of the 4th symposium in Antwerp (2009)

Detailed reference viewed: 33 (0 UL)