Academic literature on the topic 'Secure omniscience'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure omniscience.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secure omniscience"

1

Tamanoi, Mariko Asano. "Knowledge, Power, and Racial Classifications: The “Japanese” in “Manchuria”." Journal of Asian Studies 59, no. 2 (May 2000): 248–76. http://dx.doi.org/10.2307/2658656.

Full text
Abstract:
Was knowledge always the basis of colonial power? If so, were colonial rulers invariably confident of the accuracy of their knowledge? Among the Victorian British, for example, there was widespread agreement that India could be known and represented as a series of facts (Cohn 1996, 4). Based on this agreement, the British colonial officials, missionaries, and entrepreneurs tried to demonstrate their power through what Bernard Cohn calls “officializing procedures”: counting, gathering, characterizing, ordering, and classifying the populations and their attributes in India. Such procedures offered numerous agents of colonization “seemingly immense culture-defining capacity” (Cooper and Stoler 1989, 609). Yet, their power was “never so omniscient nor secure to imagine itself as totalizing” (Dirks 1992, 7). Their insecurity may have been the result of their incomplete knowledge or even ignorance.
APA, Harvard, Vancouver, ISO, and other styles
2

Badica, Andreea Liliana, and Mircea Ovidiu Mitucă. "IOT-Enhanced Digital Marketing Conceptual Framework." BRAIN. Broad Research in Artificial Intelligence and Neuroscience 12, no. 4 (December 20, 2021): 509–31. http://dx.doi.org/10.18662/brain/12.4/262.

Full text
Abstract:
The research proposed in this paper regards the appropriateness and possibility of enhancing digital marketing with IoT technologies. The contribution of this paper is a novel digital marketing conceptual framework based on the ubiquitous and pervasive IoT technologies, empowered by the synergies of edge, fog and cloud computing. Our proposal is grounded into the general framework of digital marketing research proposed by Kannan and Li, as well as on the comprehensive agent-based IoT paradigm, thoroughly analysed by Savaglio et al. This framework is capable to seamlessly support the emergent marketing approaches including: contextual marketing, intelligent marketing, and omniscient marketing. On the other hand, this proposal can also benefit from the techniques and methodologies for building secure and robust IoT systems that were recently proposed by Pešić et al, for increasing the security and trust of IoT-based digital marketing ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
3

Mali, Mateus. "Teodise dan Covid-19." DUNAMIS: Jurnal Teologi dan Pendidikan Kristiani 7, no. 2 (January 9, 2023): 592–609. http://dx.doi.org/10.30648/dun.v7i2.830.

Full text
Abstract:
Abstract. The Covid-19 pandemic has created human’s suffering. Human suffering itself has evoked many questions about God's omniscience and omnipotence, which are often known as theodicy problem. This paper is an attempt to account for God's ways of human suffering. The method used in this study was a literature study by conducting a reflective analysis of several philosophers and theologians' thoughts. The results of this study showed that faith in Jesus Christ enables people to accept suffering positively. Suffering can bring to awareness of human limitations, awareness that suffering can be turned into strength, raise a sense of optimism for a better future, and awaken solidarity.Abstrak. Pandemi Covid-19 telah membuat manusia menderita. Penderitaan manusia itu sendiri telah mengundang banyak pertanyaan terhadap kemahatahuan dan kemahakuasaan Allah, yang sering dikenal dengan persoalan teodise. Tulisan ini adalah sebuah usaha untuk mempertanggungjawabkan jalan-jalan Tuhan atas penderitaan manusia. Metode yang digunakan dalam kajian ini adalah studi literatur dengan melakukan analisis reflektif dari beberapa pemikiran filsuf dan teolog. Hasil kajian ini menunjukkan bahwa iman kepada Yesus Kristus membuat orang dapat menerima penderitaan secara positif. Penderitaan dapat mengajarkan kesadaran akan keterbatasan manusiawi, kesadaran bahwa penderitaan dapat diubah menjadi kekuatan, bangkitnya rasa optimis akan masa depan yang lebih baik, dan bangkitnya solidaritas.
APA, Harvard, Vancouver, ISO, and other styles
4

Barker, George. "A Comparative Institutional Approach to Law and Legal Institutions." Victoria University of Wellington Law Review 26, no. 1 (February 1, 1996): 109. http://dx.doi.org/10.26686/vuwlr.v26i1.6181.

Full text
Abstract:
The late 1980s and early 1990s saw a revolution in economic policy and a transformation of the New Zealand economy. Such events also involved a revolution in legal thought and analysis. This article brings the main elements of this new economic approach to law and policy to a wider audience. It seeks to review the main features of the recent and significant advances that have been made in the economic analysis of organisations and institutions. The article first discusses the fundamental factors which must be recognised as constraints on the ability to secure an ideal society. It then discusses how private arrangements seek to overcome these constraints and the limits to their success. The role of the state in alleviating or overcoming problems with private solutions is also discussed, with the author stressing the need to recognise that the state is not an omniscient and omnipotent solver of social problems. The author concludes that the analysis of government and government policy needs to be based on a comparative institutional approach involving an assessment of institutional structures according to the processes and outcomes they involve, utilising generally accepted criteria for making social choices. Key factors that must be considered in comparing alternative means for achieving social goals are identified.
APA, Harvard, Vancouver, ISO, and other styles
5

Eka Maulana, Dimas. "ANALISIS TEKNIK RESTRICTED NARRATION DALAM MEMBANGUN DRAMATIK PADA SINEMATOGRAFI FILM 1917 KARYA SAM MENDES." TONIL: Jurnal Kajian Sastra, Teater dan Sinema 19, no. 2 (December 17, 2022): 90–103. http://dx.doi.org/10.24821/tnl.v19i2.7857.

Full text
Abstract:
Pada umumnya teknik bercerita naratif pada film dibagi menjadi dua yaitu Restricted Narration dan Omniscient Narration. Film “1917” karya Sam Mendes yang rilis pada tahun 2019 merupakan salah satu film yang menggunakan teknik Restricted Narration. Restricted Narration atau penceritaan terbatas adalah, salah satu pendekatan naratif yang membatasi informasi cerita kepada penonton hanya melalui satu sudut pandang yakni pada tokoh utama. Pembatasan informasi ini bertujuan untuk menciptakan efek kejutan-kejutan yang tak terduga pada penonton. Tujuan penelitian ini adalah menganalisis bagaimana Restricted Narration dapat membangun dramatik dalam film “1917”. Pada umumnya teknik ini bisa dilihat dari berbagai aspek film seperti sinematografi, editing, serta naskah. Tentunya hal ini juga berhubungan dengan alur naskah dan konsep sutradara. Analisis dilakukan dengan menggunakan pendekatan analitik pada seni khususnya pada film. Penelitian ini juga menggunakan metode kualitatif deskriptif untuk membedah kaidah-kaidah teknik Restricted Narration. Hasil penelitian ini menjabarkan Restricted Narration yang diterapkan pada adegan-adegan di film “1917” secara terperinci. Hasil penelitian ini juga menunjukan bahwa Restricted Narration cukup efektif untuk membangun dramatik dalam sebuah film.Kata kunci: Restricted Narration, Film, Teknik, Sinematografi
APA, Harvard, Vancouver, ISO, and other styles
6

Ngala, Erna, and Veydy Yanto Mangantibe. "Penginjilan Terhadap Masyarakat Plural Berdasarkan Surat Efesus." Excelsis Deo: Jurnal Teologi, Misiologi, dan Pendidikan 5, no. 1 (June 29, 2021): 1–16. http://dx.doi.org/10.51730/ed.v5i1.58.

Full text
Abstract:
This article discusses evangelism to plural societies based on the epistle of ephesians. Evangelism is god’s program, design and work that bring for himself, people to fellowship, worship / praise and serve him in wholeness and harmony. Evangelism is established by god from eternity, because all things are designed by god from eternity in his omniscience and power in evangelism (eph. 1: 4-14). God wants his people to have fellowship with him, become his worshipers and serve him, the true god. The challenge in evangelism is that every religion is different, all religions have objects that are worshiped, therefore it will not be possible to be completely equated between one religion and another. Plural society equates christian faith with other beliefs by looking for loopholes to align christianity with other religions. The duty of the believer is to preach the gospel so that unbelievers hear and believe in the lord jesus and are saved, not compromising the gospel or juxtaposing christian faith with other beliefs. Keywords: Evangelism; Plural Society; Ephesians Letter AbstrakArtikel ini membahasa mengenai penginjilan terhadap masyarakat plural berdasarkan surat Efesus. Penginjilan merupakan program, rancangan dan karya Allah yang membawa bagi diriNya sendiri suatu umat untuk bersekutu, menyembah/memuji dan melayani Dia dalam keutuhan dan keserasian. Penginjilan ditetapkan Allah sejak kekekalan, sebab segala sesuatu dirancang Allah dari kekal dalam kemahatahuanNya dan kuasaNya didalam penginjilan (Ef. 1:4-14). Allah menghendaki agar umatNya bersekutu dengan Dia, menjadi penyembahNya dan melayani Dia, Allah yang benar. Tantangan dalam penginjilan adalah setiap agama berbeda, semua agama memiliki objek yang disembah, oleh sebab itu tidak akan mungkin dapat disamakan secara keseluruhannya antara agama satu dengan yang lain. Masyarakat plural, menyamakan iman Kristen dengan kepercayaan lain dengan mencari celah untuk dapat menjajarkan kekristenan dengan keagamaan lain. Tugas dari orang percaya ialah memberitakan Injil agar orang-orang yang belum percaya mendengar dan menjadi percaya kepada Tuhan Yesus serta diselamatkan, bukan mengkompromikan Injil atau menjajarkan iman Kristen dengan kepercayaan lain. Kata Kunci: Penginjilan; Masyarakat Plural; Surat Efesus
APA, Harvard, Vancouver, ISO, and other styles
7

Ashimi, Tijani Ahmad. "Islam and the Acquisition of Knowledge (Islam dan Perolehan Ilmu)." Journal of Islam in Asia (E-ISSN: 2289-8077) 14, no. 3 (January 21, 2018): 311–25. http://dx.doi.org/10.31436/jia.v14i3.635.

Full text
Abstract:
Abstract Knowledge is not only learning, but it also encompasses experience. The acquisition of knowledge involves a process of training and education rather than just learning. From the early days of Islam, knowledge has been considered to be the power that is bestowed upon man in order to qualify him to be the vicegerent of Allah on earth (KhalÊfatullÉh). Without knowledge man is not strong enough to fulfill the duties and responsibilities of a vicegerent (KhalÊfah) to structure his life and his society, as it provides him with values, virtues, visions, beliefs and power. Indeed, knowledge in Islamic worldview is a unique gift from the Creator (the most Omniscience and the only Absolute God) to man. As such, it is vital for the success of man in this world and the Hereafter. Furthermore, it is undeniable fact that, knowledge is the root of man’s progress in this transitory world and a crucial factor in his well-being after his demise. Based on the above facts, this humble paper aims to explore vis-a-vis the importance of knowledge acquisition in the view of Islam and to disclose the serious attention that Islam has paid toward acquisition of knowledge. However, to achieve the aims and the objectives of this paper, revelation based approach is applied, that is by referring to the Holy Scripture of Islam (holy Qur’an) and its perception on knowledge. Finally, the paper provides a brief conclusion and some recommendations. Keywords: Knowledge, Islam, Qur’an, Sunnah, Muslim, Social sciences, Natural sciences. Abstrak Ilmu pengetahuan bukan sahaja berkaitan pembelajaran, tetapi juga merangkumi pengalaman. Ilmu pengetahuan didapati melalui proses latihan dan pendidikan tidak hanya proses pembelajaran secara rasmi. Sejak bermulanya Islam, ilmu pengtahuan telah dianggap sebagai satu anugerah yang telah diberikan kepada manusia untuk melayakkannya menjadi khalifah di muka bumi ini. Tanpa ilmu pengetahuan manusia tidak berupaya untuk memikul tugas dan tanggungjawab sebagai seorang khalifah dalam mengatur kehidupannya dan masyarakat, ini kerana ia memberi nilai-nilai murni, sifat-sifat kebaikan, aspek kepercayaan dan kekuasaan. Sesungguhnya ilmu pengetahuan menurut perspektif Islam adalah anugerah yang unik yang diberikan oleh Pencipta (Yang Maha Mengetahui dan Maha Esa) kepada manusia. Ia merupakan syarat penting dan faktor utama bagi kejayaan manusia di dunia dan akhirat. Berdasarkan fakta yang disebutkan, kertas ini meneroka perihal pentingnya mencari ilmu pengetahuan menurut pandangan Islam dan memberi penekanan pada perkara-perkara penting dalam usaha mendapatkannya. Walau bagaimanapun, untuk mencapai matlamat dan objektif kertas ini, pendekatan berasaskan wahyu diterapkan, iaitu dengan merujuk kepada Kitab Suci Al-Quran (suci Al-Quran) dan persepsinya terhadap ilmu pegetahuan. Kertas ini akhirnya membuat kesimpulan ringkas dan juga memberi beberapa cadangan dan saranan. Kata Kunci: Ilmu pengetahuan, Islam, Quran, sunnah, orang Islam, Sains sosial, Ilmu alam.
APA, Harvard, Vancouver, ISO, and other styles
8

Rihatno, Taufik. "PELATIHAN BRAIN GYM (SENAM OTAK) PADA PESERTA PPG ASRAMA RUSUNAWA 1 UNIVERSITAS NEGERI JAKARTA." Sarwahita 14, no. 02 (December 1, 2017): 123–31. http://dx.doi.org/10.21009/sarwahita.142.06.

Full text
Abstract:
ABSTRAK: Aerobic aerobics training activities for students of SM 3T who live arranged by the State University of Jakarta is an activity of provision of skills in order to prepare them later ready to go public in general and especially as teachers who will live in the outermost, leading, and left (3T) , because the teacher is still considered part of the community is a skilled and omniscient person especially in the 3T area. This implementation was conducted on July 22 and 23, 2017 with the number of participants who were in this training as many as 31 students in various kinds of the study program, such as; Prodi Physical Education, Health and Recreation, Bahasa Indonesia, English, Education of Cultural Arts and Economic Education. The location of the training in Rusunawa 1 Campus B State University Jl Pemuda No 10 Rawamanguna Jakarta is quite a lot of participants who want to participate with various factors of reason of their participation, among others; 1) The Brain Gym is already known, but the Brain Gym movements developed by the Deputy of Sports Empowerment of the State Ministry of Youth and Sports are not familiar with the participants, 2) Want to know, learn and master the motion skills of Brain Gym so they can be an instructor, 3) To maintain health. To undertake this activity, the Faculty of Sport of the State University of Jakarta through the Institute of Community Service held a Brain Gym Training at the participants of Rusunawa 1 PPG SM-3T State University of Jakarta to be more confident and optimize the ability of the psychomotor aspect with the competence it has. In terms of implementation, participants look enthusiastic, passionate and motivated to follow the course of this event until the deadline has been determined. Responses and responses from participants either verbally or practice movements can be passed well. So in the end this activity can be concluded that the participants get useful knowledge. In the end, it is expected that similar activities can be carried out periodically to the wider community with a broader target. ABSTRAK: Kegiatan pelatihan senam aerobik bagi mahasiswa SM 3T yang tinggal dirusunawa 1 Univeristas Negeri Jakarta merupakan kegiatan pemberian bekal keterampilan dalam rangka mempersiapkan mereka nantinya siap terjun kemasyarakat secara umumnya dan khususnya sebagai guru yang akan tinggal di daerah-daerah terluar, terdepan, dan tertinggal (3T), sebab guru masih dianggap sebagian masyarakat adalah orang yang terampil dan serba tahu apalagi di daerah 3T tersebut. Pelaksanaan ini dilakukan pada tanggal 22 dan 23 Juli 2017 dengan jumlah peserta yang itu dalam pelatihan ini sebanyak 31 orang mahasiswa dengan berbagai macam prodi, seperti; prodi Pendidikan Jasmani, Kesehatan dan Rekreasi, Bahasa Indonesia, Bahasa Inggris, Pendidikan Seni Budaya dan Pendidikan Ekonomi. Tempat pelaksanaan pelatihan di Rusunawa 1 Kampus B Universitas Negeri Jl Pemuda No 10 Rawamanguna Jakarta cukup banyak peserta yang mau ikut dengan berbagai faktor alasan keikutsertaan mereka, antara lain; 1) Brain Gym ini sudah di kenal, tetapi gerakan-gerakan Brain Gym yang dikembangakan Deputi Pemberdayaan Olahraga Kementrian Negara Pemuda dan Olahraga peserta belum mengenalnya, 2) Ingin mengetahui, mempelajari dan menguasai keterampilan gerak dari Brain Gym sehingga mereka bisa menjadi instruktur, 3) Untuk menjaga kesehatan. Untuk merelisasikan pelaksanaan kegiatan ini, maka Fakultas Ilmu Olahraga Universitas Negeri Jakarta melalui Lembaga Pengabdian Kepada Masyarakat mengadakan Pelatihan Brain Gym Pada Peserta Asrama Rusunawa 1 PPG SM-3T Universitas Negeri Jakata agar meraka lebih percaya diri dan mengoptimalkan kemampuan dari aspek psikomotor dengan kompetensi yang dimilikinya. Dari segi pelaksanaannya, peserta terlihat antusias, semangat dan termotivasi mengikuti jalannya acara ini sampai pada batas waktu yang telah ditentukan. Tanggapan dan respon dari peserta baik secara lisan maupun praktek gerak dapat dilalui dengan baik. Sehingga pada akhirnya kegiatan ini dapat disimpulkan bahwa peserta mendapatkan ilmu yang bermanfaat. Pada akhirnya diharapkan kegiatan serupa dapat dilaksanakan secara periodik pada masyarakat luas dengan sasaran yang lebih luas lagi.
APA, Harvard, Vancouver, ISO, and other styles
9

Worsley, Peter John. "Some Thoughts About Genre in Old Javanese Literature." Jumantara: Jurnal Manuskrip Nusantara 12, no. 2 (December 2, 2021). http://dx.doi.org/10.37014/jumantara.v12i2.1148.

Full text
Abstract:
Robson in 1983 and 1988 in his reconsideration of the poetics of kakawin epics and Javanese philology drew readers’ attention to the importance of genre for the history of ancient Javanese literature. Aoyama in his study of the kakawin Sutasoma in 1992, making judicious use of Hans Jauss’s concept of “horizon of expectation”, offered the first systematic discussion of the genre of Old Javanese literary works. The present essay offers a commentary on the terms which mpu Monaguna and mpu Prapañca, authors of the thirteenth century epic kakawin Sumanasāntaka and the fourteenth century Deśawarṇana, themselves, employ to refer to the generic characteristics of their poems. Mpu Monaguna referred to his epic poem as a narrative work (kathā), written in a prakṛt, Old Javanese, and rendered in the poetic form of a kakawin and finally as a ritual act intended to enable the poet to achieve apotheosis with his tutelary deity and his poem to be the means of transforming the world, in particular to ensure the wellbeing of the readers, listeners, copyists and those who possessed copies of his poetic work. Mpu Prapañca described his Deśawarṇana differently. Also written in Old Javanese and in the poetic form of a kakawin—he refers to his work variously as a narrative work (kathā), a chronicle (śakakāla or śakābda), a praise poem (kastawan) and also as a ritual act designed to enable the author in an ecstatic state of rapture (alangö), and filled with the power and omniscience of his tutelary deity, to ensure the continued prosperity of the realm of Majapahit and to secure the rule of his king Rājasanagara. The essay considers each of these literary categories.
APA, Harvard, Vancouver, ISO, and other styles
10

Karimi, Negin, Ahmad Yousefian Darani, and Marcus Greferath. "Correcting adversarial errors with generalized regenerating codes." Advances in Mathematics of Communications, 2022, 0. http://dx.doi.org/10.3934/amc.2022005.

Full text
Abstract:
<p style='text-indent:20px;'>Traditional regenerating codes are efficient tools to optimize both storage and repair bandwidth in storing data across a distributed storage system, particularly in comparison to erasure codes and data replication. In traditional regenerating codes, the collection of any <inline-formula><tex-math id="M1">\begin{document}$ k $\end{document}</tex-math></inline-formula> nodes can reconstruct all stored information and is called the reconstruction set, <inline-formula><tex-math id="M2">\begin{document}$ \aleph _R $\end{document}</tex-math></inline-formula>. A failed node can be regenerated from any <inline-formula><tex-math id="M3">\begin{document}$ d $\end{document}</tex-math></inline-formula> surviving nodes. These collections of <inline-formula><tex-math id="M4">\begin{document}$ d $\end{document}</tex-math></inline-formula> nodes are called the regeneration sets, <inline-formula><tex-math id="M5">\begin{document}$ \aleph _H $\end{document}</tex-math></inline-formula>. The number of reconstruction sets and the number of regeneration sets satisfy <inline-formula><tex-math id="M6">\begin{document}$ |\aleph _R| = C_n^k $\end{document}</tex-math></inline-formula> and <inline-formula><tex-math id="M7">\begin{document}$ |\aleph _H| = C_{n-1}^d $\end{document}</tex-math></inline-formula>. In generalized regenerating codes, we will have, <inline-formula><tex-math id="M8">\begin{document}$ 1\le|\aleph_R|\le C^k_n $\end{document}</tex-math></inline-formula> and <inline-formula><tex-math id="M9">\begin{document}$ 1\le|\aleph_H|\le C_{n-1}^d $\end{document}</tex-math></inline-formula>. In this paper, we address the problem of secure generalized regenerating codes and present a coding scheme by focusing on the features of the generalized regenerating codes that protects data in the distributed storage system in presence of an active omniscient adversary. This adversary can maliciously alter the data stored on the nodes under its control and send erroneous outgoing message when contacted for the repair of failed nodes. In our scheme notwithstanding the presence of an adversary in distributed storage system, a data collector can still obtain the original file using a classical minimum distance decoder.</p>
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Secure omniscience"

1

Mukherjee, Manuj. "Secret Key Generation in the Multiterminal Source Model : Communication and Other Aspects." Thesis, 2017. http://etd.iisc.ernet.in/2005/3783.

Full text
Abstract:
This dissertation is primarily concerned with the communication required to achieve secret key (SK) capacity in a multiterminal source model. The multiterminal source model introduced by Csiszár and Narayan consists of a group of remotely located terminals with access to correlated sources and a noiseless public channel. The terminals wish to secure their communication by agreeing upon a group secret key. The key agreement protocol involves communicating over the public channel, and agreeing upon an SK secured from eavesdroppers listening to the public communication. The SK capacity, i.e., the maximum rate of an SK that can be agreed upon by the terminals, has been characterized by Csiszár and Narayan. Their capacity-achieving key generation protocol involved terminals communicating to attain omniscience, i.e., every terminal gets to recover the sources of the other terminals. While this is a very general protocol, it often requires larger rates of public communication than is necessary to achieve SK capacity. The primary focus of this dissertation is to characterize the communication complexity, i.e., the minimum rate of public discussion needed to achieve SK capacity. A lower bound to communication complexity is derived for a general multiterminal source, although it turns out to be loose in general. While the minimum rate of communication for omniscience is always an upper bound to the communication complexity, we derive tighter upper bounds to communication complexity for a special class of multiterminal sources, namely, the hypergraphical sources. This upper bound yield a complete characterization of hypergraphical sources where communication for omniscience is a rate-optimal protocol for SK generation, i.e., the communication complexity equals the minimum rate of communication for omniscience. Another aspect of the public communication touched upon by this dissertation is the necessity of omnivocality, i.e., all terminals communicating, to achieve the SK capacity. It is well known that in two-terminal sources, only one terminal communicating success to generate a maximum rate secret key. However, we are able to show that for three or more terminals, omnivocality is indeed required to achieve SK capacity if a certain condition is met. For the specific case of three terminals, we show that this condition is also necessary to ensure omnivocality is essential in generating a SK of maximal rate. However, this condition is no longer necessary when there are four or more terminals. A certain notion of common information, namely, the Wyner common information, plays a central role in the communication complexity problem. This dissertation thus includes a study of multiparty versions of the two widely used notions of common information, namely, Wyner common information and Gács-Körner (GK) common information. While evaluating these quantities is difficult in general, we are able to derive explicit expressions for both types of common information in the case of hypergraphical sources. We also study fault-tolerant SK capacity in this dissertation. The maximum rate of SK that can be generated even if an arbitrary subset of terminals drops out is called a fault-tolerant SK capacity. Now, suppose we have a fixed number of pairwise SKs. How should one distribute them amongpairs of terminals, to ensure good fault tolerance behavior in generating a groupSK? We show that the distribution of the pairwise keys according to a Harary graph provides a certain degree of fault tolerance, and bounds are obtained on its fault-tolerant SK capacity.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Secure omniscience"

1

Jones, Charlotte. Realism, Form, and Representation in the Edwardian Novel. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198857921.001.0001.

Full text
Abstract:
‘The real represents to my perception the things that we cannot possibly not know, sooner or later, in one way or another,’ wrote Henry James in 1907. This description, riven with double negatives, hesitation, and uncertainty, encapsulates the epistemological difficulties of realism, for underlying its narrative and descriptive apparatus as an aesthetic mode lies a philosophical quandary. What grounds the ‘real’ of the realist novel? What kind of perception is required to validate the experience of reality? How does the realist novel represent the difficulty of knowing? What comes to the fore in James’s account, as in so many, is how the forms of realism are constituted by a relation to unknowing, absence and ineffability. Realism, Form, and Representation in the Edwardian Novel recovers a neglected literary history centred on the intricate relationship between fictional representation and philosophical commitment. It asks how—or if—we can conceptualize realist novels when the objects of their representational intentions are realities that might exist beyond what is empirically verifiable by sense data or analytically verifiable by logic, and are thus irreducible to conceptual schemes or linguistic practices—a formulation Charlotte Jones refers to as ‘synthetic realism’. In new readings of Edwardian novels (including Conrad’s Nostromo and The Secret Agent, Wells’s Tono-Bungay, and Ford’s The Good Soldier), Jones revises and reconsiders key elements of realist novel theory—metaphor and metonymy; character interiority; the insignificant detail; omniscient narration and free indirect discourse; causal linearity—to uncover the representational strategies by which realist writers grapple with the recalcitrance of reality as a referential anchor, and seek to give form to the force, opacity, and uncertain scope of realities that may lie beyond the material. In restoring a metaphysical dimension to the realist novel’s imaginary, Realism, Form, and Representation in the Edwardian Novel offers a new conceptualisation of realism both within early twentieth-century literary culture and as a transhistorical mode of representation.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Secure omniscience"

1

Schuldiner, Ruth. "The Narrative Tease: Narratorial Omniscience, Implicature and the Making of Sensation in Lady Audley’s Secret." In Pragmatic Literary Stylistics, 172–91. London: Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137023278_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Chapter Five On Doubt and Self-Understanding: The Omniscience of an Author and his Arch-Exponent." In The Secret Sankara, 51–61. BRILL, 2011. http://dx.doi.org/10.1163/9789004216334_006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"the novel, to the embroidered message in Ethiopian hieroglyphs which Persinna exposed with her daughter and which remained unread until Kalasiris tracked her down in Delphi and deciph­ ered it: Above all, be sure to find among the treasures that I laid beside you a certain ring. Keep it by you always. It was a gift that your father gave me during our courtship, engraved all around with the royal crest and set with a pantar be jewel that endows it with holy, mystic powers. (4.8.7) These holy, mystic powers are unspecified.9 Nevertheless, the mere mention of them would lead a competent reader to surmise that the plot would exploit them sooner or later, and an exceptionally alert reader might beat the author to the connection in Book 8. It is not difficult to find other sections within the narrative of the Aithiopika which are constructed as riddles, a vital piece of information being kept back and then released as an answer. Two more examples can be mentioned briefly, both from the ninth book, whose military subject matter could easily lead to the false assumption that its narrative technique is simple. Oroondates is besieged by the Ethiopians in Syene. He parleys with them, and secures their permission to send two envoys to his troops at Elephantine, ostensibly to negotiate their surrender at the same time as his. His real motives are not divulged, nor are they when he makes an apparently impossible break-out and stealthily enters Elephantine by night (9.7ff.). The riddle set is: what is his plan?, and, as is by now familiar, the reader’s ignorance is produced by the exploitation of partial in-text viewpoints. In this case all Oroondates’ actions are described as seen by the Ethiopians with­ out authorial explanation. Some additional clues are given later in the narrative, but the full answer is withheld until the moment when the Persian army from Elephantine suddenly turns up with Oroondates at its head (9.13), at which point the omniscient nar­ rator intervenes to fill in the gaps he had left in his own narrative. There ensues a battle, in which the Persians have a seemingly decisive weapon, their armoured cavalry. A lengthy description stresses the totality of the protection of both rider and horse and the awesome power of their arms (9.15). Against them Hydaspes stations troops of the Blemmyes and Seres, two subject nations, with special instructions which are not communicated to the." In Greek Literature in the Roman Period and in Late Antiquity, 325. Routledge, 2014. http://dx.doi.org/10.4324/9780203616895-40.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secure omniscience"

1

Chan, Chung, Navin Kashyap, Praneeth Kumar Vippathalla, and Qiaoqiao Zhou. "Secure Information Exchange for Omniscience." In 2020 IEEE International Symposium on Information Theory (ISIT). IEEE, 2020. http://dx.doi.org/10.1109/isit44484.2020.9174231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vippathalla, Praneeth Kumar, Chung Chan, Navin Kashyap, and Qiaoqiao Zhou. "Secret Key Agreement and Secure Omniscience of Tree-PIN Source with Linear Wiretapper." In 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9518075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chan, Chung, Manuj Mukherjee, Navin Kashyap, and Qiaoqiao Zhou. "When is omniscience a rate-optimal strategy for achieving secret key capacity?" In 2016 IEEE Information Theory Workshop (ITW). IEEE, 2016. http://dx.doi.org/10.1109/itw.2016.7606855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography