Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Artificial Intelligence and Robotics (2)
- Applied Mathematics (1)
- Arts and Humanities (1)
- Cognition and Perception (1)
- History (1)
-
- History of Science, Technology, and Medicine (1)
- Intellectual History (1)
- Mathematics (1)
- Metaphysics (1)
- Military History (1)
- Number Theory (1)
- Other Applied Mathematics (1)
- Other Psychology (1)
- Philosophy (1)
- Philosophy of Science (1)
- Psychology (1)
- Social and Behavioral Sciences (1)
- United States History (1)
- Keyword
-
- Andrija Puharich (1)
- Artificial Intelligence (1)
- Authentication schemes (1)
- Central Intelligence Agency (1)
- Cold War (1)
-
- Collaboration (1)
- Cryptography (1)
- Discrete logarithm (1)
- Graph homomorphism (1)
- Group homomorphism (1)
- Hash functions (1)
- Hubert Dreyfus (1)
- Hype Cycle (1)
- K-means; clustering; geometric; verification; Indian-buffet; stochastic; suspicious; hierarchical tree (1)
- Military (1)
- Parapsychology (1)
- Rationality (1)
- Security (1)
- Telepathy (1)
- Visualization (1)
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Information Security
Rationality, Parapsychology, And Artificial Intelligence In Military And Intelligence Research By The United States Government In The Cold War, Guy M. Lomeo
Theses and Dissertations
A study analyzing the roles of rationality, parapsychology, and artificial intelligence in military and intelligence research by the United States Government in the Cold War. An examination of the methodology behind the decisions to pursue research in two fields that were initially considered irrational.
Cayley Graphs Of Semigroups And Applications To Hashing, Bianca Sosnovski
Cayley Graphs Of Semigroups And Applications To Hashing, Bianca Sosnovski
Dissertations, Theses, and Capstone Projects
In 1994, Tillich and Zemor proposed a scheme for a family of hash functions that uses products of matrices in groups of the form $SL_2(F_{2^n})$. In 2009, Grassl et al. developed an attack to obtain collisions for palindromic bit strings by exploring a connection between the Tillich-Zemor functions and maximal length chains in the Euclidean algorithm for polynomials over $F_2$.
In this work, we present a new proposal for hash functions based on Cayley graphs of semigroups. In our proposed hash function, the noncommutative semigroup of linear functions under composition is considered as platform for the scheme. We will also …
Cryptography With Right-Angled Artin Groups, Ramon Flores, Delaram Kahrobaei
Cryptography With Right-Angled Artin Groups, Ramon Flores, Delaram Kahrobaei
Publications and Research
In this paper we propose right-angled Artin groups as a platform for secret sharing schemes based on the efficiency (linear time) of the word problem. Inspired by previous work of Grigoriev-Shpilrain in the context of graphs, we define two new problems: Subgroup Isomorphism Problem and Group Homomorphism Problem. Based on them, we also propose two new authentication schemes. For right-angled Artin groups, the Group Homomorphism and Graph Homomorphism problems are equivalent, and the later is known to be NP-complete. In the case of the Subgroup Isomorphism problem, we bring some results due to Bridson who shows there are right-angled Artin …
Technetium: Productivity Tracking For Version Control Systems, David Leonard
Technetium: Productivity Tracking For Version Control Systems, David Leonard
Dissertations and Theses
In recent years, the City College of New York has seen its Computer Science program grow immensely, to the point of overcrowding. This has negative implications for both students and professors, particularly in introductory computer science courses in which constant feedback, iteration and collaboration with others is key to success. In this paper we propose various models for collaboration among students in all course levels using distributed version control systems and implement a secure and efficient tool for visualizing collaborative efforts by observing past work [5]. Lastly, we lay the foundation for future work around additional collaborative metrics, features and …
An Approach To Automatic Detection Of Suspicious Individuals In A Crowd, Satabdi Mukherjee
An Approach To Automatic Detection Of Suspicious Individuals In A Crowd, Satabdi Mukherjee
Dissertations and Theses
This paper describes an approach to identify individuals with suspicious objects in a crowd. It is based on a well-known image retrieval problem as applied to mobile visual search. In many cases, the process of building a hierarchical tree uses k-means clustering followed by geometric verification. However, the number of clusters is not known in advance, and sometimes it is randomly generated. This may lead to a congested clustering which can cause problems in grouping large real-time data. To overcome this problem we have applied the Indian Buffet stochastic process approach in this paper to the clustering problem. We present …