Type

Database

Creator

Date

Thumbnail

My List

See more

Search results

24 records were found.

A student recital presented at the UNT College of Music Concert Hall.
Long term storage of bauxite residue materials requires a capping stratum which will limit erosion while stabilizing slopes, limit deep infiltration of water into storage piles, and be aesthetically acceptable to the surrounding community. A diverse native vegetative community capable of surviving seasonal drought, low plant available water and nutrient constraints has the best potential of satisfying most, if not all of these requirements. Current and past rehabilitation of residue disposal areas (RDAs) using species native to southwest Western Australia has exhibited varying success. Current practices at Alcoa World Alumina Australia’s (Alcoa) Western Australia refineries have bauxite residue fines (< 150 ìm) stored within impoundments, in which the outer embankments are constructed with bauxite residue sands (> 150 ìm). The residue ...
In the nineteenth century, Scottish national identity among the political elite of Scotland was a contested field. Rather than there being a single conception of ‘Scottishness’ among this elite, the Whigs contributors of the Edinburgh Review and the Tory contributors of Blackwood’s Edinburgh Magazine each embodied a distinctive Whig and Tory Scottish identity: a Whig identity based on Scotland’s future progress within the United Kingdom and dismissive of Scotland’s ‘backward’ pre-Union heritage; and a Tory identity that romanticised and celebrated Scottish history, while casting itself as the ‘defender’ of Scottish nationhood within the United Kingdom. This study explores these different Scottish identities. It considers both how they responded to, and how they were changed by the British age of reform. Three reforms in parti...
This work was supported by the Rothermere Foundation and the Natural Sciences and Engineering Research Council of Canada (NSERC).
Many security primitives are based on hard mathematical problems. Using hard AI problems for security has emerged as an exciting new paradigm (with Captcha being the most successful example). However, this paradigm has achieved just a limited success, and has been under-explored. In this paper, we motivate and sketch a new security primitive based on hard AI problems. © Springer-Verlag 2013.
OK, today I talk about ‘Towards new security primitives based on hard AI problems’. We all know that actually most security primitives are based on hard math problems, such as integer factorisation and discrete logarithm, but in 2003, using hard AI problems for security purposes was proposed at CMU. Everyone knows that Captcha is the most successful example. The research question we have asked is very simple: what else can we invent along this line? Can we do anything else in security primitives based on hard AI problems? My next slide, which some people in this audience have seen before, is taken from a talk I gave at a Cambridge Security Seminar in 2007. At the time I was busy designing a new graphical password scheme, which is now known as Background Draw A Secret. I had a look at a popular graphical password scheme, which is called...
This dissertation describes a compositional model rooted in cross-influential methodology between complementary musical compositions that share generative source material. In their simultaneous construction, two composition pairs presented challenges that influenced and mediated the other's development with respect to timbre, transposition, pitch material, effects processing, and form. A working prototype first provides a model that is later developed. The first work Thema is for piano alone, and the companion piece Am3ht is for piano and live computer processing via the graphical programming environment Max/MSP. Compositional processes used in the prototype solidify the cross-influential model, demanding flexibility and a dialectic approach. Ideas set forth in the prototype are then explored through a second pair of compositions roote...