Adam Smith - Academia.edu (original) (raw)

Papers by Adam Smith

Research paper thumbnail of Relationship between demographics and dietary specificity of imperial eagles in Kazakhstan

Research paper thumbnail of Planning, environmental impact management and compliance on the Great Barrier Reef

The Great Barrier Reef Marine Park is a multiple use marine protected area of some 343,500 km2. A... more The Great Barrier Reef Marine Park is a multiple use marine protected area of some 343,500 km2. Activity is controlled by legislation, spatial plans and permits. Spatial plans are of three types. Zoning Plans cover the entire Marine Park and are the primary control on use. Management Plans apply to smaller areas or to species requiring special protection. Management Plans

Research paper thumbnail of Efficient and Non-Interactive Non-Malleable Commitment

Theory and Application of Cryptographic Techniques, 2000

We present new constructions of non-malleable commitment schemes, in the public parameter model (... more We present new constructions of non-malleable commitment schemes, in the public parameter model (where a trusted party makes parameters available to all parties), based on the discrete logarithm or RSA assumptions. The main features of our schemes are: they achieve near-optimal communication for arbitrarily-large messages and are non- interactive. Previous schemes either required (several rounds of) interac- tion or focused

Research paper thumbnail of Producing Irrigated Winter Wheat

Research paper thumbnail of ASN. 1: An XML Alternative for Performance and Security

Research paper thumbnail of Detectable byzantine agreement secure against faulty majorities

Proceedings of the twenty-first annual symposium on Principles of distributed computing - PODC '02, 2002

It is well-known that n players, connected only by pairwise secure channels, can achieve Byzantin... more It is well-known that n players, connected only by pairwise secure channels, can achieve Byzantine agreement only if the number t of cheaters satisfies t < n/3, even with respect to computa-tional security. However, for many applications it is sufficient to achieve detectable broadcast. ...

Research paper thumbnail of ERS SAR interferometry of an erupting volcano on a tropical island: Soufriere Hills volcano, Montserrat

IEEE 1999 International Geoscience and Remote Sensing Symposium. IGARSS'99 (Cat. No.99CH36293), 1999

SAR interferometry can, potentially, supply two types of useful information relevant to the 1995-... more SAR interferometry can, potentially, supply two types of useful information relevant to the 1995-99 eruption of Soufriere Hills Volcano, Montserrat: (i) the topography of the growing lava dome and its apron of pyroclastic flows, and (ii) the surface deformation of the volcano due to magma movement within. Phase information from ERS SAR data collected from July 1997 to November 1998

Research paper thumbnail of Management Information Base for the Differentiated Services Architecture

This memo describes an SMIv2 (Structure of Management Information version 2) MIB for a device imp... more This memo describes an SMIv2 (Structure of Management Information version 2) MIB for a device implementing the Differentiated Services Architecture. It may be used both for monitoring and configuration of a router or switch capable of Differentiate d Services functionality .

Research paper thumbnail of Correcting errors without leaking partial information

Proceedings of the thirty-seventh annual ACM symposium on Theory of computing - STOC '05, 2005

This paper explores what kinds of information two parties must communicate in order to correct er... more This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W . Any bits they communicate must leak a significant amount of information about W -that is, from the adversary's point of view, the entropy of W will drop significantly. Nevertheless, we construct schemes with which Alice and Bob can prevent an adversary from learning any useful information about W . Specifically, if the entropy of W is sufficiently high, then there is no function f (W ) which the adversary can learn from the error-correction information with significant probability. This leads to several new results:

Research paper thumbnail of ChemInform Abstract: Efficient Synthesis of 4-, 5-, and 6-Methyl-2,2′-bipyridine by a Negishi Cross-Coupling Strategy Followed by High-Yield Conversion to Bromo- and Chloromethyl-2-2′-bipyridines

Research paper thumbnail of Classical Cryptographic Protocols in a Quantum World

Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a cr... more Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If we accept that quantum information processing is the most realistic model of physically feasible computation, then we must ask: what classical protocols remain secure against

Research paper thumbnail of Renal Abnormalities in Beckwith-Wiedemann Syndrome Are Associated with 11p15.5 Uniparental Disomy

Beckwith-Wiedemann syndrome (BWS) is a somatic overgrowth syndrome characterized by a variable in... more Beckwith-Wiedemann syndrome (BWS) is a somatic overgrowth syndrome characterized by a variable incidence of congenital anomalies, including hemihyperplasia and renal malformations. BWS is associated with disruption of genomic imprinting and/or mutations in one or more genes encoded on 11p15.5, including CDKN1C (p57 KIP2 ). It was hypothesized that genotypic and epigenotypic abnormalities of the 11p15.5 region affecting CDKN1C were associated

Research paper thumbnail of Framework and partnerships: Ensuring sustainable marine tourism in the Great Barrier Reef

Ensuring the sustainability of marine tourism in the Great Barrier Reef Marine Park (the Marine P... more Ensuring the sustainability of marine tourism in the Great Barrier Reef Marine Park (the Marine Park) combines a comprehensive regulatory framework with a strong industry- government partnership. The Great Barrier Reef Marine Park Authority (GBRMPA) is responsible for the management, care and development of the Marine Park through the Great Barrier Reef Marine Park Act and Regulations. A reef wide

Research paper thumbnail of Nest site characteristics and nest success in red grouse Lagopus lagopus scoticus

Nest site characteristics and nest success in red grouse Lagopus lagopus scoticus. -Wildl. Biol. ... more Nest site characteristics and nest success in red grouse Lagopus lagopus scoticus. -Wildl. Biol. 8: 169-174.

Research paper thumbnail of Secure multi-party quantum computation

Proceedings of the thiry-fourth annual ACM symposium on Theory of computing - STOC '02, 2002

Secure multi-party computing, also called secure function evaluation, has been extensively studie... more Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation with quantum inputs and circuits. Our protocols are information-theoretically secure, i.e. no assumptions are made on the computational power of the adversary. For the weaker task of verifiable quantum secret sharing, we give a protocol which tolerates any t < n/4 cheating parties (out of n). This is shown to be optimal. We use this new tool to show how to perform any multi-party quantum computation as long as the number of dishonest players is less than n/6.

Research paper thumbnail of Grounded Ship Leaves TBT-based Antifoulant on the Great Barrier Reef: An Overview of the Environmental Response

Spill Science & Technology Bulletin, 2002

Research paper thumbnail of Myths and Memories of the Nation

Revista de História, 2001

enômeno histórico de abrangência mundial e inscrito na longa duração, o problema nacional tem sid... more enômeno histórico de abrangência mundial e inscrito na longa duração, o problema nacional tem sido, pelo menos nos últimos cinqüenta anos, contemplado pelas preocupações de uma vasta gama de especialistas, que inclui historiadores, sociólogos, atropólogos, filósofos, geógrafos e psicólogos. Da extrema diversidade de abordagens investigativas propostas -concretizadas em enfoques genéricos, estudos de caso relativamente restritos ou estudos comparativos, todos às voltas com a permanente tensão entre geral e particular -resulta um conjunto nem sempre fácil de ser compreendido enquanto tal, o que por vezes induz à estagnação conceitual e à dificuldade de se propor categorias teóricas adequadas a realidades históricas precisas.

Research paper thumbnail of Political Self in Modern Democracy: Individual Liberty and Personal Rights versus Republican Virtue and Communitarian Responsiveness. In: "Self and Society", The Central European Pragmatist Forum Vol. 4, Edited by John Ryder and Alexander Kremer, Value Inquiry Book Series, Rodopi Press, (forthcom...

Research paper thumbnail of Strong Lower Bounds for Approximating Distribution Support Size and the Distinct Elements Problem

SIAM Journal on Computing, 2009

We consider the problem of approximating the support size of a distribution from a small number o... more We consider the problem of approximating the support size of a distribution from a small number of samples, when each element in the distribution appears with probability at least 1 n . This problem is closely related to the problem of approximating the number of distinct elements in a sequence of length n. For both problems, we prove a nearly linear in n lower bound on the query complexity, applicable even for approximation with additive error.

Research paper thumbnail of Towards the Virtual City: VR & Internet GIS for Urban Planning

Dodge, M and Doyle, S and Hudson-Smith, A and Fleetwood, S (1998) Towards the Virtual City: VR &a... more Dodge, M and Doyle, S and Hudson-Smith, A and Fleetwood, S (1998) Towards the Virtual City: VR &amp;amp;amp;amp; Internet GIS for Urban Planning. In:(Proceedings) Virtual Reality and Geographical Information Systems Workshop, Birkbeck College.: London.

Research paper thumbnail of Relationship between demographics and dietary specificity of imperial eagles in Kazakhstan

Research paper thumbnail of Planning, environmental impact management and compliance on the Great Barrier Reef

The Great Barrier Reef Marine Park is a multiple use marine protected area of some 343,500 km2. A... more The Great Barrier Reef Marine Park is a multiple use marine protected area of some 343,500 km2. Activity is controlled by legislation, spatial plans and permits. Spatial plans are of three types. Zoning Plans cover the entire Marine Park and are the primary control on use. Management Plans apply to smaller areas or to species requiring special protection. Management Plans

Research paper thumbnail of Efficient and Non-Interactive Non-Malleable Commitment

Theory and Application of Cryptographic Techniques, 2000

We present new constructions of non-malleable commitment schemes, in the public parameter model (... more We present new constructions of non-malleable commitment schemes, in the public parameter model (where a trusted party makes parameters available to all parties), based on the discrete logarithm or RSA assumptions. The main features of our schemes are: they achieve near-optimal communication for arbitrarily-large messages and are non- interactive. Previous schemes either required (several rounds of) interac- tion or focused

Research paper thumbnail of Producing Irrigated Winter Wheat

Research paper thumbnail of ASN. 1: An XML Alternative for Performance and Security

Research paper thumbnail of Detectable byzantine agreement secure against faulty majorities

Proceedings of the twenty-first annual symposium on Principles of distributed computing - PODC '02, 2002

It is well-known that n players, connected only by pairwise secure channels, can achieve Byzantin... more It is well-known that n players, connected only by pairwise secure channels, can achieve Byzantine agreement only if the number t of cheaters satisfies t < n/3, even with respect to computa-tional security. However, for many applications it is sufficient to achieve detectable broadcast. ...

Research paper thumbnail of ERS SAR interferometry of an erupting volcano on a tropical island: Soufriere Hills volcano, Montserrat

IEEE 1999 International Geoscience and Remote Sensing Symposium. IGARSS'99 (Cat. No.99CH36293), 1999

SAR interferometry can, potentially, supply two types of useful information relevant to the 1995-... more SAR interferometry can, potentially, supply two types of useful information relevant to the 1995-99 eruption of Soufriere Hills Volcano, Montserrat: (i) the topography of the growing lava dome and its apron of pyroclastic flows, and (ii) the surface deformation of the volcano due to magma movement within. Phase information from ERS SAR data collected from July 1997 to November 1998

Research paper thumbnail of Management Information Base for the Differentiated Services Architecture

This memo describes an SMIv2 (Structure of Management Information version 2) MIB for a device imp... more This memo describes an SMIv2 (Structure of Management Information version 2) MIB for a device implementing the Differentiated Services Architecture. It may be used both for monitoring and configuration of a router or switch capable of Differentiate d Services functionality .

Research paper thumbnail of Correcting errors without leaking partial information

Proceedings of the thirty-seventh annual ACM symposium on Theory of computing - STOC '05, 2005

This paper explores what kinds of information two parties must communicate in order to correct er... more This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W . Any bits they communicate must leak a significant amount of information about W -that is, from the adversary's point of view, the entropy of W will drop significantly. Nevertheless, we construct schemes with which Alice and Bob can prevent an adversary from learning any useful information about W . Specifically, if the entropy of W is sufficiently high, then there is no function f (W ) which the adversary can learn from the error-correction information with significant probability. This leads to several new results:

Research paper thumbnail of ChemInform Abstract: Efficient Synthesis of 4-, 5-, and 6-Methyl-2,2′-bipyridine by a Negishi Cross-Coupling Strategy Followed by High-Yield Conversion to Bromo- and Chloromethyl-2-2′-bipyridines

Research paper thumbnail of Classical Cryptographic Protocols in a Quantum World

Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a cr... more Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If we accept that quantum information processing is the most realistic model of physically feasible computation, then we must ask: what classical protocols remain secure against

Research paper thumbnail of Renal Abnormalities in Beckwith-Wiedemann Syndrome Are Associated with 11p15.5 Uniparental Disomy

Beckwith-Wiedemann syndrome (BWS) is a somatic overgrowth syndrome characterized by a variable in... more Beckwith-Wiedemann syndrome (BWS) is a somatic overgrowth syndrome characterized by a variable incidence of congenital anomalies, including hemihyperplasia and renal malformations. BWS is associated with disruption of genomic imprinting and/or mutations in one or more genes encoded on 11p15.5, including CDKN1C (p57 KIP2 ). It was hypothesized that genotypic and epigenotypic abnormalities of the 11p15.5 region affecting CDKN1C were associated

Research paper thumbnail of Framework and partnerships: Ensuring sustainable marine tourism in the Great Barrier Reef

Ensuring the sustainability of marine tourism in the Great Barrier Reef Marine Park (the Marine P... more Ensuring the sustainability of marine tourism in the Great Barrier Reef Marine Park (the Marine Park) combines a comprehensive regulatory framework with a strong industry- government partnership. The Great Barrier Reef Marine Park Authority (GBRMPA) is responsible for the management, care and development of the Marine Park through the Great Barrier Reef Marine Park Act and Regulations. A reef wide

Research paper thumbnail of Nest site characteristics and nest success in red grouse Lagopus lagopus scoticus

Nest site characteristics and nest success in red grouse Lagopus lagopus scoticus. -Wildl. Biol. ... more Nest site characteristics and nest success in red grouse Lagopus lagopus scoticus. -Wildl. Biol. 8: 169-174.

Research paper thumbnail of Secure multi-party quantum computation

Proceedings of the thiry-fourth annual ACM symposium on Theory of computing - STOC '02, 2002

Secure multi-party computing, also called secure function evaluation, has been extensively studie... more Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation with quantum inputs and circuits. Our protocols are information-theoretically secure, i.e. no assumptions are made on the computational power of the adversary. For the weaker task of verifiable quantum secret sharing, we give a protocol which tolerates any t < n/4 cheating parties (out of n). This is shown to be optimal. We use this new tool to show how to perform any multi-party quantum computation as long as the number of dishonest players is less than n/6.

Research paper thumbnail of Grounded Ship Leaves TBT-based Antifoulant on the Great Barrier Reef: An Overview of the Environmental Response

Spill Science & Technology Bulletin, 2002

Research paper thumbnail of Myths and Memories of the Nation

Revista de História, 2001

enômeno histórico de abrangência mundial e inscrito na longa duração, o problema nacional tem sid... more enômeno histórico de abrangência mundial e inscrito na longa duração, o problema nacional tem sido, pelo menos nos últimos cinqüenta anos, contemplado pelas preocupações de uma vasta gama de especialistas, que inclui historiadores, sociólogos, atropólogos, filósofos, geógrafos e psicólogos. Da extrema diversidade de abordagens investigativas propostas -concretizadas em enfoques genéricos, estudos de caso relativamente restritos ou estudos comparativos, todos às voltas com a permanente tensão entre geral e particular -resulta um conjunto nem sempre fácil de ser compreendido enquanto tal, o que por vezes induz à estagnação conceitual e à dificuldade de se propor categorias teóricas adequadas a realidades históricas precisas.

Research paper thumbnail of Political Self in Modern Democracy: Individual Liberty and Personal Rights versus Republican Virtue and Communitarian Responsiveness. In: "Self and Society", The Central European Pragmatist Forum Vol. 4, Edited by John Ryder and Alexander Kremer, Value Inquiry Book Series, Rodopi Press, (forthcom...

Research paper thumbnail of Strong Lower Bounds for Approximating Distribution Support Size and the Distinct Elements Problem

SIAM Journal on Computing, 2009

We consider the problem of approximating the support size of a distribution from a small number o... more We consider the problem of approximating the support size of a distribution from a small number of samples, when each element in the distribution appears with probability at least 1 n . This problem is closely related to the problem of approximating the number of distinct elements in a sequence of length n. For both problems, we prove a nearly linear in n lower bound on the query complexity, applicable even for approximation with additive error.

Research paper thumbnail of Towards the Virtual City: VR & Internet GIS for Urban Planning

Dodge, M and Doyle, S and Hudson-Smith, A and Fleetwood, S (1998) Towards the Virtual City: VR &a... more Dodge, M and Doyle, S and Hudson-Smith, A and Fleetwood, S (1998) Towards the Virtual City: VR &amp;amp;amp;amp; Internet GIS for Urban Planning. In:(Proceedings) Virtual Reality and Geographical Information Systems Workshop, Birkbeck College.: London.