Adam Smith - Academia.edu (original) (raw)
Papers by Adam Smith
The Great Barrier Reef Marine Park is a multiple use marine protected area of some 343,500 km2. A... more The Great Barrier Reef Marine Park is a multiple use marine protected area of some 343,500 km2. Activity is controlled by legislation, spatial plans and permits. Spatial plans are of three types. Zoning Plans cover the entire Marine Park and are the primary control on use. Management Plans apply to smaller areas or to species requiring special protection. Management Plans
Theory and Application of Cryptographic Techniques, 2000
We present new constructions of non-malleable commitment schemes, in the public parameter model (... more We present new constructions of non-malleable commitment schemes, in the public parameter model (where a trusted party makes parameters available to all parties), based on the discrete logarithm or RSA assumptions. The main features of our schemes are: they achieve near-optimal communication for arbitrarily-large messages and are non- interactive. Previous schemes either required (several rounds of) interac- tion or focused
Proceedings of the twenty-first annual symposium on Principles of distributed computing - PODC '02, 2002
It is well-known that n players, connected only by pairwise secure channels, can achieve Byzantin... more It is well-known that n players, connected only by pairwise secure channels, can achieve Byzantine agreement only if the number t of cheaters satisfies t < n/3, even with respect to computa-tional security. However, for many applications it is sufficient to achieve detectable broadcast. ...
IEEE 1999 International Geoscience and Remote Sensing Symposium. IGARSS'99 (Cat. No.99CH36293), 1999
SAR interferometry can, potentially, supply two types of useful information relevant to the 1995-... more SAR interferometry can, potentially, supply two types of useful information relevant to the 1995-99 eruption of Soufriere Hills Volcano, Montserrat: (i) the topography of the growing lava dome and its apron of pyroclastic flows, and (ii) the surface deformation of the volcano due to magma movement within. Phase information from ERS SAR data collected from July 1997 to November 1998
This memo describes an SMIv2 (Structure of Management Information version 2) MIB for a device imp... more This memo describes an SMIv2 (Structure of Management Information version 2) MIB for a device implementing the Differentiated Services Architecture. It may be used both for monitoring and configuration of a router or switch capable of Differentiate d Services functionality .
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing - STOC '05, 2005
This paper explores what kinds of information two parties must communicate in order to correct er... more This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W . Any bits they communicate must leak a significant amount of information about W -that is, from the adversary's point of view, the entropy of W will drop significantly. Nevertheless, we construct schemes with which Alice and Bob can prevent an adversary from learning any useful information about W . Specifically, if the entropy of W is sufficiently high, then there is no function f (W ) which the adversary can learn from the error-correction information with significant probability. This leads to several new results:
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a cr... more Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If we accept that quantum information processing is the most realistic model of physically feasible computation, then we must ask: what classical protocols remain secure against
Beckwith-Wiedemann syndrome (BWS) is a somatic overgrowth syndrome characterized by a variable in... more Beckwith-Wiedemann syndrome (BWS) is a somatic overgrowth syndrome characterized by a variable incidence of congenital anomalies, including hemihyperplasia and renal malformations. BWS is associated with disruption of genomic imprinting and/or mutations in one or more genes encoded on 11p15.5, including CDKN1C (p57 KIP2 ). It was hypothesized that genotypic and epigenotypic abnormalities of the 11p15.5 region affecting CDKN1C were associated
Ensuring the sustainability of marine tourism in the Great Barrier Reef Marine Park (the Marine P... more Ensuring the sustainability of marine tourism in the Great Barrier Reef Marine Park (the Marine Park) combines a comprehensive regulatory framework with a strong industry- government partnership. The Great Barrier Reef Marine Park Authority (GBRMPA) is responsible for the management, care and development of the Marine Park through the Great Barrier Reef Marine Park Act and Regulations. A reef wide
Nest site characteristics and nest success in red grouse Lagopus lagopus scoticus. -Wildl. Biol. ... more Nest site characteristics and nest success in red grouse Lagopus lagopus scoticus. -Wildl. Biol. 8: 169-174.
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing - STOC '02, 2002
Secure multi-party computing, also called secure function evaluation, has been extensively studie... more Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation with quantum inputs and circuits. Our protocols are information-theoretically secure, i.e. no assumptions are made on the computational power of the adversary. For the weaker task of verifiable quantum secret sharing, we give a protocol which tolerates any t < n/4 cheating parties (out of n). This is shown to be optimal. We use this new tool to show how to perform any multi-party quantum computation as long as the number of dishonest players is less than n/6.
Spill Science & Technology Bulletin, 2002
Revista de História, 2001
enômeno histórico de abrangência mundial e inscrito na longa duração, o problema nacional tem sid... more enômeno histórico de abrangência mundial e inscrito na longa duração, o problema nacional tem sido, pelo menos nos últimos cinqüenta anos, contemplado pelas preocupações de uma vasta gama de especialistas, que inclui historiadores, sociólogos, atropólogos, filósofos, geógrafos e psicólogos. Da extrema diversidade de abordagens investigativas propostas -concretizadas em enfoques genéricos, estudos de caso relativamente restritos ou estudos comparativos, todos às voltas com a permanente tensão entre geral e particular -resulta um conjunto nem sempre fácil de ser compreendido enquanto tal, o que por vezes induz à estagnação conceitual e à dificuldade de se propor categorias teóricas adequadas a realidades históricas precisas.
SIAM Journal on Computing, 2009
We consider the problem of approximating the support size of a distribution from a small number o... more We consider the problem of approximating the support size of a distribution from a small number of samples, when each element in the distribution appears with probability at least 1 n . This problem is closely related to the problem of approximating the number of distinct elements in a sequence of length n. For both problems, we prove a nearly linear in n lower bound on the query complexity, applicable even for approximation with additive error.
Dodge, M and Doyle, S and Hudson-Smith, A and Fleetwood, S (1998) Towards the Virtual City: VR &a... more Dodge, M and Doyle, S and Hudson-Smith, A and Fleetwood, S (1998) Towards the Virtual City: VR &amp;amp;amp; Internet GIS for Urban Planning. In:(Proceedings) Virtual Reality and Geographical Information Systems Workshop, Birkbeck College.: London.
The Great Barrier Reef Marine Park is a multiple use marine protected area of some 343,500 km2. A... more The Great Barrier Reef Marine Park is a multiple use marine protected area of some 343,500 km2. Activity is controlled by legislation, spatial plans and permits. Spatial plans are of three types. Zoning Plans cover the entire Marine Park and are the primary control on use. Management Plans apply to smaller areas or to species requiring special protection. Management Plans
Theory and Application of Cryptographic Techniques, 2000
We present new constructions of non-malleable commitment schemes, in the public parameter model (... more We present new constructions of non-malleable commitment schemes, in the public parameter model (where a trusted party makes parameters available to all parties), based on the discrete logarithm or RSA assumptions. The main features of our schemes are: they achieve near-optimal communication for arbitrarily-large messages and are non- interactive. Previous schemes either required (several rounds of) interac- tion or focused
Proceedings of the twenty-first annual symposium on Principles of distributed computing - PODC '02, 2002
It is well-known that n players, connected only by pairwise secure channels, can achieve Byzantin... more It is well-known that n players, connected only by pairwise secure channels, can achieve Byzantine agreement only if the number t of cheaters satisfies t < n/3, even with respect to computa-tional security. However, for many applications it is sufficient to achieve detectable broadcast. ...
IEEE 1999 International Geoscience and Remote Sensing Symposium. IGARSS'99 (Cat. No.99CH36293), 1999
SAR interferometry can, potentially, supply two types of useful information relevant to the 1995-... more SAR interferometry can, potentially, supply two types of useful information relevant to the 1995-99 eruption of Soufriere Hills Volcano, Montserrat: (i) the topography of the growing lava dome and its apron of pyroclastic flows, and (ii) the surface deformation of the volcano due to magma movement within. Phase information from ERS SAR data collected from July 1997 to November 1998
This memo describes an SMIv2 (Structure of Management Information version 2) MIB for a device imp... more This memo describes an SMIv2 (Structure of Management Information version 2) MIB for a device implementing the Differentiated Services Architecture. It may be used both for monitoring and configuration of a router or switch capable of Differentiate d Services functionality .
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing - STOC '05, 2005
This paper explores what kinds of information two parties must communicate in order to correct er... more This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W . Any bits they communicate must leak a significant amount of information about W -that is, from the adversary's point of view, the entropy of W will drop significantly. Nevertheless, we construct schemes with which Alice and Bob can prevent an adversary from learning any useful information about W . Specifically, if the entropy of W is sufficiently high, then there is no function f (W ) which the adversary can learn from the error-correction information with significant probability. This leads to several new results:
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a cr... more Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If we accept that quantum information processing is the most realistic model of physically feasible computation, then we must ask: what classical protocols remain secure against
Beckwith-Wiedemann syndrome (BWS) is a somatic overgrowth syndrome characterized by a variable in... more Beckwith-Wiedemann syndrome (BWS) is a somatic overgrowth syndrome characterized by a variable incidence of congenital anomalies, including hemihyperplasia and renal malformations. BWS is associated with disruption of genomic imprinting and/or mutations in one or more genes encoded on 11p15.5, including CDKN1C (p57 KIP2 ). It was hypothesized that genotypic and epigenotypic abnormalities of the 11p15.5 region affecting CDKN1C were associated
Ensuring the sustainability of marine tourism in the Great Barrier Reef Marine Park (the Marine P... more Ensuring the sustainability of marine tourism in the Great Barrier Reef Marine Park (the Marine Park) combines a comprehensive regulatory framework with a strong industry- government partnership. The Great Barrier Reef Marine Park Authority (GBRMPA) is responsible for the management, care and development of the Marine Park through the Great Barrier Reef Marine Park Act and Regulations. A reef wide
Nest site characteristics and nest success in red grouse Lagopus lagopus scoticus. -Wildl. Biol. ... more Nest site characteristics and nest success in red grouse Lagopus lagopus scoticus. -Wildl. Biol. 8: 169-174.
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing - STOC '02, 2002
Secure multi-party computing, also called secure function evaluation, has been extensively studie... more Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation with quantum inputs and circuits. Our protocols are information-theoretically secure, i.e. no assumptions are made on the computational power of the adversary. For the weaker task of verifiable quantum secret sharing, we give a protocol which tolerates any t < n/4 cheating parties (out of n). This is shown to be optimal. We use this new tool to show how to perform any multi-party quantum computation as long as the number of dishonest players is less than n/6.
Spill Science & Technology Bulletin, 2002
Revista de História, 2001
enômeno histórico de abrangência mundial e inscrito na longa duração, o problema nacional tem sid... more enômeno histórico de abrangência mundial e inscrito na longa duração, o problema nacional tem sido, pelo menos nos últimos cinqüenta anos, contemplado pelas preocupações de uma vasta gama de especialistas, que inclui historiadores, sociólogos, atropólogos, filósofos, geógrafos e psicólogos. Da extrema diversidade de abordagens investigativas propostas -concretizadas em enfoques genéricos, estudos de caso relativamente restritos ou estudos comparativos, todos às voltas com a permanente tensão entre geral e particular -resulta um conjunto nem sempre fácil de ser compreendido enquanto tal, o que por vezes induz à estagnação conceitual e à dificuldade de se propor categorias teóricas adequadas a realidades históricas precisas.
SIAM Journal on Computing, 2009
We consider the problem of approximating the support size of a distribution from a small number o... more We consider the problem of approximating the support size of a distribution from a small number of samples, when each element in the distribution appears with probability at least 1 n . This problem is closely related to the problem of approximating the number of distinct elements in a sequence of length n. For both problems, we prove a nearly linear in n lower bound on the query complexity, applicable even for approximation with additive error.
Dodge, M and Doyle, S and Hudson-Smith, A and Fleetwood, S (1998) Towards the Virtual City: VR &a... more Dodge, M and Doyle, S and Hudson-Smith, A and Fleetwood, S (1998) Towards the Virtual City: VR &amp;amp;amp; Internet GIS for Urban Planning. In:(Proceedings) Virtual Reality and Geographical Information Systems Workshop, Birkbeck College.: London.