http://en.wikipedia.org/wiki/Noetic_theory Study of the mind, read it from “The Lost Symbol” by Dan Brown. I like the idea that what we think can affect our environment. For example, if we are confident, then people around us will believe. However, if we are indecisive, they will sense it and doubt us.
This is my old master’s research page, recompiled. Original post could still be accessed here. -firstname.lastname@example.org Danny Wuysang. MSCS student Algorithms and Complexity Lab Department of Computer Science University of the Philippines Diliman research interest E-VOTING, FORMAL VERIFICATION, COMPUTER SECURITY, THEORETICAL COMPUTER SCIENCE electronic voting references SYSTEMS I started my research in e-voting reading papers on e-voting systems. These are the few that caught my attention. If you are interested in doing research on e-voting, these papers serve well as a starting point, then just follow the references and browse for other systems. I might add more as I stumble on interesting ones in the
CRS Report for Congress, Order Code RL32114, updated January 29, 2008, by Clay Wilson (Specialist in Technology and National Security of Foreign Affairs, Defense, and Trade Division), phew… is entitled “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress” . I will proceed to describe the report, and provide comments, according to its title. On Botnets. Bot Networks (Botnets) are networks of computers that are enslaved by the botmasters, this is done my infecting the computers with malicious codes, such that they can be controlled remotely. Users of the machines that are part of the botnets doesn’t necessarily know that their computers are infected.
In the lecture entitled “Reflection on Trusting Trust” , Ken Thompson raises the issue of trusting a software to be free of malicious code. He started by describing two simple programs, a self-reproducing program and a learning program. These two concepts were then used to build a UNIX login program that contains a Trojan horse. The program, which allows access to the system as any user, writes itself into the compiler (self-reproducing), then removes trace of the deliberate bug (learning). This untrusted code, demonstrated to be easy to produce, will be hard to detect, even becomes more difficult if written using lower level languages (demo