Petter Sandvik Formal Modelling for Digital Media Distribution

Total Page:16

File Type:pdf, Size:1020Kb

Petter Sandvik Formal Modelling for Digital Media Distribution Petter Sandvik Formal Modelling for Digital Media Distribution Turku Centre for Computer Science TUCS Dissertations No 206, November 2015 Formal Modelling for Digital Media Distribution Petter Sandvik To be presented, with the permission of the Faculty of Science and Engineering at Åbo Akademi University, for public criticism in Auditorium Gamma on November 13, 2015, at 12 noon. Åbo Akademi University Faculty of Science and Engineering Joukahainengatan 3-5 A, 20520 Åbo, Finland 2015 Supervisors Associate Professor Luigia Petre Faculty of Science and Engineering Åbo Akademi University Joukahainengatan 3-5 A, 20520 Åbo Finland Professor Kaisa Sere Faculty of Science and Engineering Åbo Akademi University Joukahainengatan 3-5 A, 20520 Åbo Finland Reviewers Professor Michael Butler Electronics and Computer Science Faculty of Physical Sciences and Engineering University of Southampton Highfield, Southampton SO17 1BJ United Kingdom Professor Gheorghe S, tefănescu Computer Science Department University of Bucharest 14 Academiei Str., Bucharest, RO-010014 Romania Opponent Professor Michael Butler Electronics and Computer Science Faculty of Physical Sciences and Engineering University of Southampton Highfield, Southampton SO17 1BJ United Kingdom ISBN 978-952-12-3294-7 ISSN 1239-1883 To tose who are no longr wit us, and to tose who wil be here afer we are gone i ii Abstract Human beings have always strived to preserve their memories and spread their ideas. In the beginning this was always done through human interpretations, such as telling stories and creating sculptures. Later, technological progress made it possible to create a recording of a phenomenon; first as an analogue recording onto a physical object, and later digitally, as a sequence of bits to be interpreted by a computer. By the end of the 20th century technological advances had made it feasible to distribute media content over a computer network instead of on physical objects, thus enabling the concept of digital media distribution. Many digital media distribution systems already exist, and their continued, and in many cases increasing, usage is an indicator for the high interest in their future enhancements and enriching. By looking at these digital media distribution systems, we have identified three main areas of possible improvement: network structure and coordination, transport of content over the network, and the encoding used for the content. In this thesis, our aim is to show that improvements in performance, efficiency and availability can be done in conjunction with improvements in software quality and reliability through the use of formal methods: mathematical approaches to reasoning about software so that we can prove its correctness, together with the desirable properties. We envision a complete media distribution system based on a distributed architecture, such as peer-to-peer networking, in which different parts of the system have been formally modelled and verified. Starting with the network itself, we show how it can be formally constructed and modularised in the Event-B formalism, such that we can separate the modelling of one node from the modelling of the network itself. We also show how the piece selection algorithm in the BitTorrent peer-to-peer transfer protocol can be adapted for on-demand media streaming, and how this can be modelled in Event-B. Furthermore, we show how modelling one peer in Event-B can give results similar to simulating an entire network of peers. Going further, we introduce a formal specification language for content transfer algorithms, and show that having such a language can make these algorithms easier to understand. We also show how generating Event-B code iii from this language can result in less complexity compared to creating the models from written specifications. We also consider the decoding part of a media distribution system by showing how video decoding can be done in parallel. This is based on formally defined dependencies between frames and blocks in a video sequence; we have shown that also this step can be performed in a way that is mathematically proven correct. Our modelling and proving in this thesis is, in its majority, tool-based. This provides a demonstration of the advance of formal methods as well as their increased reliability, and thus, advocates for their more wide-spread usage in the future. iv Sammanfattning Människor har alltid strävat efter att bevara sina minnen och sprida sina idéer. Till en början gjordes detta alltid genom mänskliga tolkningar, såsom historieberättande eller skapande av skulpturer. Senare gjorde tekniska framsteg det möjligt att göra inspelningar av fenomen; först som en analog inspelning på ett fysiskt föremål, och senare digitalt, som en sekvens bitar att tolkas av en dator. Vid senare halvan av 1990-talet hade tekniken gått så långt framåt att det var realistiskt att distribuera audiovisuell media över ett datornätverk istället för på fysiska föremål, och därmed skapades konceptet digital mediadistribution. Ett flertal digitala mediadistributionssystem existerar redan, och deras fortsatta, och i många fall ökande användning indikerar att det finns ett stort intresse för framtida vidareutveckling och utökning av dylika system. Genom att se på dessa digitala mediadistributionssystem har vi identifierat tre tänkbara områden för förbättring: nätverksstruktur och -koordination, överföring av data över nätverket, och kodningen som används för innehållet. I denna avhandling vill vi visa att förbättringar i prestanda, effektivitet och tillgänglighet kan göras i samförstånd med förbättringar i programvarans kvalitet och pålitlighet genom att använda formella metoder: matematiska tillvägagångssätt för att resonera om mjukvara på så sätt att vi kan bevisa dess korrekthet tillsammans med andra önskvärda egenskaper. Vi föreställer oss ett komplett mediadistributionssystem baserat på en distribuerad arkitektur, såsom peer-to-peer-nätverk, där olika delar av sys- temet har formellt modellerats och verifierats. Börjandes från själva nätverket visar vi hur det kan bli formellt konstruerat och modulariserat i Event-B- formalismen, så att vi kan separera modellerandet av en nod från modelleran- det av nätverket självt. Vi visar också hur den algoritm som används för att välja vilken del av innehållet som ska överföras till näst i BitTorrent- filöverföringsprotokollet kan anpassas för strömmande media, och hur detta kan modelleras i Event-B. Vidare visar vi hur modellerande av en nod i Event-B kan ge liknande resultat som att simulera ett helt nätverk av noder. Vi fortsätter genom att introducera ett formellt specifikationsspråk för dataöverföringsalgoritmer, och visar att genom att ha ett sådant språk kan dessa algoritmer bli enklare att förstå. Vi visar också hur vi kan minska v komplexiteten hos våra modeller genom att generera Event-B-kod från vårt formella specifikationsspråk istället för direkt från skrivna specifikationer. Vårt arbete berör också avkodningssidan av ett mediadistributionssystem genom att visa hur videoavkodning kan ske parallellt. Detta baserar sig på formellt definierade beroenden mellan ramar och block i en videosekvens; vi har visat att även detta steg kan utföras på ett sätt vars korrekthet har bevisats matematiskt. Modelleringen och bevisningen i denna avhandling är huvudsakligen verktygsbaserad. Detta demonstrerar hur formella metoder har framskridit och blivit mer pålitliga, vilket också talar för att deras användning kan få en vidare utbredning i framtiden. vi Acknowledgements First and foremost, I would like to thank my supervisor, Associate Prof. Luigia Petre, with whom I have had the fortune of working together on several different topics during the last few years. I am also very grateful to my other supervisor, the late Prof. Kaisa Sere, who was supportive of my ideas already when I was a master student, and encouraged me to continue towards a PhD. Many thanks also to my opponent, Prof. Michael Butler, for taking the time to thoroughly review my thesis and be the opponent at my defence. Likewise, I am very grateful to Prof. Gheorghe S, tefănescu for his review and constructive criticism of my thesis. I am lucky to have had many wonderful coworkers during my time as a PhD student. Among these are my closest coworkers currently or previously belonging to the Formal Methods and Networks group of the Distributed Systems Lab: Mats Neovius, Maryam Kamali, Mojgan Kamali, as well as Luigia Petre. I am also grateful to Marina Waldén who, among other things, helped me get started with formal modelling. Furthermore I would like to thank Marta Olszewska and Yuliya Prokhorova, both of whom I have been fortunate enough to have as office mates, as well as the other current and former members of the Distributed Systems Lab I have had the pleasure of working with: Pontus Boström, Jonatan Wiik, Fredrik Degerlund, Sergey Ostroumov, Linas Laibinis, Elena Troubitsyna, Anton Tarasyuk, Inna Pereverzeva, Johan Ersfolk, Andrew Edmunds, and Leonidas Tsiopoulos. For improving my time as a PhD student at Åbo Akademi and Turku Centre for Computer Science I am also thankful to the following people: Ion Petre, Bogdan Iancu, Cristian Gratie, Johannes Eriksson, Susanne Ramstedt, Nina Hultholm, Tove Österroos, Christel Engblom, and Tomi Suovuo. I would also like to thank my other co-authors and collaborators: Kristian Lumme and Erik Lumme; Mauno Rönkkö, Mikko Kolehmainen and Markus Stocker at University of Eastern Finland; and Seppo Horsmanheimo at VTT. For the financial support I have received during my time
Recommended publications
  • New York University Annual Survey of American Law New York of American Law University Annual Survey
    nys69-2_cv_nys69-2_cv 9/22/2014 8:41 AM Page 2 (trap 04 plate) Vol. 69 No. 2 Vol. New York University Annual Survey of American Law New York University Annual Survey of American Law New York ARTICLES TOWARD ADEQUACY Sarah L. Brinton SHOULD EVIDENCE OF SETTLEMENT NEGOTIATIONS AFFECT ATTORNEYS’ FEES AWARDS? Seth Katsuya Endo A LOOK INSIDE THE BUTLER’S CUPBOARD: HOW THE EXTERNAL WORLD REVEALS INTERNAL STATE OF MIND IN LEGAL NARRATIVES Cathren Koehlert-Page NOTES EXPERTISE AND IMMIGRATION ADMINISTRATION: WHEN DOES CHEVRON APPLY TO BIA INTERPRETATIONS OF THE INA? Paul Chaffin WHAT MOTIVATES ILLEGAL FILE SHARING? EMPIRICAL AND THEORETICAL APPROACHES Joseph M. Eno 2013 Volume 69 Issue 2 2013 35568-nys_69-2 Sheet No. 1 Side A 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 1 23-OCT-14 9:10 NEW YORK UNIVERSITY ANNUAL SURVEY OF AMERICAN LAW VOLUME 69 ISSUE 2 35568-nys_69-2 Sheet No. 1 Side A 10/28/2014 12:36:12 NEW YORK UNIVERSITY SCHOOL OF LAW ARTHUR T. VANDERBILT HALL Washington Square New York City 35568-nys_69-2 Sheet No. 1 Side B 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 2 23-OCT-14 9:10 New York University Annual Survey of American Law is in its seventy-first year of publication. L.C. Cat. Card No.: 46-30523 ISSN 0066-4413 All Rights Reserved New York University Annual Survey of American Law is published quarterly at 110 West 3rd Street, New York, New York 10012.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Apache TOMCAT
    LVM Data Migration • XU4 Fan Control • OSX USB-UART interfacing Year Two Issue #22 Oct 2015 ODROIDMagazine Apache TOMCAT Your web server and servlet container running on the world’s most power-efficient computing platform Plex Linux Gaming: Emulate Sega’s last Media console, the Dreamcast Server What we stand for. We strive to symbolize the edge of technology, future, youth, humanity, and engineering. Our philosophy is based on Developers. And our efforts to keep close relationships with developers around the world. For that, you can always count on having the quality and sophistication that is the hallmark of our products. Simple, modern and distinctive. So you can have the best to accomplish everything you can dream of. We are now shipping the ODROID-U3 device to EU countries! Come and visit our online store to shop! Address: Max-Pollin-Straße 1 85104 Pförring Germany Telephone & Fax phone: +49 (0) 8403 / 920-920 email: [email protected] Our ODROID products can be found at http://bit.ly/1tXPXwe EDITORIAL his month, we feature two extremely useful servers that run very well on the ODROID platform: Apache Tom- Tcat and Plex Media Server. Apache Tomcat is an open- source web server and servlet container that provides a “pure Java” HTTP web server environment for Java code to run in. It allows you to write complex web applications in Java without needing to learn a specific server language such as .NET or PHP. Plex Media Server organizes your vid- eo, music, and photo collections and streams them to all of your screens.
    [Show full text]
  • Biographies of Computer Scientists
    1 Charles Babbage 26 December 1791 (London, UK) – 18 October 1871 (London, UK) Life and Times Charles Babbage was born into a wealthy family, and started his mathematics education very early. By . 1811, when he went to Trinity College, Cambridge, he found that he knew more mathematics then his professors. He moved to Peterhouse, Cambridge from where he graduated in 1814. However, rather than come second to his friend Herschel in the final examinations, Babbage decided not to compete for an honors degree. In 1815 he co-founded the Analytical Society dedicated to studying continental reforms of Newton's formulation of “The Calculus”. He was one of the founders of the Astronomical Society in 1820. In 1821 Babbage started work on his Difference Engine designed to accurately compile tables. Babbage received government funding to construct an actual machine, but they stopped the funding in 1832 when it became clear that its construction was running well over-budget George Schuetz completed a machine based on the design of the Difference Engine in 1854. On completing the design of the Difference Engine, Babbage started work on the Analytical Engine capable of more general symbolic manipulations. The design of the Analytical Engine was complete in 1856, but a complete machine would not be constructed for over a century. Babbage's interests were wide. It is claimed that he invented cow-catchers for railway engines, the uniform postal rate, a means of recognizing lighthouses. He was also interested in locks and ciphers. He was politically active and wrote many treatises. One of the more famous proposed the banning of street musicians.
    [Show full text]
  • 13 Cool Things You Can Do with Google Chromecast Chromecast
    13 Cool Things You Can Do With Google Chromecast We bet you don't even know half of these Google Chromecast is a popular streaming dongle that makes for an easy and affordable way of throwing content from your smartphone, tablet, or computer to your television wirelessly. There’s so much you can do with it than just streaming Netflix, Hulu, Spotify, HBO and more from your mobile device and computer, to your TV. Our guide on How Does Google Chromecast Work explains more about what the device can do. The seemingly simple, ultraportable plug and play device has a few tricks up its sleeve that aren’t immediately apparent. Here’s a roundup of some of the hidden Chromecast tips and tricks you may not know that can make casting more magical. Chromecast Tips and Tricks You Didn’t Know 1. Enable Guest Mode 2. Make presentations 3. Play plenty of games 4. Cast videos using your voice 5. Stream live feeds from security cameras on your TV 6. Watch Amazon Prime Video on your TV 7. Create a casting queue 8. Cast Plex 9. Plug in your headphones 10. Share VR headset view with others 11. Cast on the go 12. Power on your TV 13. Get free movies and other perks Enable Guest Mode If you have guests over at your home, whether you’re hosting a family reunion, or have a party, you can let them cast their favorite music or TV shows onto your TV, without giving out your WiFi password. To do this, go to the Chromecast settings and enable Guest Mode.
    [Show full text]
  • Digital Fountain Erasure-Recovery in Bittorrent
    UNIVERSITÀ DEGLI STUDI DI BERGAMO Facoltà di Ingegneria Corso di Laurea Specialistica in Ingegneria Informatica Classe n. 35/S – Sistemi Informatici Digital Fountain Erasure Recovery in BitTorrent: integration and security issues Relatore: Chiar.mo Prof. Stefano Paraboschi Correlatore: Chiar.mo Prof. Andrea Lorenzo Vitali Tesi di Laurea Specialistica Michele BOLOGNA Matricola n. 56108 ANNO ACCADEMICO 2007 / 2008 This thesis has been written, typeset and prepared using LATEX 2". Printed on December 5, 2008. Alla mia famiglia “Would you tell me, please, which way I ought to go from here?” “That depends a good deal on where you want to get to,” said the Cat. “I don’t much care where —” said Alice. “Then it doesn’t matter which way you go,” said the Cat. “— so long as I get somewhere,” Alice added as an explanation. “Oh, you’re sure to do that,” said the Cat, “if you only walk enough.” Lewis Carroll Alice in Wonderland Acknowledgments (in Italian) Ci sono molte persone che mi hanno aiutato durante lo svolgimento di questo lavoro. Il primo ringraziamento va ai proff. Stefano Paraboschi e Andrea Vitali per la disponibilità, la competenza, i consigli, la pazienza e l’aiuto tecnico che mi hanno saputo dare. Grazie di avermi dato la maggior parte delle idee che sono poi confluite nella mia tesi. Un sentito ringraziamento anche a Andrea Rota e Ruben Villa per l’aiuto e i chiarimenti che mi hanno gentilmente fornito. Vorrei ringraziare STMicroelectronics, ed in particolare il gruppo Advanced System Technology, per avermi offerto le infrastrutture, gli spa- zi e tutto il necessario per svolgere al meglio il mio periodo di tirocinio.
    [Show full text]
  • Roamio ® Series Viewer's Guide
    ® ® ® ® Viewer’s Guide This Viewer’s Guide describes features of the TiVo® service running on the TiVo Roamio™ family of Digital Video Recorders. Your use of this product is subject to TiVo's User Agreement and Privacy Policy. Visit www.tivo.com/legal for the latest versions. Patented. U.S. pat. nos. at www.tivo.com/patents. © 2016 TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. TiVo, TiVo Roamio, the TiVo logo, QuickMode, OnePass, Season Pass, SkipMode, TiVo Central, WishList, the Jump logo, the Instant Replay logo, the Thumbs Up logo, the Thumbs Down logo, Overtime Scheduler, Overlap Protection, Swivel, the TiVo Circle logo, and the sounds used by the TiVo service are trademarks or registered trademarks of TiVo Inc. or its subsidiaries worldwide, 2160 Gold Street, P.O. Box 2160, San Jose, CA 95002-2160. Amazon, Amazon.com, and the Amazon.com logo are registered trademarks of Amazon.com, Inc. or its affiliates. CableCARD is a trademark of Cable Television Laboratories, Inc. Manufactured under license from Dolby Laboratories. “Dolby” and the Double-D symbol are trademarks of Dolby Laboratories. ® HDMI, the HDMI logo, and High-Definition Multimedia Interface are trademarks or registered trademarks of HDMI Licensing LLC in the United States and other countries. HBO GO is a registered trademark of Home Box Office, Inc. Hulu is a registered trademark of Hulu, LLC. MoCA is a registered trademark of Multimedia over Coax Alliance. Netflix is a registered trademark of Netflix, Inc. Vudu is a registered trademark of Vudu, Inc. YouTube is a trademark of Google Inc.
    [Show full text]
  • Antifragile White Paper Draft 3.Pages
    Piracy as an Antifragile System tech WP 01/2015 July 2015 Executive Summary Attacks on the piracy economy have thus far been unsuccessful. The piracy community has not only shown resilience to these attacks, but has also become more sophisticated and resilient as a result of them. Systems that show this characteristic response to ex- ternal stressors are defined as antifragile. Traditional centralized attacks are not only ineffective against such systems, but are counter-productive. These systems are not impervious to attacks, however. Decentralized attacks that warp the connections between nodes destroy the system from within. Some system-based attacks on piracy have been attempted, but lacked the technology required to be effec- tive. A new technology, CustosTech, built on the Bitcoin blockchain, attacks the system by turning pirates against each other. The technology enables and incentivizes anyone in the world to anonymously act as an informant, disclosing the identity of the first in- fringer – the pirate uploader. This internal decentralized attack breaks the incentive structures governing the uploader-downloader relationship, and thus provides a sus- tainable deterrent to piracy. Table of Contents Introduction to Antifragility 1 Features of Antifragile Systems 1 Piracy as an Antifragile System 2 Sophisticated Pirates 3 Popcorn Time 5 Attacking 5 Antifragile Systems 5 Attacking Piracy 5 Current Approaches 6 New Tools 6 How it Works 7 Conclusion 7 White paper 01/2015 Introduction to Antifragility Antifragility refers to a system that becomes bet- ter, or stronger, in response to shocks or attacks. Nassim Taleb developed the term1 to explain sys- tems that were not only resilient, but also thrived under stress.
    [Show full text]
  • Downloading Copyrighted Materials
    What you need to know before... Downloading Copyrighted Materials Including movies, TV shows, music, digital books, software and interactive games The Facts and Consequences Who monitors peer-to-peer file sharing? What are the consequences at UAF The Motion Picture Association of America for violators of this policy? (MPAA), Home Box Office, and other copyright Student Services at UAF takes the following holders monitor file-sharing on the Internet minimum actions when the policy is violated: for the illegal distribution of their copyrighted 1st Offense: contents. Once identified they issue DMCA Loss of Internet access until issue is resolved. (Digital Millennium Copyright Act) take-down 2nd Offense: notices to the ISP (Internet Service Provider), in Loss of Internet access pending which the University of Alaska is considered as resolution and a $100 fee assessment. one, requesting the infringement be stopped. If 3rd Offense: not stopped, lawsuit against the user is possible. Loss of Internet access pending resolution and a $250 fee assessment. What is UAF’s responsibility? 4th, 5th, 6th Offense: Under the Digital Millennium Copyright Act and Loss of Internet access pending resolution and Higher Education Opportunity Act, university a $500 fee assessment. administrators are obligated to track these infractions and preserve relevent logs in your What are the Federal consequences student record. This means that if your case goes for violators? to court, your record may be subpoenaed as The MPAA, HBO and similar organizations are evidence. Since illegal file sharing also drains becoming more and more aggressive in finding bandwidth, costing schools money and slowing and prosecuting alleged offenders in criminal Internet connections, for students trying to use court.
    [Show full text]
  • Convention Program
    AAEESS 112244tthh CCOONNVVEENNTTIIOONN PPRROOGGRRAAMM May 17 – 20, 2008 RAI International Exhibition & Congress Centre, Amsterdam The AES has launched a new opportunity to recognize 1University of Salford, Salford, Greater student members who author technical papers. The Stu- Manchester, UK dent Paper Award Competition is based on the preprint 2ICW, Ltd., Wrexham, Wales, UK manuscripts accepted for the AES convention. Forty-two student-authored papers were nominated. This paper gives an account of work carried out The excellent quality of the submissions has made the to assess the effects of metallized film selection process both challenging and exhilarating. polypropylene crossover capacitors on key sonic The award-winning student paper will be honored dur- attributes of reproduced sound. The capacitors ing the convention, and the student-authored manuscript under investigation were found to be mechani- will be published in a timely manner in the Journal of the cally resonant within the audio frequency band, Audio Engineering Society. and results obtained from subjective listening Nominees for the Student Paper Award were required tests have shown this to have a measurable to meet the following qualifications: effect on audio delivery. The listening test methodology employed in this study evolved (a) The paper was accepted for presentation at the from initial ABX type tests with set program AES 124th Convention. material to the final A/B tests where trained test (b) The first author was a student when the work was subjects used program material that they were conducted and the manuscript prepared. familiar with. The main findings were that (c) The student author’s affiliation listed in the manu- capacitors used in crossover circuitry can exhibit script is an accredited educational institution.
    [Show full text]
  • I Know What You Streamed Last Night: on the Security and Privacy of Streaming
    Digital Investigation xxx (2018) 1e12 Contents lists available at ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin DFRWS 2018 Europe d Proceedings of the Fifth Annual DFRWS Europe I know what you streamed last night: On the security and privacy of streaming * Alexios Nikas a, Efthimios Alepis b, Constantinos Patsakis b, a University College London, Gower Street, WC1E 6BT, London, UK b Department of Informatics, University of Piraeus, 80 Karaoli & Dimitriou Str, 18534 Piraeus, Greece article info abstract Article history: Streaming media are currently conquering traditional multimedia by means of services like Netflix, Received 3 January 2018 Amazon Prime and Hulu which provide to millions of users worldwide with paid subscriptions in order Received in revised form to watch the desired content on-demand. Simultaneously, numerous applications and services infringing 15 February 2018 this content by sharing it for free have emerged. The latter has given ground to a new market based on Accepted 12 March 2018 illegal downloads which monetizes from ads and custom hardware, often aggregating peers to maximize Available online xxx multimedia content sharing. Regardless of the ethical and legal issues involved, the users of such streaming services are millions and they are severely exposed to various threats, mainly due to poor Keywords: fi Security hardware and software con gurations. Recent attacks have also shown that they may, in turn, endanger Privacy others as well. This work details these threats and presents new attacks on these systems as well as Streaming forensic evidence that can be collected in specific cases. Malware © 2018 Elsevier Ltd. All rights reserved.
    [Show full text]
  • Defense Against the Dark Arts of Copyright Trolling Matthew As G
    Loyola University Chicago, School of Law LAW eCommons Faculty Publications & Other Works 2018 Defense Against the Dark Arts of Copyright Trolling Matthew aS g Jake Haskell Follow this and additional works at: https://lawecommons.luc.edu/facpubs Part of the Civil Procedure Commons, and the Intellectual Property Law Commons Defense Against the Dark Arts of Copyright Trolling Matthew Sag &Jake Haskell * ABSTRACT: In this Article, we offer both a legal and a pragmaticframework for defending against copyright trolls. Lawsuits alleging online copyright infringement by John Doe defendants have accounted for roughly half of all copyright casesfiled in the United States over the past threeyears. In the typical case, the plaintiffs claims of infringement rely on a poorly substantiatedform pleading and are targeted indiscriminately at noninfringers as well as infringers. This practice is a subset of the broaderproblem of opportunistic litigation, but it persists due to certain unique features of copyright law and the technical complexity of Internet technology. The plaintiffs bringing these cases target hundreds or thousands of defendants nationwide and seek quick settlements pricedjust low enough that it is less expensive for the defendant to pay rather than to defend the claim, regardless of the claim's merits. We report new empirical data on the continued growth of this form of copyright trolling in the United States. We also undertake a detailed analysis of the legal andfactual underpinnings of these cases. Despite theirunderlying weakness, plaintiffs have exploited information asymmetries, the high cost of federal court litigation, and the extravagant threat of statutory damages for copyright infringement to leverage settlementsfrom the guilty and the innocent alike.
    [Show full text]