1,079 research outputs found
What's in a crowd? Analysis of face-to-face behavioral networks
The availability of new data sources on human mobility is opening new avenues
for investigating the interplay of social networks, human mobility and
dynamical processes such as epidemic spreading. Here we analyze data on the
time-resolved face-to-face proximity of individuals in large-scale real-world
scenarios. We compare two settings with very different properties, a scientific
conference and a long-running museum exhibition. We track the behavioral
networks of face-to-face proximity, and characterize them from both a static
and a dynamic point of view, exposing important differences as well as striking
similarities. We use our data to investigate the dynamics of a
susceptible-infected model for epidemic spreading that unfolds on the dynamical
networks of human proximity. The spreading patterns are markedly different for
the conference and the museum case, and they are strongly impacted by the
causal structure of the network data. A deeper study of the spreading paths
shows that the mere knowledge of static aggregated networks would lead to
erroneous conclusions about the transmission paths on the dynamical networks
Where are we now? A large benchmark study of recent symbolic regression methods
In this paper we provide a broad benchmarking of recent genetic programming
approaches to symbolic regression in the context of state of the art machine
learning approaches. We use a set of nearly 100 regression benchmark problems
culled from open source repositories across the web. We conduct a rigorous
benchmarking of four recent symbolic regression approaches as well as nine
machine learning approaches from scikit-learn. The results suggest that
symbolic regression performs strongly compared to state-of-the-art gradient
boosting algorithms, although in terms of running times is among the slowest of
the available methodologies. We discuss the results in detail and point to
future research directions that may allow symbolic regression to gain wider
adoption in the machine learning community.Comment: 8 pages, 4 figures. GECCO 201
Logic of fusion
The starting point of this work is the observation that the Curry-Howard
isomorphism, relating types and propositions, programs and proofs, composition
and cut, extends to the correspondence of program fusion and cut elimination.
This simple idea suggests logical interpretations of some of the basic methods
of generic and transformational programming. In the present paper, we provide a
logical analysis of the general form of build fusion, also known as
deforestation, over the inductive and the coinductive datatypes, regular or
nested. The analysis is based on a novel logical interpretation of
parametricity in terms of the paranatural transformations, introduced in the
paper.Comment: 17 pages, 6 diagrams; Andre Scedrov FestSchrif
Web Password Recovery:A Necessary Evil?
Web password recovery, enabling a user who forgets their password to
re-establish a shared secret with a website, is very widely implemented.
However, use of such a fall-back system brings with it additional
vulnerabilities to user authentication. This paper provides a framework within
which such systems can be analysed systematically, and uses this to help gain a
better understanding of how such systems are best implemented. To this end, a
model for web password recovery is given, and existing techniques are
documented and analysed within the context of this model. This leads naturally
to a set of recommendations governing how such systems should be implemented to
maximise security. A range of issues for further research are also highlighted.Comment: v2. Revised versio
A framework for analyzing RFID distance bounding protocols
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated by this need, we introduce a unied framework that aims to improve analysis and design of distance bounding protocols. Our framework includes a thorough terminology about the frauds, adversary, and prover, thus disambiguating many misleading terms. It also explores the adversary's capabilities and strategies, and addresses the impact of the prover's ability to tamper with his device. It thus introduces some new concepts in the distance bounding domain as the black-box and white-box models, and the relation between the frauds with respect to these models. The relevancy and impact of the framework is nally demonstrated on a study case: Munilla-Peinado distance bounding protocol
A Survey on Routing in Anonymous Communication Protocols
The Internet has undergone dramatic changes in the past 15 years, and now forms a global communication platform that billions of users rely on for their daily activities. While this transformation has brought tremendous benefits to society, it has also created new threats to online privacy, ranging from profiling of users for monetizing personal information to nearly omnipotent governmental surveillance. As a result, public interest in systems for anonymous communication has drastically increased. Several such systems have been proposed in the literature, each of which offers anonymity guarantees in different scenarios and under different assumptions, reflecting the plurality of approaches for how messages can be anonymously routed to their destination. Understanding this space of competing approaches with their different guarantees and assumptions is vital for users to understand the consequences of different design options. In this work, we survey previous research on designing, developing, and deploying systems for anonymous communication. To this end, we provide a taxonomy for clustering all prevalently considered approaches (including Mixnets, DC-nets, onion routing, and DHT-based protocols) with respect to their unique routing characteristics, deployability, and performance. This, in particular, encompasses the topological structure of the underlying network; the routing information that has to be made available to the initiator of the conversation; the underlying communication model; and performance-related indicators such as latency and communication layer. Our taxonomy and comparative assessment provide important insights about the differences between the existing classes of anonymous communication protocols, and it also helps to clarify the relationship between the routing characteristics of these protocols, and their performance and scalability
Linear Time Logic Control of Discrete-Time Linear Systems
The control of complex systems poses new challenges that fall beyond the traditional methods of control theory. One of these challenges is given by the need to control, coordinate and synchronize the operation of several interacting submodules within a system. The desired objectives are no longer captured by usual control specifications such as stabilization or output regulation. Instead, we consider specifications given by linear temporal logic (LTL) formulas. We show that existence of controllers for discrete-time controllable linear systems and LTL specifications can be decided and that such controllers can be effectively computed. The closed-loop system is of hybrid nature, combining the original continuous dynamics with the automatically synthesized switching logic required to enforce the specification
A Verified Information-Flow Architecture
SAFE is a clean-slate design for a highly secure computer system, with
pervasive mechanisms for tracking and limiting information flows. At the lowest
level, the SAFE hardware supports fine-grained programmable tags, with
efficient and flexible propagation and combination of tags as instructions are
executed. The operating system virtualizes these generic facilities to present
an information-flow abstract machine that allows user programs to label
sensitive data with rich confidentiality policies. We present a formal,
machine-checked model of the key hardware and software mechanisms used to
dynamically control information flow in SAFE and an end-to-end proof of
noninterference for this model.
We use a refinement proof methodology to propagate the noninterference
property of the abstract machine down to the concrete machine level. We use an
intermediate layer in the refinement chain that factors out the details of the
information-flow control policy and devise a code generator for compiling such
information-flow policies into low-level monitor code. Finally, we verify the
correctness of this generator using a dedicated Hoare logic that abstracts from
low-level machine instructions into a reusable set of verified structured code
generators
Negotiating nursing
Negotiating nursing explores how the Queen Alexandra's Imperial Military Nursing Service (Q.A.s) salvaged men within the sensitive gender negotiations of what should and could constitute nursing work and where that work could occur. The book argues that the Q.A.s, an entirely female force during the Second World War, were essential to recovering men physically, emotionally and spiritually from the battlefield and for the war, despite concerns about their presence on the frontline. The book maps the developments in nurses’ work as the Q.A.s created a legitimate space for themselves in war zones and established nurses’ position as the expert at the bedside. Using a range of personal testimony the book demonstrates how the exigencies of war demanded nurses alter the methods of nursing practice and the professional boundaries in which they had traditionally worked, in order to care for their soldier-patients in the challenging environments of a war zone. Although they may have transformed practice, their position in war was highly gendered and it was gender in the post-war era that prevented their considerable skills from being transferred to the new welfare state, as the women of Britain were returned to the home and hearth. The aftermath of war may therefore have augured professional disappointment for some nursing sisters, yet their contribution to nursing knowledge and practice was, and remains, significant
- …