3,526 research outputs found
The game semantics of game theory
We use a reformulation of compositional game theory to reunite game theory
with game semantics, by viewing an open game as the System and its choice of
contexts as the Environment. Specifically, the system is jointly controlled by
noncooperative players, each independently optimising a real-valued
payoff. The goal of the system is to play a Nash equilibrium, and the goal of
the environment is to prevent it. The key to this is the realisation that
lenses (from functional programming) form a dialectica category, which have an
existing game-semantic interpretation.
In the second half of this paper, we apply these ideas to build a compact
closed category of `computable open games' by replacing the underlying
dialectica category with a wave-style geometry of interaction category,
specifically the Int-construction applied to the cartesian monoidal category of
directed-complete partial orders
Privacy Against Statistical Inference
We propose a general statistical inference framework to capture the privacy
threat incurred by a user that releases data to a passive but curious
adversary, given utility constraints. We show that applying this general
framework to the setting where the adversary uses the self-information cost
function naturally leads to a non-asymptotic information-theoretic approach for
characterizing the best achievable privacy subject to utility constraints.
Based on these results we introduce two privacy metrics, namely average
information leakage and maximum information leakage. We prove that under both
metrics the resulting design problem of finding the optimal mapping from the
user's data to a privacy-preserving output can be cast as a modified
rate-distortion problem which, in turn, can be formulated as a convex program.
Finally, we compare our framework with differential privacy.Comment: Allerton 2012, 8 page
Markov modeling of moving target defense games
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework allows modeling of broad range of MTD strategies, provides general theorems about how the probability of a successful adversary defeating an MTD strategy is related to the amount of time/cost spent by the adversary, and shows how a multi-level composition of MTD strategies can be analyzed by a straightforward combination of the analysis for each one of these strategies. Within the proposed framework we define the concept of security capacity which measures the strength or effectiveness of an MTD strategy: the security capacity depends on MTD specific parameters and more general system parameters. We apply our framework to two concrete MTD strategies
What's Right With a Syntactic Approach to Theories and Models?
Syntactic approaches in the philosophy of science, which are based on formalizations in predicate logic, are often considered in principle inferior to semantic approaches, which are based on formalizations with the help of structures. To compare the two kinds of approach, I identify some ambiguities in common semantic accounts and explicate the concept of a structure in a way that avoids hidden references to a specific vocabulary. From there, I argue that contrary to common opinion (i) unintended models do not pose a significant problem for syntactic approaches to scientific theories, (ii) syntactic approaches can be at least as language independent as semantic ones, and (iii) in syntactic approaches, scientific theories can be as well connected to the world as in semantic ones. Based on these results, I argue that syntactic and semantic approaches fare equally well when it comes to (iv) ease of application, (iv) accommodating the use of models in the sciences, and (vi) capturing the theory-observation relation
Better Late than Never: Information Retrieval from Black Holes
We show that, in order to preserve the equivalence principle until late times
in unitarily evaporating black holes, the thermodynamic entropy of a black hole
must be primarily entropy of entanglement across the event horizon. For such
black holes, we show that the information entering a black hole becomes encoded
in correlations within a tripartite quantum state, the quantum analogue of a
one-time pad, and is only decoded into the outgoing radiation very late in the
evaporation. This behavior generically describes the unitary evaporation of
highly entangled black holes and requires no specially designed evolution. Our
work suggests the existence of a matter-field sum rule for any fundamental
theory.Comment: Change of title to reflect information return. The physics of
"energetic curtains" remains unchange
- …