430,349 research outputs found

    Enabling computation of correlation bounds for finite-dimensional quantum systems via symmetrisation

    Full text link
    We present a technique for reducing the computational requirements by several orders of magnitude in the evaluation of semidefinite relaxations for bounding the set of quantum correlations arising from finite-dimensional Hilbert spaces. The technique, which we make publicly available through a user-friendly software package, relies on the exploitation of symmetries present in the optimisation problem to reduce the number of variables and the block sizes in semidefinite relaxations. It is widely applicable in problems encountered in quantum information theory and enables computations that were previously too demanding. We demonstrate its advantages and general applicability in several physical problems. In particular, we use it to robustly certify the non-projectiveness of high-dimensional measurements in a black-box scenario based on self-tests of dd-dimensional symmetric informationally complete POVMs.Comment: A. T. and D. R. contributed equally for this projec

    How inter-firm networks influence the development of agglomerations

    Get PDF
    Non-market interactions are increasingly regarded as key explanations for spatial concentration. Consistently, both innovation and local knowledge spillovers play a central role in recent theories of agglomeration. According to these theories, exchange of localised knowledge gives firms an innovative advantage which results in better economic performance. However, it has turned out to be difficult to open the black box of economies of scale using empirical tests.\ud Since interactions get considerable attention in recent agglomeration theory, social network methods and theory are promising approaches to research spatial agglomerations. Even more so because simultaneously, there is an increasing emphasis on interfirm ties in the network field.\ud The goal of our research is to explore how interfirm networks influence the development of agglomerations. Firstly we provide a review on network and innovation literature in the field of spatial clusters. Secondly, we discuss measurement issues related to networks and innovation and ways to overcome them. Finally, we present preliminary results of our network study among high tech firms in the Dutch region of Twente

    Did You Remember to Test Your Tokens?

    Get PDF
    Authentication is a critical security feature for confirming the identity of a system's users, typically implemented with help from frameworks like Spring Security. It is a complex feature which should be robustly tested at all stages of development. Unit testing is an effective technique for fine-grained verification of feature behaviors that is not widely-used to test authentication. Part of the problem is that resources to help developers unit test security features are limited. Most security testing guides recommend test cases in a "black box" or penetration testing perspective. These resources are not easily applicable to developers writing new unit tests, or who want a security-focused perspective on coverage. In this paper, we address these issues by applying a grounded theory-based approach to identify common (unit) test cases for token authentication through analysis of 481 JUnit tests exercising Spring Security-based authentication implementations from 53 open source Java projects. The outcome of this study is a developer-friendly unit testing guide organized as a catalog of 53 test cases for token authentication, representing unique combinations of 17 scenarios, 40 conditions, and 30 expected outcomes learned from the data set in our analysis. We supplement the test guide with common test smells to avoid. To verify the accuracy and usefulness of our testing guide, we sought feedback from selected developers, some of whom authored unit tests in our dataset.Comment: In 17th International Conference on Mining Software Repositories (MSR) 2020, Technical Track, Virtual. 11 page
    • …
    corecore