430,349 research outputs found
Enabling computation of correlation bounds for finite-dimensional quantum systems via symmetrisation
We present a technique for reducing the computational requirements by several
orders of magnitude in the evaluation of semidefinite relaxations for bounding
the set of quantum correlations arising from finite-dimensional Hilbert spaces.
The technique, which we make publicly available through a user-friendly
software package, relies on the exploitation of symmetries present in the
optimisation problem to reduce the number of variables and the block sizes in
semidefinite relaxations. It is widely applicable in problems encountered in
quantum information theory and enables computations that were previously too
demanding. We demonstrate its advantages and general applicability in several
physical problems. In particular, we use it to robustly certify the
non-projectiveness of high-dimensional measurements in a black-box scenario
based on self-tests of -dimensional symmetric informationally complete
POVMs.Comment: A. T. and D. R. contributed equally for this projec
How inter-firm networks influence the development of agglomerations
Non-market interactions are increasingly regarded as key explanations for spatial concentration. Consistently, both innovation and local knowledge spillovers play a central role in recent theories of agglomeration. According to these theories, exchange of localised knowledge gives firms an innovative advantage which results in better economic performance. However, it has turned out to be difficult to open the black box of economies of scale using empirical tests.\ud
Since interactions get considerable attention in recent agglomeration theory, social network methods and theory are promising approaches to research spatial agglomerations. Even more so because simultaneously, there is an increasing emphasis on interfirm ties in the network field.\ud
The goal of our research is to explore how interfirm networks influence the development of agglomerations. Firstly we provide a review on network and innovation literature in the field of spatial clusters. Secondly, we discuss measurement issues related to networks and innovation and ways to overcome them. Finally, we present preliminary results of our network study among high tech firms in the Dutch region of Twente
Did You Remember to Test Your Tokens?
Authentication is a critical security feature for confirming the identity of
a system's users, typically implemented with help from frameworks like Spring
Security. It is a complex feature which should be robustly tested at all stages
of development. Unit testing is an effective technique for fine-grained
verification of feature behaviors that is not widely-used to test
authentication. Part of the problem is that resources to help developers unit
test security features are limited. Most security testing guides recommend test
cases in a "black box" or penetration testing perspective. These resources are
not easily applicable to developers writing new unit tests, or who want a
security-focused perspective on coverage.
In this paper, we address these issues by applying a grounded theory-based
approach to identify common (unit) test cases for token authentication through
analysis of 481 JUnit tests exercising Spring Security-based authentication
implementations from 53 open source Java projects. The outcome of this study is
a developer-friendly unit testing guide organized as a catalog of 53 test cases
for token authentication, representing unique combinations of 17 scenarios, 40
conditions, and 30 expected outcomes learned from the data set in our analysis.
We supplement the test guide with common test smells to avoid. To verify the
accuracy and usefulness of our testing guide, we sought feedback from selected
developers, some of whom authored unit tests in our dataset.Comment: In 17th International Conference on Mining Software Repositories
(MSR) 2020, Technical Track, Virtual. 11 page
- …