24,338 research outputs found
A Model for Donation Verification
In this paper, we introduce a model for donation verification. A randomized
algorithm is developed to check if the money claimed being received by the
collector is -approximation to the total amount money contributed
by the donors. We also derive some negative results that show it is impossible
to verify the donations under some circumstances
Recommended from our members
Mindfulness Meditation Activates Altruism.
Clinical evidence suggests that mindfulness meditation reduces anxiety, depression, and stress, and improves emotion regulation due to modulation of activity in neural substrates linked to the regulation of emotions and social preferences. However, less was known about whether mindfulness meditation might alter pro-social behavior. Here we examined whether mindfulness meditation activates human altruism, a component of social cooperation. Using a simple donation game, which is a real-world version of the Dictator's Game, we randomly assigned 326 subjects to a mindfulness meditation online session or control and measured their willingness to donate a portion of their payment for participation as a charitable donation. Subjects who underwent the meditation treatment donated at a 2.61 times higher rate than the control (p = 0.005), after controlling for socio-demographics. We also found a larger treatment effect of meditation among those who did not go to college (p < 0.001) and those who were under 25 years of age (p < 0.001), with both subject groups contributing virtually nothing in the control condition. Our results imply high context modularity of human altruism and the development of intervention approaches including mindfulness meditation to increase social cooperation, especially among subjects with low baseline willingness to contribute
Anonymity and Information Hiding in Multiagent Systems
We provide a framework for reasoning about information-hiding requirements in
multiagent systems and for reasoning about anonymity in particular. Our
framework employs the modal logic of knowledge within the context of the runs
and systems framework, much in the spirit of our earlier work on secrecy
[Halpern and O'Neill 2002]. We give several definitions of anonymity with
respect to agents, actions, and observers in multiagent systems, and we relate
our definitions of anonymity to other definitions of information hiding, such
as secrecy. We also give probabilistic definitions of anonymity that are able
to quantify an observer s uncertainty about the state of the system. Finally,
we relate our definitions of anonymity to other formalizations of anonymity and
information hiding, including definitions of anonymity in the process algebra
CSP and definitions of information hiding using function views.Comment: Replacement. 36 pages. Full version of CSFW '03 paper, submitted to
JCS. Made substantial changes to Section 6; added references throughou
Abstract Model Counting: A Novel Approach for Quantification of Information Leaks
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10We present a novel method for Quantitative Information Flow analysis. We show how the problem of computing information leakage can be viewed as an extension of the Satisfiability Modulo Theories (SMT) problem. This view enables us to develop a framework for QIF analysis based on the framework DPLL(T) used in SMT solvers. We then show that the methodology of Symbolic Execution (SE) also fits our framework. Based on these ideas, we build two QIF analysis tools: the first one employs CBMC, a bounded model checker for ANSI C, and the second one is built on top of Symbolic PathFinder, a Symbolic Executor for Java. We use these tools to quantify leaks in industrial code such as C programs from the Linux kernel, a Java tax program from the European project HATS, and anonymity protocol
- …