119,997 research outputs found

    Does Looking Inside a Circuit Help?

    Get PDF
    The Black-Box Hypothesisstates that any property of Boolean functions decided efficiently (e.g., in BPP) with inputs represented by circuits can also be decided efficiently in the black-box setting, where an algorithm is given an oracle access to the input function and an upper bound on its circuit size. If this hypothesis is true, then P neq NP. We focus on the consequences of the hypothesis being false, showing that (under general conditions on the structure of a counterexample) it implies a non-trivial algorithm for CSAT. More specifically, we show that if there is a property F of boolean functions such that F has high sensitivity on some input function f of subexponential circuit complexity (which is a sufficient condition for F being a counterexample to the Black-Box Hypothesis), then CSAT is solvable by a subexponential-size circuit family. Moreover, if such a counterexample F is symmetric, then CSAT is in Ppoly. These results provide some evidence towards the conjecture (made in this paper) that the Black-Box Hypothesis is false if and only if CSAT is easy

    How to Bootstrap Anonymous Communication

    Full text link
    We ask whether it is possible to anonymously communicate a large amount of data using only public (non-anonymous) communication together with a small anonymous channel. We think this is a central question in the theory of anonymous communication and to the best of our knowledge this is the first formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short key kk which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include: - Introducing and formally defining anonymous steganography, - A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), - A lower bound on the number of bits which are needed to bootstrap anonymous communication.Comment: 15 page

    “Fine Distinctions” in the Contemporary Law of Insider Trading

    Get PDF
    William Cary’s opinion for the SEC in In re Cady, Roberts & Co. built the foundation on which the modern law of insider trading rests. This paper—a contribution to Columbia Law School’s recent celebration of Cary’s Cady Roberts opinion, explores some of these—particularly the emergence of a doctrine of “reckless” insider trading. Historically, the crucial question is this: how or why did the insider trading prohibition survive the retrenchment that happened to so many other elements of Rule 10b-5? It argues that the Supreme Court embraced the continuing existence of the “abstain or disclose” rule, and tolerated constructive fraud notwithstanding its new-found commitment to federalism—which I call the (fictional) “Cary-Powell compromise”—because it accepted the central premise on which the expressive function of insider trading regulation is based: manifestations of greed and lack of self-restraint among the privileged, especially fiduciaries or those closely related to fiduciaries, threaten to undermine the official identity of the public markets as open and fair. But enough time may have passed that we may have lost sight of the compromise associated with this fiction and started acting as if insider trading really is the worst kind of deceit. The result is pressure on doctrine to expand, using anything plausible in the 10b-5 toolkit. The aim is to tie this concern more clearly to the uneasy deceptiveness of insider trading, first using somewhat familiar examples such as the debate over whether possession or use is required for liability and the supposed overreach of Rule 10b5-2. Each of these settings brings us back to the centrality of intent, reminding us that the Cary-Powell compromise has in mind a form of purposefulness that is closely tied to greed and opportunism, making insider trading a sui generis form of securities fraud. That takes us to the most jarring recent development in insider trading law, the emergence (particularly in SEC v. Obus) of recklessness as an alternative basis for liability

    Coupled opto-electronic simulation of organic bulk-heterojunction solar cells: parameter extraction and sensitivity analysis

    Full text link
    A general problem arising in computer simulations is the number of material and device parameters, which have to be determined by dedicated experiments and simulation-based parameter extraction. In this study we analyze measurements of the short-circuit current dependence on the active layer thickness and current-voltage curves in poly(3-hexylthiophene):[6,6]-phenyl-C61-butyric acid methyl ester (P3HT:PCBM) based solar cells. We have identified a set of parameter values including dissociation parameters that describe the experimental data. The overall agreement of our model with experiment is good, however a discrepancy in the thickness dependence of the current-voltage curve questions the influence of the electric field in the dissociation process. In addition transient simulations are analyzed which show that a measurement of the turn-off photocurrent can be useful for estimating charge carrier mobilities.Comment: 10 pages, 12 figures, 2 tables, Accepted for publication in Journal of Applied Physic

    \u3cem\u3eChevron\u3c/em\u3e’s Generality Principles

    Get PDF

    O, Miami: How a Festival Infused a City with Poetry

    Get PDF
    After receiving his MFA from FIU in 2008, P. Scott Cunningham launched his own poetry-focused faux-school, the University of Wynwood, which stages colorfully offbeat events in the geographic heart of Miami's art scene, reflecting Cunningham's desire to take contemporary poetry far from its academic comfort zone. What he eventually envisioned moved dramatically beyond the University of Wynwood's playfully unorthodox readings. Spurred on by a Knight Foundation arts grant, Cunningham brainstormed a project which would not only be a "world-class" event in itself, but transformational for Miami writ large. His idea? O, Miami -- a poetry festival as wry in tone and all encompassing in scope as its very name, one which would attempt to, with a nod to Joyce, make poetry general throughout the city. This is a report of the inaugural festival

    The Interpretation-Construction Distinction in Patent Law

    Get PDF
    The ambiguity of claim language is generally considered to be the most important problem in patent law today. Linguistic ambiguity is believed to cause tremendous uncertainty about patent rights. Scholars and judges have accordingly devoted enormous attention to developing better linguistic tools to help courts understand patent claims. In this article, we explain why this diagnosis is fundamentally wrong. Claims are not often ambiguous, and linguistic ambiguity is not a major cause of the uncertainty in patent law today. We shall explain what really causes the uncertainty in patent rights, how the erroneous diagnosis of linguistic ambiguity has led the literature off-track, and what will get us back on track to solving the uncertainty problem

    Kate's Model Verification Tools

    Get PDF
    Kennedy Space Center's Knowledge-based Autonomous Test Engineer (KATE) is capable of monitoring electromechanical systems, diagnosing their errors, and even repairing them when they crash. A survey of KATE's developer/modelers revealed that they were already using a sophisticated set of productivity enhancing tools. They did request five more, however, and those make up the body of the information presented here: (1) a transfer function code fitter; (2) a FORTRAN-Lisp translator; (3) three existing structural consistency checkers to aid in syntax checking their modeled device frames; (4) an automated procedure for calibrating knowledge base admittances to protect KATE's hardware mockups from inadvertent hand valve twiddling; and (5) three alternatives for the 'pseudo object', a programming patch that currently apprises KATE's modeling devices of their operational environments
    • …
    corecore