123,699 research outputs found
How to Work with Honest but Curious Judges? (Preliminary Report)
The three-judges protocol, recently advocated by Mclver and Morgan as an
example of stepwise refinement of security protocols, studies how to securely
compute the majority function to reach a final verdict without revealing each
individual judge's decision. We extend their protocol in two different ways for
an arbitrary number of 2n+1 judges. The first generalisation is inherently
centralised, in the sense that it requires a judge as a leader who collects
information from others, computes the majority function, and announces the
final result. A different approach can be obtained by slightly modifying the
well-known dining cryptographers protocol, however it reveals the number of
votes rather than the final verdict. We define a notion of conditional
anonymity in order to analyse these two solutions. Both of them have been
checked in the model checker MCMAS
A universe of processes and some of its guises
Our starting point is a particular `canvas' aimed to `draw' theories of
physics, which has symmetric monoidal categories as its mathematical backbone.
In this paper we consider the conceptual foundations for this canvas, and how
these can then be converted into mathematical structure. With very little
structural effort (i.e. in very abstract terms) and in a very short time span
the categorical quantum mechanics (CQM) research program has reproduced a
surprisingly large fragment of quantum theory. It also provides new insights
both in quantum foundations and in quantum information, and has even resulted
in automated reasoning software called `quantomatic' which exploits the
deductive power of CQM. In this paper we complement the available material by
not requiring prior knowledge of category theory, and by pointing at
connections to previous and current developments in the foundations of physics.
This research program is also in close synergy with developments elsewhere, for
example in representation theory, quantum algebra, knot theory, topological
quantum field theory and several other areas.Comment: Invited chapter in: "Deep Beauty: Understanding the Quantum World
through Mathematical Innovation", H. Halvorson, ed., Cambridge University
Press, forthcoming. (as usual, many pictures
Two Decades of Maude
This paper is a tribute to José Meseguer, from the rest of us in the Maude team, reviewing the past, the present, and the future of the language and system with which we have been working for around two decades under his leadership. After reviewing the origins and the language's main features, we present the latest additions to the language and some features currently under development. This paper is not an introduction to Maude, and some familiarity with it and with rewriting logic are indeed assumed.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech
Trends in Russian research output indexed in Scopus and Web of Science
Trends are analysed in the annual number of documents published by Russian
institutions and indexed in Scopus and Web of Science, giving special attention
to the time period starting in the year 2013 in which the Project 5-100 was
launched by the Russian Government. Numbers are broken down by document type,
publication language, type of source, research discipline, country and source.
It is concluded that Russian publication counts strongly depend upon the
database used, and upon changes in database coverage, and that one should be
cautious when using indicators derived from WoS, and especially from Scopus, as
tools in the measurement of research performance and international orientation
of the Russian science system.Comment: Author copy of a manuscript accepted for publication in the journal
Scientometrics, May 201
Boosting Multi-Core Reachability Performance with Shared Hash Tables
This paper focuses on data structures for multi-core reachability, which is a
key component in model checking algorithms and other verification methods. A
cornerstone of an efficient solution is the storage of visited states. In
related work, static partitioning of the state space was combined with
thread-local storage and resulted in reasonable speedups, but left open whether
improvements are possible. In this paper, we present a scaling solution for
shared state storage which is based on a lockless hash table implementation.
The solution is specifically designed for the cache architecture of modern
CPUs. Because model checking algorithms impose loose requirements on the hash
table operations, their design can be streamlined substantially compared to
related work on lockless hash tables. Still, an implementation of the hash
table presented here has dozens of sensitive performance parameters (bucket
size, cache line size, data layout, probing sequence, etc.). We analyzed their
impact and compared the resulting speedups with related tools. Our
implementation outperforms two state-of-the-art multi-core model checkers (SPIN
and DiVinE) by a substantial margin, while placing fewer constraints on the
load balancing and search algorithms.Comment: preliminary repor
- …