50,610 research outputs found
SUSY Stops at a Bump
We discuss collider signatures of the "natural supersymmetry" scenario with
baryon-number violating R-parity violation. We argue that this is one of the
few remaining viable incarnations of weak scale supersymmetry consistent with
full electroweak naturalness. We show that this intriguing and challenging
scenario contains distinctive LHC signals, resonances of hard jets in
conjunction with relatively soft leptons and missing energy, which are easily
overlooked by existing LHC searches. We propose novel strategies for
distinguishing these signals above background, and estimate their potential
reach at the 8 TeV LHC. We show that other multi-lepton signals of this
scenario can be seen by currently existing searches with increased statistics,
but these opportunities are more spectrum-dependent.Comment: 23 pages, 7 figures, 3 tables. V2: spectrum discussion corrected,
most of the changes are in Sec. 2. Benchmarks, analysis and conclusions
unchanged. References adde
Indirect test of M-S circuits using multiple specification band guarding
Testing analog and mixed-signal circuits is a costly task due to the required test time targets and high end technical resources. Indirect testing methods partially address these issues providing an efficient solution using easy to measure CUT information that correlates with circuit performances. In this work, a multiple specification band guarding technique is proposed as a method to achieve a test target of misclassified circuits. The acceptance/rejection test regions are encoded using octrees in the measurement space, where the band guarding factors precisely tune the test decision boundary according to the required test yield targets. The generated octree data structure serves to cluster the forthcoming circuits in the production testing phase by solely relying on indirect measurements. The combined use of octree based encoding and multiple specification band guarding makes the testing procedure fast, efficient and highly tunable. The proposed band guarding methodology has been applied to test a band-pass Butterworth filter under parametric variations. Promising simulation results are reported showing remarkable improvements when the multiple specification band guarding criterion is used.Peer ReviewedPostprint (author's final draft
Bringing Transnational Participatory Democracy to Life: Tips for Would-be Organisers of a European Citizens' Initiative
The first section of the Guide discusses the extent of the power that the ECI truly gives to citizens and offers a brief overview of the ECI process. The second section goes through the process step by step and includes some experiences of current ECIs organisers. The third section provides some lessons from pre-ECI Regulation initiatives. The fourth section summarizes the future of the ECI. The Guide ends with a section providing ECI resources
Instantaneous Decentralized Poker
We present efficient protocols for amortized secure multiparty computation
with penalties and secure cash distribution, of which poker is a prime example.
Our protocols have an initial phase where the parties interact with a
cryptocurrency network, that then enables them to interact only among
themselves over the course of playing many poker games in which money changes
hands.
The high efficiency of our protocols is achieved by harnessing the power of
stateful contracts. Compared to the limited expressive power of Bitcoin
scripts, stateful contracts enable richer forms of interaction between standard
secure computation and a cryptocurrency.
We formalize the stateful contract model and the security notions that our
protocols accomplish, and provide proofs using the simulation paradigm.
Moreover, we provide a reference implementation in Ethereum/Solidity for the
stateful contracts that our protocols are based on.
We also adopt our off-chain cash distribution protocols to the special case
of stateful duplex micropayment channels, which are of independent interest. In
comparison to Bitcoin based payment channels, our duplex channel implementation
is more efficient and has additional features
Recommended from our members
Multi-aspect, robust, and memory exclusive guest os fingerprinting
Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics. The existing OS fingerprinting techniques primarily inspect network packets or CPU states, and they all fall short in precision and usability. As the physical memory of a VM always exists in all these applications, in this article, we present OS-Sommelier+, a multi-aspect, memory exclusive approach for precise and robust guest OS fingerprinting in the cloud. It works as follows: given a physical memory dump of a guest OS, OS-Sommelier+ first uses a code hash based approach from kernel code aspect to determine the guest OS version. If code hash approach fails, OS-Sommelier+ then uses a kernel data signature based approach from kernel data aspect to determine the version. We have implemented a prototype system, and tested it with a number of Linux kernels. Our evaluation results show that the code hash approach is faster but can only fingerprint the known kernels, and data signature approach complements the code signature approach and can fingerprint even unknown kernels
- …