188,747 research outputs found
Integer Factorization with a Neuromorphic Sieve
The bound to factor large integers is dominated by the computational effort
to discover numbers that are smooth, typically performed by sieving a
polynomial sequence. On a von Neumann architecture, sieving has log-log
amortized time complexity to check each value for smoothness. This work
presents a neuromorphic sieve that achieves a constant time check for
smoothness by exploiting two characteristic properties of neuromorphic
architectures: constant time synaptic integration and massively parallel
computation. The approach is validated by modifying msieve, one of the fastest
publicly available integer factorization implementations, to use the IBM
Neurosynaptic System (NS1e) as a coprocessor for the sieving stage.Comment: Fixed typos in equation for modular roots (Section II, par. 6;
Section III, par. 2) and phase calculation (Section IV, par 2
Measuring internet activity: a (selective) review of methods and metrics
Two Decades after the birth of the World Wide Web, more than two billion people around the world are Internet users. The digital landscape is littered with hints that the affordances of digital communications are being leveraged to transform life in profound and important ways. The reach and influence of digitally mediated activity grow by the day and touch upon all aspects of life, from health, education, and commerce to religion and governance. This trend demands that we seek answers to the biggest questions about how digitally mediated communication changes society and the role of different policies in helping or hindering the beneficial aspects of these changes. Yet despite the profusion of data the digital age has brought upon us—we now have access to a flood of information about the movements, relationships, purchasing decisions, interests, and intimate thoughts of people around the world—the distance between the great questions of the digital age and our understanding of the impact of digital communications on society remains large. A number of ongoing policy questions have emerged that beg for better empirical data and analyses upon which to base wider and more insightful perspectives on the mechanics of social, economic, and political life online. This paper seeks to describe the conceptual and practical impediments to measuring and understanding digital activity and highlights a sample of the many efforts to fill the gap between our incomplete understanding of digital life and the formidable policy questions related to developing a vibrant and healthy Internet that serves the public interest and contributes to human wellbeing. Our primary focus is on efforts to measure Internet activity, as we believe obtaining robust, accurate data is a necessary and valuable first step that will lead us closer to answering the vitally important questions of the digital realm. Even this step is challenging: the Internet is difficult to measure and monitor, and there is no simple aggregate measure of Internet activity—no GDP, no HDI. In the following section we present a framework for assessing efforts to document digital activity. The next three sections offer a summary and description of many of the ongoing projects that document digital activity, with two final sections devoted to discussion and conclusions
Best Effort and Practice Activation Codes
Activation Codes are used in many different digital services and known by
many different names including voucher, e-coupon and discount code. In this
paper we focus on a specific class of ACs that are short, human-readable,
fixed-length and represent value. Even though this class of codes is
extensively used there are no general guidelines for the design of Activation
Code schemes. We discuss different methods that are used in practice and
propose BEPAC, a new Activation Code scheme that provides both authenticity and
confidentiality. The small message space of activation codes introduces some
problems that are illustrated by an adaptive chosen-plaintext attack (CPA-2) on
a general 3-round Feis- tel network of size 2^(2n) . This attack recovers the
complete permutation from at most 2^(n+2) plaintext-ciphertext pairs. For this
reason, BEPAC is designed in such a way that authenticity and confidentiality
are in- dependent properties, i.e. loss of confidentiality does not imply loss
of authenticity.Comment: 15 pages, 3 figures, TrustBus 201
An excess of damped Lyman alpha galaxies near QSOs
We present a sample of 33 damped Lyman alpha systems (DLAs) discovered in the
Sloan Digital Sky Survey (SDSS) whose absorption redshifts (z_abs) are within
6000 km/s of the QSO's systemic redshift (z_sys). Our sample is based on 731
2.5 < z_sys < 4.5 non-broad-absorption-line (non-BAL) QSOs from Data Release 3
(DR3) of the SDSS. We estimate that our search is ~100 % complete for absorbers
with N(HI) >= 2e20 cm^-2. The derived number density of DLAs per unit redshift,
n(z), within v < 6000 km/s is higher (3.5 sigma significance) by almost a
factor of 2 than that of intervening absorbers observed in the SDSS DR3, i.e.
there is evidence for an overdensity of galaxies near the QSOs. This provides a
physical motivation for excluding DLAs at small velocity separations in surveys
of intervening 'field' DLAs. In addition, we find that the overdensity of
proximate DLAs is independent of the radio-loudness of the QSO, consistent with
the environments of radio-loud and radio-quiet QSOs being similar.Comment: Accepted for publication in MNRAS (13 pages, 6 figures
- …