3,450 research outputs found

    Inductive logic programming at 30

    Full text link
    Inductive logic programming (ILP) is a form of logic-based machine learning. The goal of ILP is to induce a hypothesis (a logic program) that generalises given training examples and background knowledge. As ILP turns 30, we survey recent work in the field. In this survey, we focus on (i) new meta-level search methods, (ii) techniques for learning recursive programs that generalise from few examples, (iii) new approaches for predicate invention, and (iv) the use of different technologies, notably answer set programming and neural networks. We conclude by discussing some of the current limitations of ILP and discuss directions for future research.Comment: Extension of IJCAI20 survey paper. arXiv admin note: substantial text overlap with arXiv:2002.11002, arXiv:2008.0791

    The Regulation of Space and Cyberspace: One Coin, Two Sides

    Get PDF
    In the 1960s, during some very tense days in the Cold War the United States of America (USA) and the Union of Socialist Soviet Republics (USSR) brokered a deal in the United Nations for a treaty regime to govern human activities in outer space. This regime has served well enough for almost 50 years. In recent years, however, fears of space weaponisation, the proliferation of space debris in the Low Earth Orbits (LEO) and increasing demands on the electromagnetic spectrum (EMS) have led to demands for regulatory reform. Some nations now consider space to be the fourth domain of modern warfare. Meanwhile, the cyber domain continues to develop apace. The world is struggling to determine whether, and if so how, to regulate the cyberspace. The United States now considers cyberspace to be the fifth domain of warfare and has announced that it reserves the right to meet cyber attacks, on interests it considers vital, with conventional kinetic responses. The space and cyberspace domains overlap and have mutual dependencies which demand a degree of coherence and integration in legislative, policy, and regulatory responses. There are also some important differences and distinctions. This paper explores some of the dilemmas that are faced by decision-makers who seek to make both the space and cyberspace domains safe and secure places which will deliver benefit to humans across the planet long into the future

    The Silent Arms Race: The Role of the Supercomputer During the Cold War, 1947-1963

    Get PDF
    One of the central features of the Cold War is the Arms Race. The United States and the Union of Soviet Socialist republics vied for supremacy over the globe for a fifty-year period in which there were several arms races; atomic weapons, thermonuclear weapons and various kinds of conventional weapons. However, there is another arms race that goes unsung during this period of history and that is in the area of supercomputing. The other types of arms races are taken for granted by historians and others, but the technological competition between the superpowers would have been impossible without the historically silent arms race in the area of supercomputers. The construction of missiles, jets as well as the testing of nuclear weapons had serious implications for international relations. Often perception is more important than fact. Perceived power maintained a deterrent effect on the two superpowers. If one superpower suspected that they, in fact, had an advantage over the other then the balance of power would be upset and more aggressive measures might have been taken in various fronts of the conflict, perhaps leading to war. Due to this, it was necessary to maintain a balance of power not only in weapons but in supercomputing as well. Considering the role that the computers played, it is time for closer historical scrutiny

    CalcHEP 3.4 for collider physics within and beyond the Standard Model

    Full text link
    We present version 3.4 of the CalcHEP software package which is designed for effective evaluation and simulation of high energy physics collider processes at parton level. The main features of CalcHEP are the computation of Feynman diagrams, integration over multi-particle phase space and event simulation at parton level. The principle attractive key-points along these lines are that it has: a) an easy startup even for those who are not familiar with CalcHEP; b) a friendly and convenient graphical user interface; c) the option for a user to easily modify a model or introduce a new model by either using the graphical interface or by using an external package with the possibility of cross checking the results in different gauges; d) a batch interface which allows to perform very complicated and tedious calculations connecting production and decay modes for processes with many particles in the final state. With this features set, CalcHEP can efficiently perform calculations with a high level of automation from a theory in the form of a Lagrangian down to phenomenology in the form of cross sections, parton level event simulation and various kinematical distributions. In this paper we report on the new features of CalcHEP 3.4 which improves the power of our package to be an effective tool for the study of modern collider phenomenology.Comment: 82 pages, elsarticle LaTeX, 7 Figures. Changes from v1: 1) updated reference list and Acknowledgments; 2) 2->1 processes added to CalcHEP; 3) particles decay (i.e. Higgs boson) into virtual W/Z decays added together with comparison to results from Hdecay package; 4) added interface with Root packag

    Cryptography in the digital age

    Full text link
    Despite it not being an armed conflict between nations, there is a war that has been waged for over 5000 years and is still being fought today. Battles have been won and lost by both sides. The battlefield is the world of cryptography. Our combatants are cryptographers, personnel who make secret codes; and cryptanalysts, personnel who try to break the secret codes; In this thesis, we examine public-key or asymmetric cryptography, the are of writing or deciphering secret codes or ciphers. We begin by taking a brief look at the overall history of cryptography. Our primary focus involves studying the mathematics behind today\u27s public-key cryptographic methods such as the theory of congruences by Carl Friedrich Gauss, Fermat\u27s little theorem, Euler\u27s phi-function, primitive roots and indices, and elliptic curves over finite fields. Once we have explore the preliminaries we will consider some of the more popular methods of encryption and decryption, for example RSA. We not only discuss how to encrypt and decrypt plain text using these methods but explain why it is hard to break the encrypted text. We conclude our study by inspecting the shortfall of these ciphers, techniques used to break the encryption, and what the future possibly holds

    The Reporter, November 14, 1966

    Full text link
    The Reporter was Baruch College\u27s evening session newspaper. Founded in 1923, when Baruch College was still part of City College, the Reporter billed itself as the Oldest Evening Session College Newspaper Published in the United States. It ceased publication in 2002

    STEM KIT: Teachers’ Notebook

    Get PDF
    info:eu-repo/semantics/publishedVersio

    New Physics at the LHC. A Les Houches Report: Physics at TeV Colliders 2009 - New Physics Working Group

    Get PDF
    We present a collection of signatures for physics beyond the standard model that need to be explored at the LHC. First, are presented various tools developed to measure new particle masses in scenarios where all decays include an unobservable particle. Second, various aspects of supersymmetric models are discussed. Third, some signatures of models of strong electroweak symmetry are discussed. In the fourth part, a special attention is devoted to high mass resonances, as the ones appearing in models with warped extra dimensions. Finally, prospects for models with a hidden sector/valley are presented. Our report, which includes brief experimental and theoretical reviews as well as original results, summarizes the activities of the "New Physics" working group for the "Physics at TeV Colliders" workshop (Les Houches, France, 8-26 June, 2009).Comment: 189 page
    corecore