88,427 research outputs found

    The Power of Asymmetry in Binary Hashing

    Full text link
    When approximating binary similarity using the hamming distance between short binary hashes, we show that even if the similarity is symmetric, we can have shorter and more accurate hashes by using two distinct code maps. I.e. by approximating the similarity between xx and xâ€Čx' as the hamming distance between f(x)f(x) and g(xâ€Č)g(x'), for two distinct binary codes f,gf,g, rather than as the hamming distance between f(x)f(x) and f(xâ€Č)f(x').Comment: Accepted to NIPS 2013, 9 pages, 5 figure

    The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach

    Full text link
    Wireless sensor networks consist of a large number of distributed sensor nodes so that potential risks are becoming more and more unpredictable. The new entrants pose the potential risks when they move into the secure zone. To build a door wall that provides safe and secured for the system, many recent research works applied the initial authentication process. However, the majority of the previous articles only focused on the Central Authority (CA) since this leads to an increase in the computation cost and energy consumption for the specific cases on the Internet of Things (IoT). Hence, in this article, we will lessen the importance of these third parties through proposing an enhanced authentication mechanism that includes key management and evaluation based on the past interactions to assist the objects joining a secured area without any nearby CA. We refer to a mobility dataset from CRAWDAD collected at the University Politehnica of Bucharest and rebuild into a new random dataset larger than the old one. The new one is an input for a simulated authenticating algorithm to observe the communication cost and resource usage of devices. Our proposal helps the authenticating flexible, being strict with unknown devices into the secured zone. The threshold of maximum friends can modify based on the optimization of the symmetric-key algorithm to diminish communication costs (our experimental results compare to previous schemes less than 2000 bits) and raise flexibility in resource-constrained environments.Comment: 27 page

    Algebraic treatment of three-body problems

    Full text link
    We discuss an algebraic treatment of three-body systems in terms of a U(7) spectrum generating algebra. In particular, we develop the formalism for nonlinear configurations and present an algebraic description of vibrational and rotational excitations of symmetric (X_3) and asymmetric tops (XY_2 and XYZ). The relevant point group symmetry is incorporated exactly.Comment: revised and updated version: 14 pages, 2 figures. Few-Body Systems, in pres

    On Symmetric and Asymmetric LSHs for Inner Product Search

    Full text link
    We consider the problem of designing locality sensitive hashes (LSH) for inner product similarity, and of the power of asymmetric hashes in this context. Shrivastava and Li argue that there is no symmetric LSH for the problem and propose an asymmetric LSH based on different mappings for query and database points. However, we show there does exist a simple symmetric LSH that enjoys stronger guarantees and better empirical performance than the asymmetric LSH they suggest. We also show a variant of the settings where asymmetry is in-fact needed, but there a different asymmetric LSH is required.Comment: 11 pages, 3 figures, In Proceedings of The 32nd International Conference on Machine Learning (ICML

    Relations as Plural-Predications in Plato

    Get PDF
    <p>Plato was the first philosopher to discover the metaphysical phenomenon of plural-subjects and plural-predication; e.g. you and I are two, but neither you, nor I are two. I argue that Plato devised an ontology for plural-predication through his Theory of Forms, namely, plural-partaking in a Form. Furthermore, I argue that Plato used plural-partaking to offer an ontology of related individuals without reifying relations. My contention is that Plato’s theory of plural-relatives has evaded detection in the exegetical literature because his account of plural-subjects through the Theory of Forms had not been recognised for what it is. I further submit that Plato’s handling of related individuals through plural-predication is not only a ‘first’ in philosophy, but also an ‘only’, having remained a unique account in the metaphysics of relations. I hope that Plato’s account will introduce a fresh approach to contemporary debates on</p> <p>the subject.</p

    Hunting for Dark Particles with Gravitational Waves

    Full text link
    The LIGO observation of gravitational waves from a binary black hole merger has begun a new era in fundamental physics. If new dark sector particles, be they bosons or fermions, can coalesce into exotic compact objects (ECOs) of astronomical size, then the first evidence for such objects, and their underlying microphysical description, may arise in gravitational wave observations. In this work we study how the macroscopic properties of ECOs are related to their microscopic properties, such as dark particle mass and couplings. We then demonstrate the smoking gun exotic signatures that would provide observational evidence for ECOs, and hence new particles, in terrestrial gravitational wave observatories. Finally, we discuss how gravitational waves can test a core concept in general relativity: Hawking's area theorem.Comment: 44 pages, 14 figures. Revised version to appear in JCA

    Symmetric and asymmetric action integration during cooperative object manipulation in virtual environments

    Get PDF
    Cooperation between multiple users in a virtual environment (VE) can take place at one of three levels. These are defined as where users can perceive each other (Level 1), individually change the scene (Level 2), or simultaneously act on and manipulate the same object (Level 3). Despite representing the highest level of cooperation, multi-user object manipulation has rarely been studied. This paper describes a behavioral experiment in which the piano movers' problem (maneuvering a large object through a restricted space) was used to investigate object manipulation by pairs of participants in a VE. Participants' interactions with the object were integrated together either symmetrically or asymmetrically. The former only allowed the common component of participants' actions to take place, but the latter used the mean. Symmetric action integration was superior for sections of the task when both participants had to perform similar actions, but if participants had to move in different ways (e.g., one maneuvering themselves through a narrow opening while the other traveled down a wide corridor) then asymmetric integration was superior. With both forms of integration, the extent to which participants coordinated their actions was poor and this led to a substantial cooperation overhead (the reduction in performance caused by having to cooperate with another person)

    Matrix product approach for the asymmetric random average process

    Full text link
    We consider the asymmetric random average process which is a one-dimensional stochastic lattice model with nearest neighbour interaction but continuous and unbounded state variables. First, the explicit functional representations, so-called beta densities, of all local interactions leading to steady states of product measure form are rigorously derived. This also completes an outstanding proof given in a previous publication. Then, we present an alternative solution for the processes with factorized stationary states by using a matrix product ansatz. Due to continuous state variables we obtain a matrix algebra in form of a functional equation which can be solved exactly.Comment: 17 pages, 1 figur
    • 

    corecore