88,427 research outputs found
The Power of Asymmetry in Binary Hashing
When approximating binary similarity using the hamming distance between short
binary hashes, we show that even if the similarity is symmetric, we can have
shorter and more accurate hashes by using two distinct code maps. I.e. by
approximating the similarity between and as the hamming distance
between and , for two distinct binary codes , rather than as
the hamming distance between and .Comment: Accepted to NIPS 2013, 9 pages, 5 figure
The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach
Wireless sensor networks consist of a large number of distributed sensor
nodes so that potential risks are becoming more and more unpredictable. The new
entrants pose the potential risks when they move into the secure zone. To build
a door wall that provides safe and secured for the system, many recent research
works applied the initial authentication process. However, the majority of the
previous articles only focused on the Central Authority (CA) since this leads
to an increase in the computation cost and energy consumption for the specific
cases on the Internet of Things (IoT). Hence, in this article, we will lessen
the importance of these third parties through proposing an enhanced
authentication mechanism that includes key management and evaluation based on
the past interactions to assist the objects joining a secured area without any
nearby CA. We refer to a mobility dataset from CRAWDAD collected at the
University Politehnica of Bucharest and rebuild into a new random dataset
larger than the old one. The new one is an input for a simulated authenticating
algorithm to observe the communication cost and resource usage of devices. Our
proposal helps the authenticating flexible, being strict with unknown devices
into the secured zone. The threshold of maximum friends can modify based on the
optimization of the symmetric-key algorithm to diminish communication costs
(our experimental results compare to previous schemes less than 2000 bits) and
raise flexibility in resource-constrained environments.Comment: 27 page
Algebraic treatment of three-body problems
We discuss an algebraic treatment of three-body systems in terms of a U(7)
spectrum generating algebra. In particular, we develop the formalism for
nonlinear configurations and present an algebraic description of vibrational
and rotational excitations of symmetric (X_3) and asymmetric tops (XY_2 and
XYZ). The relevant point group symmetry is incorporated exactly.Comment: revised and updated version: 14 pages, 2 figures. Few-Body Systems,
in pres
On Symmetric and Asymmetric LSHs for Inner Product Search
We consider the problem of designing locality sensitive hashes (LSH) for
inner product similarity, and of the power of asymmetric hashes in this
context. Shrivastava and Li argue that there is no symmetric LSH for the
problem and propose an asymmetric LSH based on different mappings for query and
database points. However, we show there does exist a simple symmetric LSH that
enjoys stronger guarantees and better empirical performance than the asymmetric
LSH they suggest. We also show a variant of the settings where asymmetry is
in-fact needed, but there a different asymmetric LSH is required.Comment: 11 pages, 3 figures, In Proceedings of The 32nd International
Conference on Machine Learning (ICML
Relations as Plural-Predications in Plato
<p>Plato was the first philosopher to discover the metaphysical phenomenon of plural-subjects and plural-predication; e.g. you and I are two, but neither you, nor I are two. I argue that Plato devised an ontology for plural-predication through his Theory of Forms, namely, plural-partaking in a Form. Furthermore, I argue that Plato used plural-partaking to offer an ontology of related individuals without reifying relations. My contention is that Platoâs theory of plural-relatives has evaded detection in the exegetical literature because his account of plural-subjects through the Theory of Forms had not been recognised for what it is. I further submit that Platoâs handling of related individuals through plural-predication is not only a âfirstâ in philosophy, but also an âonlyâ, having remained a unique account in the metaphysics of relations. I hope that Platoâs account will introduce a fresh approach to contemporary debates on</p>
<p>the subject.</p
Hunting for Dark Particles with Gravitational Waves
The LIGO observation of gravitational waves from a binary black hole merger
has begun a new era in fundamental physics. If new dark sector particles, be
they bosons or fermions, can coalesce into exotic compact objects (ECOs) of
astronomical size, then the first evidence for such objects, and their
underlying microphysical description, may arise in gravitational wave
observations. In this work we study how the macroscopic properties of ECOs are
related to their microscopic properties, such as dark particle mass and
couplings. We then demonstrate the smoking gun exotic signatures that would
provide observational evidence for ECOs, and hence new particles, in
terrestrial gravitational wave observatories. Finally, we discuss how
gravitational waves can test a core concept in general relativity: Hawking's
area theorem.Comment: 44 pages, 14 figures. Revised version to appear in JCA
Symmetric and asymmetric action integration during cooperative object manipulation in virtual environments
Cooperation between multiple users in a virtual environment (VE) can take place at one of three levels. These
are defined as where users can perceive each other (Level 1), individually change the scene (Level 2), or
simultaneously act on and manipulate the same object (Level 3). Despite representing the highest level of
cooperation, multi-user object manipulation has rarely been studied. This paper describes a behavioral
experiment in which the piano movers' problem (maneuvering a large object through a restricted space) was
used to investigate object manipulation by pairs of participants in a VE. Participants' interactions with the object
were integrated together either symmetrically or asymmetrically. The former only allowed the common
component of participants' actions to take place, but the latter used the mean. Symmetric action integration was
superior for sections of the task when both participants had to perform similar actions, but if participants had to
move in different ways (e.g., one maneuvering themselves through a narrow opening while the other traveled
down a wide corridor) then asymmetric integration was superior. With both forms of integration, the extent to
which participants coordinated their actions was poor and this led to a substantial cooperation overhead (the
reduction in performance caused by having to cooperate with another person)
Matrix product approach for the asymmetric random average process
We consider the asymmetric random average process which is a one-dimensional
stochastic lattice model with nearest neighbour interaction but continuous and
unbounded state variables. First, the explicit functional representations,
so-called beta densities, of all local interactions leading to steady states of
product measure form are rigorously derived. This also completes an outstanding
proof given in a previous publication. Then, we present an alternative solution
for the processes with factorized stationary states by using a matrix product
ansatz. Due to continuous state variables we obtain a matrix algebra in form of
a functional equation which can be solved exactly.Comment: 17 pages, 1 figur
- âŠ