213,664 research outputs found
Dovetail: Stronger Anonymity in Next-Generation Internet Routing
Current low-latency anonymity systems use complex overlay networks to conceal
a user's IP address, introducing significant latency and network efficiency
penalties compared to normal Internet usage. Rather than obfuscating network
identity through higher level protocols, we propose a more direct solution: a
routing protocol that allows communication without exposing network identity,
providing a strong foundation for Internet privacy, while allowing identity to
be defined in those higher level protocols where it adds value.
Given current research initiatives advocating "clean slate" Internet designs,
an opportunity exists to design an internetwork layer routing protocol that
decouples identity from network location and thereby simplifies the anonymity
problem. Recently, Hsiao et al. proposed such a protocol (LAP), but it does not
protect the user against a local eavesdropper or an untrusted ISP, which will
not be acceptable for many users. Thus, we propose Dovetail, a next-generation
Internet routing protocol that provides anonymity against an active attacker
located at any single point within the network, including the user's ISP. A
major design challenge is to provide this protection without including an
application-layer proxy in data transmission. We address this challenge in path
construction by using a matchmaker node (an end host) to overlap two path
segments at a dovetail node (a router). The dovetail then trims away part of
the path so that data transmission bypasses the matchmaker. Additional design
features include the choice of many different paths through the network and the
joining of path segments without requiring a trusted third party. We develop a
systematic mechanism to measure the topological anonymity of our designs, and
we demonstrate the privacy and efficiency of our proposal by simulation, using
a model of the complete Internet at the AS-level
Gradient formula for the beta-function of 2d quantum field theory
We give a non-perturbative proof of a gradient formula for beta functions of
two-dimensional quantum field theories. The gradient formula has the form
\partial_{i}c = - (g_{ij}+\Delta g_{ij} +b_{ij})\beta^{j} where \beta^{j} are
the beta functions, c and g_{ij} are the Zamolodchikov c-function and metric,
b_{ij} is an antisymmetric tensor introduced by H. Osborn and \Delta g_{ij} is
a certain metric correction. The formula is derived under the assumption of
stress-energy conservation and certain conditions on the infrared behaviour the
most significant of which is the condition that the large distance limit of the
field theory does not exhibit spontaneously broken global conformal symmetry.
Being specialized to non-linear sigma models this formula implies a one-to-one
correspondence between renormalization group fixed points and critical points
of c.Comment: LaTex file, 31 pages, no figures; v.2 referencing corrected in the
introductio
Distributed human computation framework for linked data co-reference resolution
Distributed Human Computation (DHC) is a technique used to solve computational problems by incorporating the collaborative effort of a large number of humans. It is also a solution to AI-complete problems such as natural language processing. The Semantic Web with its root in AI is envisioned to be a decentralised world-wide information space for sharing machine-readable data with minimal integration costs. There are many research problems in the Semantic Web that are considered as AI-complete problems. An example is co-reference resolution, which involves determining whether different URIs refer to the same entity. This is considered to be a significant hurdle to overcome in the realisation of large-scale Semantic Web applications. In this paper, we propose a framework for building a DHC system on top of the Linked Data Cloud to solve various computational problems. To demonstrate the concept, we are focusing on handling the co-reference resolution in the Semantic Web when integrating distributed datasets. The traditional way to solve this problem is to design machine-learning algorithms. However, they are often computationally expensive, error-prone and do not scale. We designed a DHC system named iamResearcher, which solves the scientific publication author identity co-reference problem when integrating distributed bibliographic datasets. In our system, we aggregated 6 million bibliographic data from various publication repositories. Users can sign up to the system to audit and align their own publications, thus solving the co-reference problem in a distributed manner. The aggregated results are published to the Linked Data Cloud
Social movements in world of warcraft
Virtual worlds provide new forms of social interaction. They offer alternative spaces where social functions can be carried out in online three-dimensional virtual environments. In this paper we explore how collective action on a global scale is enabled by these virtual worlds. We used qualitative research to examine the organization of one social movement in World of Warcraft (WoW), the most widely used massively multiplayer online role playing game in the world. Using New Social Movement Theory, our paper suggests that there are a number of differences between real world and virtual world social movements, namely in their (a) locality, (b) issues, (c) periods of activity, (d) hierarchies, and (e) membership
Identity and Granularity of Events in Text
In this paper we describe a method to detect event descrip- tions in
different news articles and to model the semantics of events and their
components using RDF representations. We compare these descriptions to solve a
cross-document event coreference task. Our com- ponent approach to event
semantics defines identity and granularity of events at different levels. It
performs close to state-of-the-art approaches on the cross-document event
coreference task, while outperforming other works when assuming similar quality
of event detection. We demonstrate how granularity and identity are
interconnected and we discuss how se- mantic anomaly could be used to define
differences between coreference, subevent and topical relations.Comment: Invited keynote speech by Piek Vossen at Cicling 201
Exact evidence for the spontaneous antiferromagnetic long-range order in the two-dimensional hybrid model of localized Ising spins and itinerant electrons
The generalized decoration-iteration transformation is adopted to treat
exactly a hybrid model of doubly decorated two-dimensional lattices, which have
localized Ising spins at their nodal lattice sites and itinerant electrons
delocalized over pairs of decorating sites. Under the assumption of a half
filling of each couple of the decorating sites, the investigated model system
exhibits a remarkable spontaneous antiferromagnetic long-range order with an
obvious quantum reduction of the staggered magnetization. It is shown that the
critical temperature of the spontaneously long-range ordered quantum
antiferromagnet displays an outstanding non-monotonic dependence on a ratio
between the kinetic term and the Ising-type exchange interaction.Comment: 8 pages, 6 figure
Quantum surveillance and 'shared secrets'. A biometric step too far? CEPS Liberty and Security in Europe, July 2010
It is no longer sensible to regard biometrics as having neutral socio-economic, legal and political impacts. Newer generation biometrics are fluid and include behavioural and emotional data that can be combined with other data. Therefore, a range of issues needs to be reviewed in light of the increasing privatisation of âsecurityâ that escapes effective, democratic parliamentary and regulatory control and oversight at national, international and EU levels, argues Juliet Lodge, Professor and co-Director of the Jean Monnet European Centre of Excellence at the University of Leeds, U
Recommended from our members
Personalization via collaboration in web retrieval systems: a context based approach
World Wide Web is a source of information, and searches on the Web can be analyzed to detect patterns in Web users' search behaviors and information needs to effectively handle the users' subsequent needs. The rationale is that the information need of a user at a particular time point occurs in a particular context, and queries are derived from that need. In this paper, we discuss an extension of our personalization approach that was originally developed for a traditional bibliographic retrieval system but has been adapted and extended with a collaborative model for the Web retrieval environment. We start with a brief introduction of our personalization approach in a traditional information retrieval system. Then, based on the differences in the nature of documents, users and search tasks between traditional and Web retrieval environments, we describe our extensions of integrating collaboration in personalization in the Web retrieval environment. The architecture for the extension integrates machine learning techniques for the purpose of better modeling users' search tasks. Finally, a user-oriented evaluation of Web-based adaptive retrieval systems is presented as an important aspect of the overall strategy for personalization
- âŠ