380 research outputs found

    On the statistical distribution of first--return times of balls and cylinders in chaotic systems

    Full text link
    We study returns in dynamical systems: when a set of points, initially populating a prescribed region, swarms around phase space according to a deterministic rule of motion, we say that the return of the set occurs at the earliest moment when one of these points comes back to the original region. We describe the statistical distribution of these "first--return times" in various settings: when phase space is composed of sequences of symbols from a finite alphabet (with application for instance to biological problems) and when phase space is a one and a two-dimensional manifold. Specifically, we consider Bernoulli shifts, expanding maps of the interval and linear automorphisms of the two dimensional torus. We derive relations linking these statistics with Renyi entropies and Lyapunov exponents.Comment: submitted to Int. J. Bifurcations and Chao

    A Machine-Checked Formalization of the Generic Model and the Random Oracle Model

    Get PDF
    Most approaches to the formal analyses of cryptographic protocols make the perfect cryptography assumption, i.e. the hypothese that there is no way to obtain knowledge about the plaintext pertaining to a ciphertext without knowing the key. Ideally, one would prefer to rely on a weaker hypothesis on the computational cost of gaining information about the plaintext pertaining to a ciphertext without knowing the key. Such a view is permitted by the Generic Model and the Random Oracle Model which provide non-standard computational models in which one may reason about the computational cost of breaking a cryptographic scheme. Using the proof assistant Coq, we provide a machine-checked account of the Generic Model and the Random Oracle Mode

    Open Transactions on Shared Memory

    Full text link
    Transactional memory has arisen as a good way for solving many of the issues of lock-based programming. However, most implementations admit isolated transactions only, which are not adequate when we have to coordinate communicating processes. To this end, in this paper we present OCTM, an Haskell-like language with open transactions over shared transactional memory: processes can join transactions at runtime just by accessing to shared variables. Thus a transaction can co-operate with the environment through shared variables, but if it is rolled-back, also all its effects on the environment are retracted. For proving the expressive power of TCCS we give an implementation of TCCS, a CCS-like calculus with open transactions

    The interaction of dark matter cusp with the baryon component in disk galaxies

    Full text link
    In this paper we examine the effect of the formation and evolution of the disk galaxy on the distribution of dark halo matter. We have made simulations of isolated dark matter (DM) halo and two component (DM + baryons). N-body technique was used for stellar and DM particles and TVD MUSCL scheme for gas-dynamic simulations. The simulations include the processes of star formation, stellar feedback, heating and cooling of the interstellar medium. The results of numerical experiments with high spatial resolution let us to conclude in two main findings. First, accounting of star formation and supernova feedback resolves the so-called problem of cusp in distribution of dark matter predicted by cosmological simulations. Second, the interaction of dark matter with dynamic substructures of stellar and gaseous galactic disk (e.g., spiral waves, bar) has an impact on the shape of the dark halo. In particular, the in-plane distribution of dark matter is more symmetric in runs, where the baryonic component was taken into account.Comment: 7 pages, 6 figure

    Dynamics of Gaseous Disks in a Non-axisymmetric Dark Halo

    Full text link
    The dynamics of a galactic disk in a non-axisymmetric (triaxial) dark halo is studied in detail using high-resolution, numerical, hydrodynamical models. A long-lived, two-armed spiral pattern is generated for a wide range of parameters. The spiral structure is global, and the number of turns can be two or three, depending on the model parameters. The morphology and kinematics of the spiral pattern are studied as functions of the halo and disk parameters. The spiral structure rotates slowly, and its angular velocity varies quasi-periodically. Models with differing relative halo masses, halo semi-axis ratios, distributions of matter in the disk, Mach numbers in the gaseous component, and angular rotational velocities of their halos are considered.Comment: 22 pages, 11 figure

    On Protection by Layout Randomization

    Get PDF
    Layout randomization is a powerful, popular technique for software protection. We present it and study it in programming-language terms. More specifically, we consider layout randomization as part of an implementation for a high-level programming language; the implementation translates this language to a lower-level language in which memory addresses are numbers. We analyze this implementation, by relating low-level attacks against the implementation to contexts in th

    Catalic: Delegated PSI Cardinality with Applications to Contact Tracing

    Get PDF
    Private Set Intersection Cardinality (PSI-CA) allows two parties, each holding a set of items, to learn the size of the intersection of those sets without revealing any additional information. To the best of our knowledge, this work presents the first protocol that allows one of the parties to delegate PSI-CA computation to untrusted servers. At the heart of our delegated PSI-CA protocol is a new oblivious distributed key PRF (Odk-PRF) abstraction, which may be of independent interest. We explore in detail how to use our delegated PSI-CA protocol to perform privacy-preserving contact tracing. It has been estimated that a significant percentage of a given population would need to use a contact tracing app to stop a disease’s spread. Prior privacy-preserving contact tracing systems, however, impose heavy bandwidth or computational demands on client devices. These demands present an economic disincentive to participate for end users who may be billed per MB by their mobile data plan or for users who want to save battery life. We propose Catalic (ContAct TrAcing for LIghtweight Clients), a new contact tracing system that minimizes bandwidth cost and computation workload on client devices. By applying our new delegated PSI-CA protocol, Catalic shifts most of the client-side computation of contact tracing to untrusted servers, and potentially saves each user hundreds of megabytes of mobile data per day while preserving privacy

    Formation of ionospheric irregularities over Southeast Asia during the 2015 St. Patrickˈs Day storm

    Get PDF
    We investigate the geospace response to the 2015 St. Patrickˈs Day storm leveraging on instruments spread over Southeast Asia (SEA), covering a wide longitudinal sector of the low-latitude ionosphere. A regional characterization of the storm is provided, identifying the peculiarities of ionospheric irregularity formation. The novelties of this work are the characterization in a broad longitudinal range and the methodology relying on the integration of data acquired by Global Navigation Satellite System (GNSS) receivers, magnetometers, ionosondes, and Swarm satellites. This work is a legacy of the project EquatoRial Ionosphere Characterization in Asia (ERICA). ERICA aimed to capture the features of both crests of the equatorial ionospheric anomaly (EIA) and trough (EIT) by means of a dedicated measurement campaign. The campaign lasted from March to October 2015 and was able to observe the ionospheric variability causing effects on radio systems, GNSS in particular. The multiinstrumental and multiparametric observations of the region enabled an in-depth investigation of the response to the largest geomagnetic storm of the current solar cycle in a region scarcely reported in literature. Our work discusses the comparison between northern and southern crests of the EIA in the SEA region. The observations recorded positive and negative ionospheric storms, spread F conditions, scintillation enhancement and inhibition, and total electron content variability. The ancillary information on the local magnetic field highlights the variety of ionospheric perturbations during the different storm phases. The combined use of ionospheric bottomside, topside, and integrated information points out how the storm affects the F layer altitude and the consequent enhancement/suppression of scintillations.Published12211–122331A. Geomagnetismo e Paleomagnetismo2A. Fisica dell'alta atmosfera1IT. Reti di monitoraggio e Osservazioni5IT. Osservazioni satellitariJCR Journalope

    Outlier detection and classification in sensor data streams for proactive decision support systems

    Get PDF
    A paper has a deal with the problem of quality assessment in sensor data streams accumulated by proactive decision support systems. The new problem is stated where outliers need to be detected and to be classified according to their nature of origin. There are two types of outliers defined; the first type is about misoperations of a system and the second type is caused by changes in the observed system behavior due to inner and external influences. The proposed method is based on the data-driven forecast approach to predict the values in the incoming data stream at the expected time. This method includes the forecasting model and the clustering model. The forecasting model predicts a value in the incoming data stream at the expected time to find the deviation between a real observed value and a predicted one. The clustering method is used for taxonomic classification of outliers. Constructive neural networks models (CoNNS) and evolving connectionists systems (ECS) are used for prediction of sensors data. There are two real world tasks are used as case studies. The maximal values of accuracy are 0.992 and 0.974, and F1 scores are 0.967 and 0.938, respectively, for the first and the second tasks. The conclusion contains findings how to apply the proposed method in proactive decision support systems
    corecore