380 research outputs found
On the statistical distribution of first--return times of balls and cylinders in chaotic systems
We study returns in dynamical systems: when a set of points, initially
populating a prescribed region, swarms around phase space according to a
deterministic rule of motion, we say that the return of the set occurs at the
earliest moment when one of these points comes back to the original region. We
describe the statistical distribution of these "first--return times" in various
settings: when phase space is composed of sequences of symbols from a finite
alphabet (with application for instance to biological problems) and when phase
space is a one and a two-dimensional manifold. Specifically, we consider
Bernoulli shifts, expanding maps of the interval and linear automorphisms of
the two dimensional torus. We derive relations linking these statistics with
Renyi entropies and Lyapunov exponents.Comment: submitted to Int. J. Bifurcations and Chao
A Machine-Checked Formalization of the Generic Model and the Random Oracle Model
Most approaches to the formal analyses of cryptographic protocols make the perfect cryptography assumption, i.e. the hypothese that there is no way to obtain knowledge about the plaintext pertaining to a ciphertext without knowing the key. Ideally, one would prefer to rely on a weaker hypothesis on the computational cost of gaining information about the plaintext pertaining to a ciphertext without knowing the key. Such a view is permitted by the Generic Model and the Random Oracle Model which provide non-standard computational models in which one may reason about the computational cost of breaking a cryptographic scheme. Using the proof assistant Coq, we provide a machine-checked account of the Generic Model and the Random Oracle Mode
Open Transactions on Shared Memory
Transactional memory has arisen as a good way for solving many of the issues
of lock-based programming. However, most implementations admit isolated
transactions only, which are not adequate when we have to coordinate
communicating processes. To this end, in this paper we present OCTM, an
Haskell-like language with open transactions over shared transactional memory:
processes can join transactions at runtime just by accessing to shared
variables. Thus a transaction can co-operate with the environment through
shared variables, but if it is rolled-back, also all its effects on the
environment are retracted. For proving the expressive power of TCCS we give an
implementation of TCCS, a CCS-like calculus with open transactions
The interaction of dark matter cusp with the baryon component in disk galaxies
In this paper we examine the effect of the formation and evolution of the
disk galaxy on the distribution of dark halo matter. We have made simulations
of isolated dark matter (DM) halo and two component (DM + baryons). N-body
technique was used for stellar and DM particles and TVD MUSCL scheme for
gas-dynamic simulations. The simulations include the processes of star
formation, stellar feedback, heating and cooling of the interstellar medium.
The results of numerical experiments with high spatial resolution let us to
conclude in two main findings. First, accounting of star formation and
supernova feedback resolves the so-called problem of cusp in distribution of
dark matter predicted by cosmological simulations. Second, the interaction of
dark matter with dynamic substructures of stellar and gaseous galactic disk
(e.g., spiral waves, bar) has an impact on the shape of the dark halo. In
particular, the in-plane distribution of dark matter is more symmetric in runs,
where the baryonic component was taken into account.Comment: 7 pages, 6 figure
Dynamics of Gaseous Disks in a Non-axisymmetric Dark Halo
The dynamics of a galactic disk in a non-axisymmetric (triaxial) dark halo is
studied in detail using high-resolution, numerical, hydrodynamical models. A
long-lived, two-armed spiral pattern is generated for a wide range of
parameters. The spiral structure is global, and the number of turns can be two
or three, depending on the model parameters. The morphology and kinematics of
the spiral pattern are studied as functions of the halo and disk parameters.
The spiral structure rotates slowly, and its angular velocity varies
quasi-periodically. Models with differing relative halo masses, halo semi-axis
ratios, distributions of matter in the disk, Mach numbers in the gaseous
component, and angular rotational velocities of their halos are considered.Comment: 22 pages, 11 figure
On Protection by Layout Randomization
Layout randomization is a powerful, popular technique for software protection. We present it and study it in programming-language terms. More specifically, we consider layout randomization as part of an implementation for a high-level programming language; the implementation translates this language to a lower-level language in which memory addresses are numbers. We analyze this implementation, by relating low-level attacks against the implementation to contexts in th
Catalic: Delegated PSI Cardinality with Applications to Contact Tracing
Private Set Intersection Cardinality (PSI-CA) allows two parties, each holding a set of items, to learn the size of the intersection of those sets without revealing any additional information. To the best of our knowledge, this work presents the first protocol that allows one of the parties to delegate PSI-CA computation to untrusted servers. At the heart of our delegated PSI-CA protocol is a new oblivious distributed key PRF (Odk-PRF) abstraction, which may be of independent interest.
We explore in detail how to use our delegated PSI-CA protocol to perform privacy-preserving contact tracing. It has been estimated that a significant percentage of a given population would need to use a contact tracing app to stop a disease’s spread. Prior privacy-preserving contact tracing systems, however, impose heavy bandwidth or computational demands on client devices. These demands present an economic disincentive to participate for end users who may be billed per MB by their mobile data plan or for users who want to save battery life. We propose Catalic (ContAct TrAcing for LIghtweight Clients), a new contact tracing system that minimizes bandwidth cost and computation workload on client devices. By applying our new delegated PSI-CA protocol, Catalic shifts most of the client-side computation of contact tracing to untrusted servers, and potentially saves each user hundreds of megabytes of mobile data per day while preserving privacy
Formation of ionospheric irregularities over Southeast Asia during the 2015 St. Patrickˈs Day storm
We investigate the geospace response to the 2015 St. Patrickˈs Day storm leveraging on instruments spread over Southeast Asia (SEA), covering a wide longitudinal sector of the low-latitude
ionosphere. A regional characterization of the storm is provided, identifying the peculiarities of ionospheric irregularity formation. The novelties of this work are the characterization in a broad longitudinal range and the methodology relying on the integration of data acquired by Global Navigation Satellite System (GNSS) receivers, magnetometers, ionosondes, and Swarm satellites. This work is a legacy of the project EquatoRial
Ionosphere Characterization in Asia (ERICA). ERICA aimed to capture the features of both crests of the equatorial ionospheric anomaly (EIA) and trough (EIT) by means of a dedicated measurement campaign. The campaign lasted from March to October 2015 and was able to observe the ionospheric variability causing
effects on radio systems, GNSS in particular. The multiinstrumental and multiparametric observations of the
region enabled an in-depth investigation of the response to the largest geomagnetic storm of the current solar cycle in a region scarcely reported in literature. Our work discusses the comparison between northern and southern crests of the EIA in the SEA region. The observations recorded positive and negative ionospheric storms, spread F conditions, scintillation enhancement and inhibition, and total electron content variability. The ancillary information on the local magnetic field highlights the variety of ionospheric perturbations during the different storm phases. The combined use of ionospheric bottomside, topside,
and integrated information points out how the storm affects the F layer altitude and the consequent enhancement/suppression of scintillations.Published12211–122331A. Geomagnetismo e Paleomagnetismo2A. Fisica dell'alta atmosfera1IT. Reti di monitoraggio e Osservazioni5IT. Osservazioni satellitariJCR Journalope
Outlier detection and classification in sensor data streams for proactive decision support systems
A paper has a deal with the problem of quality assessment in sensor data streams accumulated by proactive decision support systems. The new problem is stated where outliers need to be detected and to be classified according to their nature of origin. There are two types of outliers defined; the first type is about misoperations of a system and the second type is caused by changes in the observed system behavior due to inner and external influences. The proposed method is based on the data-driven forecast approach to predict the values in the incoming data stream at the expected time. This method includes the forecasting model and the clustering model. The forecasting model predicts a value in the incoming data stream at the expected time to find the deviation between a real observed value and a predicted one. The clustering method is used for taxonomic classification of outliers. Constructive neural networks models (CoNNS) and evolving connectionists systems (ECS) are used for prediction of sensors data. There are two real world tasks are used as case studies. The maximal values of accuracy are 0.992 and 0.974, and F1 scores are 0.967 and 0.938, respectively, for the first and the second tasks. The conclusion contains findings how to apply the proposed method in proactive decision support systems
- …