4,406 research outputs found
Hierarchies of belief and interim rationalizability
In games with incomplete information, conventional hierarchies of belief are incomplete as descriptions of the players' information for the purposes of determining a player's behavior. We show by example that this is true for a variety of solution concepts. We then investigate what is essential about a player's information to identify behavior. We specialize to two player games and the solution concept of interim rationalizability. We construct the universal type space for rationalizability and characterize the types in terms of their beliefs. Infinite hierarchies of beliefs over conditional beliefs , which we call Delta-hierarchies, are what turn out to matter. We show that any two types in any two type spaces have the same rationalizable sets in all games if and only if they have the same Delta-hierarchies.Interim rationalizability, belief hierarchies
Uncovering Vulnerable Industrial Control Systems from the Internet Core
Industrial control systems (ICS) are managed remotely with the help of
dedicated protocols that were originally designed to work in walled gardens.
Many of these protocols have been adapted to Internet transport and support
wide-area communication. ICS now exchange insecure traffic on an inter-domain
level, putting at risk not only common critical infrastructure but also the
Internet ecosystem (e.g., DRDoS~attacks).
In this paper, we uncover unprotected inter-domain ICS traffic at two central
Internet vantage points, an IXP and an ISP. This traffic analysis is correlated
with data from honeypots and Internet-wide scans to separate industrial from
non-industrial ICS traffic. We provide an in-depth view on Internet-wide ICS
communication. Our results can be used i) to create precise filters for
potentially harmful non-industrial ICS traffic, and ii) to detect ICS sending
unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and
traffic manipulation attacks
HIERARCHIES OF BELIEF AND INTERIM RATIONALIZABILITY
In games with incomplete information, conventional hierarchies of belief are incomplete as descriptions of the playersâ information for the purposes of determining a playerâs behavior. We show by example that this is true for a variety of solution concepts. We then investigate what is essential about a playerâs information to identify rationalizable behavior in any game. We do this by constructing the universal type space for rationalizability and characterizing the types in terms of their beliefs. Infinite hierarchies of beliefs over conditional beliefs, what we call delta-hierarchies, are what turn out to matter. We show that any two types in any two type spaces have the same rationalizable sets in all games if and only if they have the same delta-hierarchies.
Quantum criticality in Ce2PdIn8: thermoelectric study
We report the Nernst effect (v) and thermoelectric power (S) data for the
Ce2PdIn8 heavy-fermion compound. Both S and v behave anomalously at low
temperatures: the thermopower shows a Kondo-like maximum at T = 37 K, while the
Nernst coefficient becomes greatly enhanced and field dependent below T ~ 30 K.
In the zero-T limit S/T and v/T diverge logarithmically, what is related to
occurrence of the quantum critical point (QCP). Presented results suggest that
the antiferromagnetic spin-density-wave scenario may be applicable to QCP in
Ce2PdIn8.Comment: 5 pages, 3 figure
Cutwidth: obstructions and algorithmic aspects
Cutwidth is one of the classic layout parameters for graphs. It measures how
well one can order the vertices of a graph in a linear manner, so that the
maximum number of edges between any prefix and its complement suffix is
minimized. As graphs of cutwidth at most are closed under taking
immersions, the results of Robertson and Seymour imply that there is a finite
list of minimal immersion obstructions for admitting a cut layout of width at
most . We prove that every minimal immersion obstruction for cutwidth at
most has size at most .
As an interesting algorithmic byproduct, we design a new fixed-parameter
algorithm for computing the cutwidth of a graph that runs in time , where is the optimum width and is the number of vertices.
While being slower by a -factor in the exponent than the fastest known
algorithm, given by Thilikos, Bodlaender, and Serna in [Cutwidth I: A linear
time fixed parameter algorithm, J. Algorithms, 56(1):1--24, 2005] and [Cutwidth
II: Algorithms for partial -trees of bounded degree, J. Algorithms,
56(1):25--49, 2005], our algorithm has the advantage of being simpler and
self-contained; arguably, it explains better the combinatorics of optimum-width
layouts
Unifying parameter estimation and the Deutsch-Jozsa algorithm for continuous variables
We reveal a close relationship between quantum metrology and the Deutsch-Jozsa algorithm on continuous-variable quantum systems. We develop a general procedure, characterized by two parameters, that unifies parameter estimation and the Deutsch-Jozsa algorithm. Depending on which parameter we keep constant, the procedure implements either the parameter-estimation protocol or the Deutsch-Jozsa algorithm. The parameter-estimation part of the procedure attains the Heisenberg limit and is therefore optimal. Due to the use of approximate normalizable continuous-variable eigenstates, the Deutsch-Jozsa algorithm is probabilistic. The procedure estimates a value of an unknown parameter and solves the Deutsch-Jozsa problem without the use of any entanglement
Entangled-state cryptographic protocol that remains secure even if nonlocal hidden variables exist and can be measured with arbitrary precision
Standard quantum cryptographic protocols are not secure if one assumes that
nonlocal hidden variables exist and can be measured with arbitrary precision.
The security can be restored if one of the communicating parties randomly
switches between two standard protocols.Comment: Shortened version, accepted in Phys. Rev.
- âŠ