4,406 research outputs found

    Hierarchies of belief and interim rationalizability

    Get PDF
    In games with incomplete information, conventional hierarchies of belief are incomplete as descriptions of the players' information for the purposes of determining a player's behavior. We show by example that this is true for a variety of solution concepts. We then investigate what is essential about a player's information to identify behavior. We specialize to two player games and the solution concept of interim rationalizability. We construct the universal type space for rationalizability and characterize the types in terms of their beliefs. Infinite hierarchies of beliefs over conditional beliefs , which we call Delta-hierarchies, are what turn out to matter. We show that any two types in any two type spaces have the same rationalizable sets in all games if and only if they have the same Delta-hierarchies.Interim rationalizability, belief hierarchies

    Uncovering Vulnerable Industrial Control Systems from the Internet Core

    Full text link
    Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication. ICS now exchange insecure traffic on an inter-domain level, putting at risk not only common critical infrastructure but also the Internet ecosystem (e.g., DRDoS~attacks). In this paper, we uncover unprotected inter-domain ICS traffic at two central Internet vantage points, an IXP and an ISP. This traffic analysis is correlated with data from honeypots and Internet-wide scans to separate industrial from non-industrial ICS traffic. We provide an in-depth view on Internet-wide ICS communication. Our results can be used i) to create precise filters for potentially harmful non-industrial ICS traffic, and ii) to detect ICS sending unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and traffic manipulation attacks

    HIERARCHIES OF BELIEF AND INTERIM RATIONALIZABILITY

    Get PDF
    In games with incomplete information, conventional hierarchies of belief are incomplete as descriptions of the players’ information for the purposes of determining a player’s behavior. We show by example that this is true for a variety of solution concepts. We then investigate what is essential about a player’s information to identify rationalizable behavior in any game. We do this by constructing the universal type space for rationalizability and characterizing the types in terms of their beliefs. Infinite hierarchies of beliefs over conditional beliefs, what we call delta-hierarchies, are what turn out to matter. We show that any two types in any two type spaces have the same rationalizable sets in all games if and only if they have the same delta-hierarchies.

    Quantum criticality in Ce2PdIn8: thermoelectric study

    Full text link
    We report the Nernst effect (v) and thermoelectric power (S) data for the Ce2PdIn8 heavy-fermion compound. Both S and v behave anomalously at low temperatures: the thermopower shows a Kondo-like maximum at T = 37 K, while the Nernst coefficient becomes greatly enhanced and field dependent below T ~ 30 K. In the zero-T limit S/T and v/T diverge logarithmically, what is related to occurrence of the quantum critical point (QCP). Presented results suggest that the antiferromagnetic spin-density-wave scenario may be applicable to QCP in Ce2PdIn8.Comment: 5 pages, 3 figure

    Cutwidth: obstructions and algorithmic aspects

    Get PDF
    Cutwidth is one of the classic layout parameters for graphs. It measures how well one can order the vertices of a graph in a linear manner, so that the maximum number of edges between any prefix and its complement suffix is minimized. As graphs of cutwidth at most kk are closed under taking immersions, the results of Robertson and Seymour imply that there is a finite list of minimal immersion obstructions for admitting a cut layout of width at most kk. We prove that every minimal immersion obstruction for cutwidth at most kk has size at most 2O(k3log⁡k)2^{O(k^3\log k)}. As an interesting algorithmic byproduct, we design a new fixed-parameter algorithm for computing the cutwidth of a graph that runs in time 2O(k2log⁡k)⋅n2^{O(k^2\log k)}\cdot n, where kk is the optimum width and nn is the number of vertices. While being slower by a log⁡k\log k-factor in the exponent than the fastest known algorithm, given by Thilikos, Bodlaender, and Serna in [Cutwidth I: A linear time fixed parameter algorithm, J. Algorithms, 56(1):1--24, 2005] and [Cutwidth II: Algorithms for partial ww-trees of bounded degree, J. Algorithms, 56(1):25--49, 2005], our algorithm has the advantage of being simpler and self-contained; arguably, it explains better the combinatorics of optimum-width layouts

    Unifying parameter estimation and the Deutsch-Jozsa algorithm for continuous variables

    Get PDF
    We reveal a close relationship between quantum metrology and the Deutsch-Jozsa algorithm on continuous-variable quantum systems. We develop a general procedure, characterized by two parameters, that unifies parameter estimation and the Deutsch-Jozsa algorithm. Depending on which parameter we keep constant, the procedure implements either the parameter-estimation protocol or the Deutsch-Jozsa algorithm. The parameter-estimation part of the procedure attains the Heisenberg limit and is therefore optimal. Due to the use of approximate normalizable continuous-variable eigenstates, the Deutsch-Jozsa algorithm is probabilistic. The procedure estimates a value of an unknown parameter and solves the Deutsch-Jozsa problem without the use of any entanglement

    Entangled-state cryptographic protocol that remains secure even if nonlocal hidden variables exist and can be measured with arbitrary precision

    Full text link
    Standard quantum cryptographic protocols are not secure if one assumes that nonlocal hidden variables exist and can be measured with arbitrary precision. The security can be restored if one of the communicating parties randomly switches between two standard protocols.Comment: Shortened version, accepted in Phys. Rev.
    • 

    corecore