12,036 research outputs found

    Extending Feynman's Formalisms for Modelling Human Joint Action Coordination

    Full text link
    The recently developed Life-Space-Foam approach to goal-directed human action deals with individual actor dynamics. This paper applies the model to characterize the dynamics of co-action by two or more actors. This dynamics is modelled by: (i) a two-term joint action (including cognitive/motivatonal potential and kinetic energy), and (ii) its associated adaptive path integral, representing an infinite--dimensional neural network. Its feedback adaptation loop has been derived from Bernstein's concepts of sensory corrections loop in human motor control and Brooks' subsumption architectures in robotics. Potential applications of the proposed model in human--robot interaction research are discussed. Keywords: Psycho--physics, human joint action, path integralsComment: 6 pages, Late

    Transformation laws of the components of classical and quantum fields and Heisenberg relations

    Full text link
    The paper recalls and point to the origin of the transformation laws of the components of classical and quantum fields. They are considered from the "standard" and fibre bundle point of view. The results are applied to the derivation of the Heisenberg relations in quite general setting, in particular, in the fibre bundle approach. All conclusions are illustrated in a case of transformations induced by the Poincar\'e group.Comment: 22 LaTeX pages. The packages AMS-LaTeX and amsfonts are required. For other papers on the same topic, view http://theo.inrne.bas.bg/~bozho/ . arXiv admin note: significant text overlap with arXiv:0809.017

    Detecting brute-force attacks on cryptocurrency wallets

    Full text link
    Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin. In this work, we consider a particular attack on wallets for collecting assets in a cryptocurrency network based on brute-force search attacks. Using Bitcoin as an example, we demonstrate that if the attack is implemented successfully, a legitimate user is able to prove that fact of this attack with a high probability. We also consider two options for modification of existing cryptocurrency protocols for dealing with this type of attacks. First, we discuss a modification that requires introducing changes in the Bitcoin protocol and allows diminishing the motivation to attack wallets. Second, an alternative option is the construction of special smart-contracts, which reward the users for providing evidence of the brute-force attack. The execution of this smart-contract can work as an automatic alarm that the employed cryptographic mechanisms, and (particularly) hash functions, have an evident vulnerability.Comment: 10 pages, 2 figures; published versio

    CacheZoom: How SGX Amplifies The Power of Cache Attacks

    Get PDF
    In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced. Intel proposed SGX to create a trusted execution environment within the processor. SGX relies on the hardware, and claims runtime protection even if the OS and other software components are malicious. However, SGX disregards side-channel attacks. We introduce a powerful cache side-channel attack that provides system adversaries a high resolution channel. Our attack tool named CacheZoom is able to virtually track all memory accesses of SGX enclaves with high spatial and temporal precision. As proof of concept, we demonstrate AES key recovery attacks on commonly used implementations including those that were believed to be resistant in previous scenarios. Our results show that SGX cannot protect critical data sensitive computations, and efficient AES key recovery is possible in a practical environment. In contrast to previous works which require hundreds of measurements, this is the first cache side-channel attack on a real system that can recover AES keys with a minimal number of measurements. We can successfully recover AES keys from T-Table based implementations with as few as ten measurements.Comment: Accepted at Conference on Cryptographic Hardware and Embedded Systems (CHES '17

    The Evolution of Distorted Rotating Black Holes III: Initial Data

    Get PDF
    In this paper we study a new family of black hole initial data sets corresponding to distorted ``Kerr'' black holes with moderate rotation parameters, and distorted Schwarzschild black holes with even- and odd-parity radiation. These data sets build on the earlier rotating black holes of Bowen and York and the distorted Brill wave plus black hole data sets. We describe the construction of this large family of rotating black holes. We present a systematic study of important properties of these data sets, such as the size and shape of their apparent horizons, and the maximum amount of radiation that can leave the system during evolution. These data sets should be a very useful starting point for studying the evolution of highly dynamical black holes and can easily be extended to 3D.Comment: 16 page

    On the structure of Clifford quantum cellular automata

    Full text link
    We study reversible quantum cellular automata with the restriction that these are also Clifford operations. This means that tensor products of Pauli operators (or discrete Weyl operators) are mapped to tensor products of Pauli operators. Therefore Clifford quantum cellular automata are induced by symplectic cellular automata in phase space. We characterize these symplectic cellular automata and find that all possible local rules must be, up to some global shift, reflection invariant with respect to the origin. In the one dimensional case we also find that every uniquely determined and translationally invariant stabilizer state can be prepared from a product state by a single Clifford cellular automaton timestep, thereby characterizing these class of stabilizer states, and we show that all 1D Clifford quantum cellular automata are generated by a few elementary operations. We also show that the correspondence between translationally invariant stabilizer states and translationally invariant Clifford operations holds for periodic boundary conditions.Comment: 28 pages, 2 figures, LaTe

    Splines and Wavelets on Geophysically Relevant Manifolds

    Full text link
    Analysis on the unit sphere S2\mathbb{S}^{2} found many applications in seismology, weather prediction, astrophysics, signal analysis, crystallography, computer vision, computerized tomography, neuroscience, and statistics. In the last two decades, the importance of these and other applications triggered the development of various tools such as splines and wavelet bases suitable for the unit spheres S2\mathbb{S}^{2},   S3\>\>\mathbb{S}^{3} and the rotation group SO(3)SO(3). Present paper is a summary of some of results of the author and his collaborators on generalized (average) variational splines and localized frames (wavelets) on compact Riemannian manifolds. The results are illustrated by applications to Radon-type transforms on Sd\mathbb{S}^{d} and SO(3)SO(3).Comment: The final publication is available at http://www.springerlink.co
    • …
    corecore