47 research outputs found

    Lessons Learned About Building an ASSERTive Community

    Get PDF
    One of our observations in this lessons learned paper is that there is underwhelming faculty development related to scholarship other than on how to submit and sometimes how to write proposals. This de facto service model misses everything outside of the proposal-writing process; which is the least important, but is often the most celebrated, rewarded, and supported phase. Inspired by national Centers for Teaching & Learning, and modeled after the emerging Communities of Transformation literature, we are piloting a Center for Transformative Research at Boise State University. The vision of our Center is to build and sustain an ASSERTive community -- for Aligning Stakeholders and Structures to Enable Research Transformation (ASSERT). Faculty members from across campus were recruited to participate as fellows to explore what it means to be a scholar and how to move a bold and transformative idea forward. To minimize the energy to apply, the application process included an Instagram post, Twitter response, and/or haiku. Fifteen faculty were selected for the cohort of fellows. To ensure university-wide accountability, a memorandum of understanding was signed by each fellow, as well as their Provost, Vice President for Research & Economic Development, College or School Dean, and Department Chair. Once signed, each fellow was asked to complete a survey and participate in an individual structured interview with the PI and co-PI. These allowed us to determine the specific needs of each fellow, providing validation or perhaps challenging our a priori observations of risk inhibitors at Boise State that prevent germination of bold ideas. By studying the fellows, we were able to look at what may inhibit them from taking risks – personal attributes and beliefs, and structural and cultural issues within their academic units, the university, and in their academic fields. Based on the survey results and individual structured interviews, programming was developed and tailored to the needs of the fellows. An off-campus retreat was held. In addition to the off-campus retreat, on-campus workshops were custom-made for the fellows and included: (a) how to germinate transformative ideas by no longer seeing ideas as precious; (b) how to become an effective collaborator by adapting the Toolbox Project; (c) how to move ideas forward by drawing on the game “Chutes & Ladders” where the chutes represent common obstacles and the ladders are shortcuts; (d) how to manage time at work, and in life; and (e) how to classify, understand, and know when and how to implement intentional versus emergent research strategies. As a culminating activity, the faculty then pitched their ideas to university and community leadership. In conjunction with this pitch event, an advocate was assigned to each fellow to help connect their ideas to future resources. From our motivation to our faculty application to our custom learning community, lessons learned will be shared via a lightning talk

    Quantum learning: optimal classification of qubit states

    Full text link
    Pattern recognition is a central topic in Learning Theory with numerous applications such as voice and text recognition, image analysis, computer diagnosis. The statistical set-up in classification is the following: we are given an i.i.d. training set (X1,Y1),...(Xn,Yn)(X_{1},Y_{1}),... (X_{n},Y_{n}) where XiX_{i} represents a feature and Yi{0,1}Y_{i}\in \{0,1\} is a label attached to that feature. The underlying joint distribution of (X,Y)(X,Y) is unknown, but we can learn about it from the training set and we aim at devising low error classifiers f:XYf:X\to Y used to predict the label of new incoming features. Here we solve a quantum analogue of this problem, namely the classification of two arbitrary unknown qubit states. Given a number of `training' copies from each of the states, we would like to `learn' about them by performing a measurement on the training set. The outcome is then used to design mesurements for the classification of future systems with unknown labels. We find the asymptotically optimal classification strategy and show that typically, it performs strictly better than a plug-in strategy based on state estimation. The figure of merit is the excess risk which is the difference between the probability of error and the probability of error of the optimal measurement when the states are known, that is the Helstrom measurement. We show that the excess risk has rate n1n^{-1} and compute the exact constant of the rate.Comment: 24 pages, 4 figure

    A Novel Clustering Algorithm Based on Quantum Games

    Full text link
    Enormous successes have been made by quantum algorithms during the last decade. In this paper, we combine the quantum game with the problem of data clustering, and then develop a quantum-game-based clustering algorithm, in which data points in a dataset are considered as players who can make decisions and implement quantum strategies in quantum games. After each round of a quantum game, each player's expected payoff is calculated. Later, he uses a link-removing-and-rewiring (LRR) function to change his neighbors and adjust the strength of links connecting to them in order to maximize his payoff. Further, algorithms are discussed and analyzed in two cases of strategies, two payoff matrixes and two LRR functions. Consequently, the simulation results have demonstrated that data points in datasets are clustered reasonably and efficiently, and the clustering algorithms have fast rates of convergence. Moreover, the comparison with other algorithms also provides an indication of the effectiveness of the proposed approach.Comment: 19 pages, 5 figures, 5 table

    Quantum Tasks in Minkowski Space

    Full text link
    The fundamental properties of quantum information and its applications to computing and cryptography have been greatly illuminated by considering information-theoretic tasks that are provably possible or impossible within non-relativistic quantum mechanics. I describe here a general framework for defining tasks within (special) relativistic quantum theory and illustrate it with examples from relativistic quantum cryptography and relativistic distributed quantum computation. The framework gives a unified description of all tasks previously considered and also defines a large class of new questions about the properties of quantum information in relation to Minkowski causality. It offers a way of exploring interesting new fundamental tasks and applications, and also highlights the scope for a more systematic understanding of the fundamental information-theoretic properties of relativistic quantum theory

    A Literature Survey and Classifications on Data Deanonymisation

    Get PDF
    The problem of disclosing private anonymous data has become increasingly serious particularly with the possibility of carrying out deanonymisation attacks on publishing data. The related work available in the literature is inadequate in terms of the number of techniques analysed, and is limited to certain contexts such as Online Social Networks. We survey a large number of state-of-the-art techniques of deanonymisation achieved in various methods and on different types of data. Our aim is to build a comprehensive understanding about the problem. For this survey, we propose a framework to guide a thorough analysis and classifications. We are interested in classifying deanonymisation approaches based on type and source of auxiliary information and on the structure of target datasets. Moreover, potential attacks, threats and some suggested assistive techniques are identified. This can inform the research in gaining an understanding of the deanonymisation problem and assist in the advancement of privacy protection

    A survey of results on mobile phone datasets analysis

    Get PDF

    Dynamic Modeling of Location Privacy Protection Mechanisms

    No full text
    International audienceMobile applications tend to ask for users’ location in order to improve the service they provide. However, aside from increasing their service utility, they may also store these data, analyze them or share them with external parties. These privacy threats for users are a hot topic of research, leading to the development of so called Location Privacy Protection Mechanisms. LPPMs often are configurable algorithms that enable the tuning of the privacy protection they provide and thus the leveraging of the service utility. However, they usually do not provide ways to measure the achieved privacy in practice for all users of mobile devices, and even less clues on how a given configuration will impact privacy of the data given the specificities of everyone’s mobility. Moreover, as most Location Based Services require the user position in real time, these measures and predictions should be achieved in real time. In this paper we present a metric to evaluate privacy of obfuscated data based on users’ points of interest as well as a predictive model of the impact of a LPPM on these measure; both working in a real time fashion. The evaluation of the paper’s contributions is done using the state of the art LPPM Geo-I on synthetic mobility data generated to be representative of real-life users’ movements. Results highlight the relevance of the metric to capture privacy, the fitting of the model to experimental data, and the feasibility of the on-line mechanisms due to their low computing complexity
    corecore