47 research outputs found
Lessons Learned About Building an ASSERTive Community
One of our observations in this lessons learned paper is that there is underwhelming faculty development related to scholarship other than on how to submit and sometimes how to write proposals. This de facto service model misses everything outside of the proposal-writing process; which is the least important, but is often the most celebrated, rewarded, and supported phase. Inspired by national Centers for Teaching & Learning, and modeled after the emerging Communities of Transformation literature, we are piloting a Center for Transformative Research at Boise State University. The vision of our Center is to build and sustain an ASSERTive community -- for Aligning Stakeholders and Structures to Enable Research Transformation (ASSERT). Faculty members from across campus were recruited to participate as fellows to explore what it means to be a scholar and how to move a bold and transformative idea forward. To minimize the energy to apply, the application process included an Instagram post, Twitter response, and/or haiku. Fifteen faculty were selected for the cohort of fellows. To ensure university-wide accountability, a memorandum of understanding was signed by each fellow, as well as their Provost, Vice President for Research & Economic Development, College or School Dean, and Department Chair. Once signed, each fellow was asked to complete a survey and participate in an individual structured interview with the PI and co-PI. These allowed us to determine the specific needs of each fellow, providing validation or perhaps challenging our a priori observations of risk inhibitors at Boise State that prevent germination of bold ideas. By studying the fellows, we were able to look at what may inhibit them from taking risks – personal attributes and beliefs, and structural and cultural issues within their academic units, the university, and in their academic fields. Based on the survey results and individual structured interviews, programming was developed and tailored to the needs of the fellows. An off-campus retreat was held. In addition to the off-campus retreat, on-campus workshops were custom-made for the fellows and included: (a) how to germinate transformative ideas by no longer seeing ideas as precious; (b) how to become an effective collaborator by adapting the Toolbox Project; (c) how to move ideas forward by drawing on the game “Chutes & Ladders” where the chutes represent common obstacles and the ladders are shortcuts; (d) how to manage time at work, and in life; and (e) how to classify, understand, and know when and how to implement intentional versus emergent research strategies. As a culminating activity, the faculty then pitched their ideas to university and community leadership. In conjunction with this pitch event, an advocate was assigned to each fellow to help connect their ideas to future resources. From our motivation to our faculty application to our custom learning community, lessons learned will be shared via a lightning talk
Quantum learning: optimal classification of qubit states
Pattern recognition is a central topic in Learning Theory with numerous
applications such as voice and text recognition, image analysis, computer
diagnosis. The statistical set-up in classification is the following: we are
given an i.i.d. training set where
represents a feature and is a label attached to that
feature. The underlying joint distribution of is unknown, but we can
learn about it from the training set and we aim at devising low error
classifiers used to predict the label of new incoming features.
Here we solve a quantum analogue of this problem, namely the classification
of two arbitrary unknown qubit states. Given a number of `training' copies from
each of the states, we would like to `learn' about them by performing a
measurement on the training set. The outcome is then used to design mesurements
for the classification of future systems with unknown labels. We find the
asymptotically optimal classification strategy and show that typically, it
performs strictly better than a plug-in strategy based on state estimation.
The figure of merit is the excess risk which is the difference between the
probability of error and the probability of error of the optimal measurement
when the states are known, that is the Helstrom measurement. We show that the
excess risk has rate and compute the exact constant of the rate.Comment: 24 pages, 4 figure
A Novel Clustering Algorithm Based on Quantum Games
Enormous successes have been made by quantum algorithms during the last
decade. In this paper, we combine the quantum game with the problem of data
clustering, and then develop a quantum-game-based clustering algorithm, in
which data points in a dataset are considered as players who can make decisions
and implement quantum strategies in quantum games. After each round of a
quantum game, each player's expected payoff is calculated. Later, he uses a
link-removing-and-rewiring (LRR) function to change his neighbors and adjust
the strength of links connecting to them in order to maximize his payoff.
Further, algorithms are discussed and analyzed in two cases of strategies, two
payoff matrixes and two LRR functions. Consequently, the simulation results
have demonstrated that data points in datasets are clustered reasonably and
efficiently, and the clustering algorithms have fast rates of convergence.
Moreover, the comparison with other algorithms also provides an indication of
the effectiveness of the proposed approach.Comment: 19 pages, 5 figures, 5 table
Quantum Tasks in Minkowski Space
The fundamental properties of quantum information and its applications to
computing and cryptography have been greatly illuminated by considering
information-theoretic tasks that are provably possible or impossible within
non-relativistic quantum mechanics. I describe here a general framework for
defining tasks within (special) relativistic quantum theory and illustrate it
with examples from relativistic quantum cryptography and relativistic
distributed quantum computation. The framework gives a unified description of
all tasks previously considered and also defines a large class of new questions
about the properties of quantum information in relation to Minkowski causality.
It offers a way of exploring interesting new fundamental tasks and
applications, and also highlights the scope for a more systematic understanding
of the fundamental information-theoretic properties of relativistic quantum
theory
A Literature Survey and Classifications on Data Deanonymisation
The problem of disclosing private anonymous data has become increasingly serious particularly with the possibility of carrying out deanonymisation attacks on publishing data. The related work available in the literature is inadequate in terms of the number of techniques analysed, and is limited to certain contexts such as Online Social Networks. We survey a large number of state-of-the-art techniques of deanonymisation achieved in various methods and on different types of data. Our aim is to build a comprehensive understanding about the problem. For this survey, we propose a framework to guide a thorough analysis and classifications. We are interested in classifying deanonymisation approaches based on type and source of auxiliary information and on the structure of target datasets. Moreover, potential attacks, threats and some suggested assistive techniques are identified. This can inform the research in gaining an understanding of the deanonymisation problem and assist in the advancement of privacy protection
Dynamic Modeling of Location Privacy Protection Mechanisms
International audienceMobile applications tend to ask for users’ location in order to improve the service they provide. However, aside from increasing their service utility, they may also store these data, analyze them or share them with external parties. These privacy threats for users are a hot topic of research, leading to the development of so called Location Privacy Protection Mechanisms. LPPMs often are configurable algorithms that enable the tuning of the privacy protection they provide and thus the leveraging of the service utility. However, they usually do not provide ways to measure the achieved privacy in practice for all users of mobile devices, and even less clues on how a given configuration will impact privacy of the data given the specificities of everyone’s mobility. Moreover, as most Location Based Services require the user position in real time, these measures and predictions should be achieved in real time. In this paper we present a metric to evaluate privacy of obfuscated data based on users’ points of interest as well as a predictive model of the impact of a LPPM on these measure; both working in a real time fashion. The evaluation of the paper’s contributions is done using the state of the art LPPM Geo-I on synthetic mobility data generated to be representative of real-life users’ movements. Results highlight the relevance of the metric to capture privacy, the fitting of the model to experimental data, and the feasibility of the on-line mechanisms due to their low computing complexity