6,516 research outputs found

    The evolutionary dynamics of tolerance

    Get PDF
    This paper incorporates the phenomenon of tolerance, as the ability to accept diversity, into an economic analysis showing how different aptitudes to trust and cooperation can affect economic outcomes. In the economic system we propose, tolerance is associated with the different weight that agents attribute to their own nature and to the institutional parameters in their utility function. We thus construct a model of overlapping generations, showing that the incentives that influence descendants’ predisposition to tolerance depend on both institutional factors, where behaviour is imposed by rules, and on social (or cultural) factors, found in popular customs and established traditions. Our study highlights the absolute impossibility of affirming tolerance through formal rules. In fact, intolerance is a persistent attitude and its control is only possible through constant and continuous interventions on the educational processes of new generations (intolerance trap).Tolerance; Evolutionary dynamics; Imperfect empathy

    Cooperative sensing of spectrum opportunities

    Get PDF
    Reliability and availability of sensing information gathered from local spectrum sensing (LSS) by a single Cognitive Radio is strongly affected by the propagation conditions, period of sensing, and geographical position of the device. For this reason, cooperative spectrum sensing (CSS) was largely proposed in order to improve LSS performance by using cooperation between Secondary Users (SUs). The goal of this chapter is to provide a general analysis on CSS for cognitive radio networks (CRNs). Firstly, the theoretical system model for centralized CSS is introduced, together with a preliminary discussion on several fusion rules and operative modes. Moreover, three main aspects of CSS that substantially differentiate the theoretical model from realistic application scenarios are analyzed: (i) the presence of spatiotemporal correlation between decisions by different SUs; (ii) the possible mobility of SUs; and (iii) the nonideality of the control channel between the SUs and the Fusion Center (FC). For each aspect, a possible practical solution for network organization is presented, showing that, in particular for the first two aspects, cluster-based CSS, in which sensing SUs are properly chosen, could mitigate the impact of such realistic assumptions

    A lending scheme for a system of interconnected banks with probabilistic constraints of failure

    Get PDF
    We derive a closed form solution for an optimal control problem related to an interbank lending schemes subject to terminal probability constraints on the failure of banks which are interconnectedthrough a financial network. The derived solution applies to a real banks network by obtaining ageneral solution when the aforementioned probability constraints are assumed for all the banks. We also present a direct method to compute the systemic relevance parameter for each bank within the networ

    COLLABORATIVE TOOLS FOR EDUCATION IN PLANNING: THE GISCAKE PLATFORM

    Get PDF

    SAFE: Self-Attentive Function Embeddings for Binary Similarity

    Get PDF
    The binary similarity problem consists in determining if two functions are similar by only considering their compiled form. Advanced techniques for binary similarity recently gained momentum as they can be applied in several fields, such as copyright disputes, malware analysis, vulnerability detection, etc., and thus have an immediate practical impact. Current solutions compare functions by first transforming their binary code in multi-dimensional vector representations (embeddings), and then comparing vectors through simple and efficient geometric operations. However, embeddings are usually derived from binary code using manual feature extraction, that may fail in considering important function characteristics, or may consider features that are not important for the binary similarity problem. In this paper we propose SAFE, a novel architecture for the embedding of functions based on a self-attentive neural network. SAFE works directly on disassembled binary functions, does not require manual feature extraction, is computationally more efficient than existing solutions (i.e., it does not incur in the computational overhead of building or manipulating control flow graphs), and is more general as it works on stripped binaries and on multiple architectures. We report the results from a quantitative and qualitative analysis that show how SAFE provides a noticeable performance improvement with respect to previous solutions. Furthermore, we show how clusters of our embedding vectors are closely related to the semantic of the implemented algorithms, paving the way for further interesting applications (e.g. semantic-based binary function search).Comment: Published in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) 201
    • …
    corecore