2,578 research outputs found

    A method to estimate the significance of coincident gravitational-wave observations from compact binary coalescence

    Full text link
    Coalescing compact binary systems consisting of neutron stars and/or black holes should be detectable with upcoming advanced gravitational-wave detectors such as LIGO, Virgo, GEO and {KAGRA}. Gravitational-wave experiments to date have been riddled with non-Gaussian, non-stationary noise that makes it challenging to ascertain the significance of an event. A popular method to estimate significance is to time shift the events collected between detectors in order to establish a false coincidence rate. Here we propose a method for estimating the false alarm probability of events using variables commonly available to search candidates that does not rely on explicitly time shifting the events while still capturing the non-Gaussianity of the data. We present a method for establishing a statistical detection of events in the case where several silver-plated (3--5σ\sigma) events exist but not necessarily any gold-plated (>5σ>5\sigma) events. We use LIGO data and a simulated, realistic, blind signal population to test our method

    Sweep maps: A continuous family of sorting algorithms

    Full text link
    We define a family of maps on lattice paths, called sweep maps, that assign levels to each step in the path and sort steps according to their level. Surprisingly, although sweep maps act by sorting, they appear to be bijective in general. The sweep maps give concise combinatorial formulas for the q,t-Catalan numbers, the higher q,t-Catalan numbers, the q,t-square numbers, and many more general polynomials connected to the nabla operator and rational Catalan combinatorics. We prove that many algorithms that have appeared in the literature (including maps studied by Andrews, Egge, Gorsky, Haglund, Hanusa, Jones, Killpatrick, Krattenthaler, Kremer, Orsina, Mazin, Papi, Vaille, and the present authors) are all special cases of the sweep maps or their inverses. The sweep maps provide a very simple unifying framework for understanding all of these algorithms. We explain how inversion of the sweep map (which is an open problem in general) can be solved in known special cases by finding a "bounce path" for the lattice paths under consideration. We also define a generalized sweep map acting on words over arbitrary alphabets with arbitrary weights, which is also conjectured to be bijective.Comment: 21 pages; full version of FPSAC 2014 extended abstrac

    Effect of Node-Degree Correlation on Synchronization of Identical Pulse-Coupled Oscillators

    Get PDF
    We explore the effect of correlations between the in and out degrees of random directed networks on the synchronization of identical pulse-coupled oscillators. Numerical experiments demonstrate that the proportion of initial conditions resulting in a globally synchronous state (prior to a large but finite time) is an increasing function of node-degree correlation. For those networks observed to globally synchronize, both the mean and standard deviation of time to synchronization are decreasing functions of node-degree correlation. Pulse-coupled oscillator networks with negatively correlated node degree often exhibit multiple coherent attracting states, with trajectories performing fast transitions between them. These effects of node-degree correlation on dynamics of pulse-coupled oscillators are consistent with aspects of network topology (e.g., the effect of node-degree correlation on the eigenvalues of the Laplacian matrix) that have been shown to affect synchronization in other contexts

    Stratosphere: Finding Vulnerable Cloud Storage Buckets

    Full text link
    Misconfigured cloud storage buckets have leaked hundreds of millions of medical, voter, and customer records. These breaches are due to a combination of easily-guessable bucket names and error-prone security configurations, which, together, allow attackers to easily guess and access sensitive data. In this work, we investigate the security of buckets, finding that prior studies have largely underestimated cloud insecurity by focusing on simple, easy-to-guess names. By leveraging prior work in the password analysis space, we introduce Stratosphere, a system that learns how buckets are named in practice in order to efficiently guess the names of vulnerable buckets. Using Stratosphere, we find wide-spread exploitation of buckets and vulnerable configurations continuing to increase over the years. We conclude with recommendations for operators, researchers, and cloud providers.Comment: Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses. 202

    The spectrum of excisive functors

    Full text link
    We prove a thick subcategory theorem for the category of dd-excisive functors from finite spectra to spectra. This generalizes the Hopkins-Smith thick subcategory theorem (the d=1d=1 case) and the C2C_2-equivariant thick subcategory theorem (the d=2d=2 case). We obtain our classification theorem by completely computing the Balmer spectrum of compact dd-excisive functors. A key ingredient is a non-abelian blueshift theorem for the generalized Tate construction associated to the family of non-transitive subgroups of products of symmetric groups. Also important are the techniques of tensor triangular geometry and striking analogies between functor calculus and equivariant homotopy theory. In particular, we introduce a functor calculus analogue of the Burnside ring and describe its Zariski spectrum \`{a} la Dress. The analogy with equivariant homotopy theory is strengthened further through two applications: We explain the effect of changing coefficients from spectra to HZ{\mathrm{H}\mathbb{Z}}-modules and we establish a functor calculus analogue of transchromatic Smith-Floyd theory as developed by Kuhn-Lloyd. Our work offers a new perspective on functor calculus which builds upon the previous approaches of Arone-Ching and Glasman.Comment: 89 pages; all comments welcom
    • …
    corecore