2,578 research outputs found
A method to estimate the significance of coincident gravitational-wave observations from compact binary coalescence
Coalescing compact binary systems consisting of neutron stars and/or black
holes should be detectable with upcoming advanced gravitational-wave detectors
such as LIGO, Virgo, GEO and {KAGRA}. Gravitational-wave experiments to date
have been riddled with non-Gaussian, non-stationary noise that makes it
challenging to ascertain the significance of an event. A popular method to
estimate significance is to time shift the events collected between detectors
in order to establish a false coincidence rate. Here we propose a method for
estimating the false alarm probability of events using variables commonly
available to search candidates that does not rely on explicitly time shifting
the events while still capturing the non-Gaussianity of the data. We present a
method for establishing a statistical detection of events in the case where
several silver-plated (3--5) events exist but not necessarily any
gold-plated () events. We use LIGO data and a simulated, realistic,
blind signal population to test our method
Sweep maps: A continuous family of sorting algorithms
We define a family of maps on lattice paths, called sweep maps, that assign
levels to each step in the path and sort steps according to their level.
Surprisingly, although sweep maps act by sorting, they appear to be bijective
in general. The sweep maps give concise combinatorial formulas for the
q,t-Catalan numbers, the higher q,t-Catalan numbers, the q,t-square numbers,
and many more general polynomials connected to the nabla operator and rational
Catalan combinatorics. We prove that many algorithms that have appeared in the
literature (including maps studied by Andrews, Egge, Gorsky, Haglund, Hanusa,
Jones, Killpatrick, Krattenthaler, Kremer, Orsina, Mazin, Papi, Vaille, and the
present authors) are all special cases of the sweep maps or their inverses. The
sweep maps provide a very simple unifying framework for understanding all of
these algorithms. We explain how inversion of the sweep map (which is an open
problem in general) can be solved in known special cases by finding a "bounce
path" for the lattice paths under consideration. We also define a generalized
sweep map acting on words over arbitrary alphabets with arbitrary weights,
which is also conjectured to be bijective.Comment: 21 pages; full version of FPSAC 2014 extended abstrac
Effect of Node-Degree Correlation on Synchronization of Identical Pulse-Coupled Oscillators
We explore the effect of correlations between the in and out degrees of random directed networks on the synchronization of identical pulse-coupled oscillators. Numerical experiments demonstrate that the proportion of initial conditions resulting in a globally synchronous state (prior to a large but finite time) is an increasing function of node-degree correlation. For those networks observed to globally synchronize, both the mean and standard deviation of time to synchronization are decreasing functions of node-degree correlation. Pulse-coupled oscillator networks with negatively correlated node degree often exhibit multiple coherent attracting states, with trajectories performing fast transitions between them. These effects of node-degree correlation on dynamics of pulse-coupled oscillators are consistent with aspects of network topology (e.g., the effect of node-degree correlation on the eigenvalues of the Laplacian matrix) that have been shown to affect synchronization in other contexts
Stratosphere: Finding Vulnerable Cloud Storage Buckets
Misconfigured cloud storage buckets have leaked hundreds of millions of
medical, voter, and customer records. These breaches are due to a combination
of easily-guessable bucket names and error-prone security configurations,
which, together, allow attackers to easily guess and access sensitive data. In
this work, we investigate the security of buckets, finding that prior studies
have largely underestimated cloud insecurity by focusing on simple,
easy-to-guess names. By leveraging prior work in the password analysis space,
we introduce Stratosphere, a system that learns how buckets are named in
practice in order to efficiently guess the names of vulnerable buckets. Using
Stratosphere, we find wide-spread exploitation of buckets and vulnerable
configurations continuing to increase over the years. We conclude with
recommendations for operators, researchers, and cloud providers.Comment: Proceedings of the 24th International Symposium on Research in
Attacks, Intrusions and Defenses. 202
The spectrum of excisive functors
We prove a thick subcategory theorem for the category of -excisive
functors from finite spectra to spectra. This generalizes the Hopkins-Smith
thick subcategory theorem (the case) and the -equivariant thick
subcategory theorem (the case). We obtain our classification theorem by
completely computing the Balmer spectrum of compact -excisive functors. A
key ingredient is a non-abelian blueshift theorem for the generalized Tate
construction associated to the family of non-transitive subgroups of products
of symmetric groups. Also important are the techniques of tensor triangular
geometry and striking analogies between functor calculus and equivariant
homotopy theory. In particular, we introduce a functor calculus analogue of the
Burnside ring and describe its Zariski spectrum \`{a} la Dress. The analogy
with equivariant homotopy theory is strengthened further through two
applications: We explain the effect of changing coefficients from spectra to
-modules and we establish a functor calculus analogue
of transchromatic Smith-Floyd theory as developed by Kuhn-Lloyd. Our work
offers a new perspective on functor calculus which builds upon the previous
approaches of Arone-Ching and Glasman.Comment: 89 pages; all comments welcom
- …