25 research outputs found

    Stranger Things about Forcing without AC

    Full text link
    Typically, set theorists reason about forcing constructions in the context of ZFC. We show that without AC, several simple properties of forcing posets fail to hold, one of which answers Miller's question from arXiv:0704.3998.Comment: 5 page

    Many Different Uniformity Numbers of Yorioka Ideals

    Full text link
    Using a countable support product of creature forcing posets, we show that consistently, for uncountably many different functions the associated Yorioka ideals' uniformity numbers can be pairwise different. In addition we show that, in the same forcing extension, for two other types of simple cardinal characteristics parametrised by reals (localisation and anti-localisation cardinals), for uncountably many parameters the corresponding cardinals are pairwise different.Comment: 29 pages, 4 figure

    "Part Man, Part Machine, All Cop": Automation in Policing

    Full text link
    Digitisation, automation and datafication permeate policing and justice more and more each year -- from predictive policing methods through recidivism prediction to automated biometric identification at the border. The sociotechnical issues surrounding the use of such systems raise questions and reveal problems, both old and new. Our article reviews contemporary issues surrounding automation in policing and the legal system, finds common issues and themes in various different examples, introduces the distinction between human "retail bias" and algorithmic "wholesale bias", and argues for shifting the viewpoint on the debate to focus on both workers' rights and organisational responsibility as well as fundamental rights and the right to an effective remedy.Comment: 21 page

    More on Halfway New Cardinal Characteristics

    Full text link
    We continue investigating variants of the splitting and reaping numbers introduced in arXiv:1808.02442. In particular, answering a question raised there, we prove the consistency of cof(M)<s12\mathrm{cof}(\mathcal{M})<\mathfrak{s}_{\frac{1}{2}} and of r12<add(M)\mathfrak{r}_{\frac{1}{2}}<\mathrm{add}(\mathcal{M}). Moreover, we discuss their natural generalisations sρ\mathfrak{s}_\rho and rρ\mathfrak{r}_\rho for ρ(0,1)\rho\in (0,1), and show that rρ\mathfrak{r}_\rho does not depend on ρ\rho.Comment: 14 pages, 2 figure

    Towards a Critical Open-Source Software Database

    Full text link
    Open-source software (OSS) plays a vital role in the modern software ecosystem. However, the maintenance and sustainability of OSS projects can be challenging. In this paper, we present the CrOSSD project, which aims to build a database of OSS projects and measure their current project "health" status. In the project, we will use both quantitative and qualitative metrics to evaluate the health of OSS projects. The quantitative metrics will be gathered through automated crawling of meta information such as the number of contributors, commits and lines of code. Qualitative metrics will be gathered for selected "critical" projects through manual analysis and automated tools, including aspects such as sustainability, funding, community engagement and adherence to security policies. The results of the analysis will be presented on a user-friendly web platform, which will allow users to view the health of individual OSS projects as well as the overall health of the OSS ecosystem. With this approach, the CrOSSD project provides a comprehensive and up-to-date view of the health of OSS projects, making it easier for developers, maintainers and other stakeholders to understand the health of OSS projects and make informed decisions about their use and maintenance.Comment: 4 pages, 1 figur

    Delete My Account: Impact of Data Deletion on Machine Learning Classifiers

    Full text link
    Users are more aware than ever of the importance of their own data, thanks to reports about security breaches and leaks of private, often sensitive data in recent years. Additionally, the GDPR has been in effect in the European Union for over three years and many people have encountered its effects in one way or another. Consequently, more and more users are actively protecting their personal data. One way to do this is to make of the right to erasure guaranteed in the GDPR, which has potential implications for a number of different fields, such as big data and machine learning. Our paper presents an in-depth analysis about the impact of the use of the right to erasure on the performance of machine learning models on classification tasks. We conduct various experiments utilising different datasets as well as different machine learning algorithms to analyse a variety of deletion behaviour scenarios. Due to the lack of credible data on actual user behaviour, we make reasonable assumptions for various deletion modes and biases and provide insight into the effects of different plausible scenarios for right to erasure usage on data quality of machine learning. Our results show that the impact depends strongly on the amount of data deleted, the particular characteristics of the dataset and the bias chosen for deletion and assumptions on user behaviour.Comment: 14 pages, 14 figure
    corecore