4,830 research outputs found
The Global Artificial Intelligence Revolution Challenges Patent Eligibility Laws
This Article examines patent eligibility jurisprudence of artificial intelligence in the United States, Europe, France, Japan, and Singapore. It identifies de facto requirements of patent-eligible artificial intelligence. It also examines the adaptability of patent eligibility jurisprudence to adapt with the growth of artificial intelligence
Branched twist spins and knot determinants
A branched twist spin is a generalization of twist spun knots, which appeared
in the study of locally smooth circle actions on the -sphere due to
Montgomery, Yang, Fintushel and Pao. In this paper, we give a sufficient
condition to distinguish non-equivalent, non-trivial branched twist spins by
using knot determinants. To prove the assertion, we give a presentation of the
fundamental group of the complement of a branched twist spin, which generalizes
a presentation of Plotnick, calculate the first elementary ideals and obtain
the condition of the knot determinants by substituting for the
indeterminate.Comment: 10 pages, 4 figure
Secure Grouping Protocol Using a Deck of Cards
We consider a problem, which we call secure grouping, of dividing a number of
parties into some subsets (groups) in the following manner: Each party has to
know the other members of his/her group, while he/she may not know anything
about how the remaining parties are divided (except for certain public
predetermined constraints, such as the number of parties in each group). In
this paper, we construct an information-theoretically secure protocol using a
deck of physical cards to solve the problem, which is jointly executable by the
parties themselves without a trusted third party. Despite the non-triviality
and the potential usefulness of the secure grouping, our proposed protocol is
fairly simple to describe and execute. Our protocol is based on algebraic
properties of conjugate permutations. A key ingredient of our protocol is our
new techniques to apply multiplication and inverse operations to hidden
permutations (i.e., those encoded by using face-down cards), which would be of
independent interest and would have various potential applications
AND Protocols Using Only Uniform Shuffles
Secure multi-party computation using a deck of playing cards has been a
subject of research since the "five-card trick" introduced by den Boer in 1989.
One of the main problems in card-based cryptography is to design
committed-format protocols to compute a Boolean AND operation subject to
different runtime and shuffle restrictions by using as few cards as possible.
In this paper, we introduce two AND protocols that use only uniform shuffles.
The first one requires four cards and is a restart-free Las Vegas protocol with
finite expected runtime. The second one requires five cards and always
terminates in finite time.Comment: This paper has appeared at CSR 201
Self-organization on social media: endo-exo bursts and baseline fluctuations
A salient dynamic property of social media is bursting behavior. In this
paper, we study bursting behavior in terms of the temporal relation between a
preceding baseline fluctuation and the successive burst response using a
frequency time series of 3,000 keywords on Twitter. We found that there is a
fluctuation threshold up to which the burst size increases as the fluctuation
increases and that above the threshold, there appears a variety of burst sizes.
We call this threshold the critical threshold. Investigating this threshold in
relation to endogenous bursts and exogenous bursts based on peak ratio and
burst size reveals that the bursts below this threshold are endogenously caused
and above this threshold, exogenous bursts emerge. Analysis of the 3,000
keywords shows that all the nouns have both endogenous and exogenous origins of
bursts and that each keyword has a critical threshold in the baseline
fluctuation value to distinguish between the two. Having a threshold for an
input value for activating the system implies that Twitter is an excitable
medium. These findings are useful for characterizing how excitable a keyword is
on Twitter and could be used, for example, to predict the response to
particular information on social media.Comment: Presented at WebAL-1: Workshop on Artificial Life and the Web 2014
(arXiv:1406.2507
- …