4,830 research outputs found

    The Global Artificial Intelligence Revolution Challenges Patent Eligibility Laws

    Get PDF
    This Article examines patent eligibility jurisprudence of artificial intelligence in the United States, Europe, France, Japan, and Singapore. It identifies de facto requirements of patent-eligible artificial intelligence. It also examines the adaptability of patent eligibility jurisprudence to adapt with the growth of artificial intelligence

    Branched twist spins and knot determinants

    Get PDF
    A branched twist spin is a generalization of twist spun knots, which appeared in the study of locally smooth circle actions on the 44-sphere due to Montgomery, Yang, Fintushel and Pao. In this paper, we give a sufficient condition to distinguish non-equivalent, non-trivial branched twist spins by using knot determinants. To prove the assertion, we give a presentation of the fundamental group of the complement of a branched twist spin, which generalizes a presentation of Plotnick, calculate the first elementary ideals and obtain the condition of the knot determinants by substituting −1-1 for the indeterminate.Comment: 10 pages, 4 figure

    Secure Grouping Protocol Using a Deck of Cards

    Full text link
    We consider a problem, which we call secure grouping, of dividing a number of parties into some subsets (groups) in the following manner: Each party has to know the other members of his/her group, while he/she may not know anything about how the remaining parties are divided (except for certain public predetermined constraints, such as the number of parties in each group). In this paper, we construct an information-theoretically secure protocol using a deck of physical cards to solve the problem, which is jointly executable by the parties themselves without a trusted third party. Despite the non-triviality and the potential usefulness of the secure grouping, our proposed protocol is fairly simple to describe and execute. Our protocol is based on algebraic properties of conjugate permutations. A key ingredient of our protocol is our new techniques to apply multiplication and inverse operations to hidden permutations (i.e., those encoded by using face-down cards), which would be of independent interest and would have various potential applications

    AND Protocols Using Only Uniform Shuffles

    Full text link
    Secure multi-party computation using a deck of playing cards has been a subject of research since the "five-card trick" introduced by den Boer in 1989. One of the main problems in card-based cryptography is to design committed-format protocols to compute a Boolean AND operation subject to different runtime and shuffle restrictions by using as few cards as possible. In this paper, we introduce two AND protocols that use only uniform shuffles. The first one requires four cards and is a restart-free Las Vegas protocol with finite expected runtime. The second one requires five cards and always terminates in finite time.Comment: This paper has appeared at CSR 201

    Self-organization on social media: endo-exo bursts and baseline fluctuations

    Full text link
    A salient dynamic property of social media is bursting behavior. In this paper, we study bursting behavior in terms of the temporal relation between a preceding baseline fluctuation and the successive burst response using a frequency time series of 3,000 keywords on Twitter. We found that there is a fluctuation threshold up to which the burst size increases as the fluctuation increases and that above the threshold, there appears a variety of burst sizes. We call this threshold the critical threshold. Investigating this threshold in relation to endogenous bursts and exogenous bursts based on peak ratio and burst size reveals that the bursts below this threshold are endogenously caused and above this threshold, exogenous bursts emerge. Analysis of the 3,000 keywords shows that all the nouns have both endogenous and exogenous origins of bursts and that each keyword has a critical threshold in the baseline fluctuation value to distinguish between the two. Having a threshold for an input value for activating the system implies that Twitter is an excitable medium. These findings are useful for characterizing how excitable a keyword is on Twitter and could be used, for example, to predict the response to particular information on social media.Comment: Presented at WebAL-1: Workshop on Artificial Life and the Web 2014 (arXiv:1406.2507
    • …
    corecore