7,257 research outputs found

    Quantifying Timing Leaks and Cost Optimisation

    Full text link
    We develop a new notion of security against timing attacks where the attacker is able to simultaneously observe the execution time of a program and the probability of the values of low variables. We then show how to measure the security of a program with respect to this notion via a computable estimate of the timing leakage and use this estimate for cost optimisation.Comment: 16 pages, 2 figures, 4 tables. A shorter version is included in the proceedings of ICICS'08 - 10th International Conference on Information and Communications Security, 20-22 October, 2008 Birmingham, U

    Probabilistic abstract interpretation: From trace semantics to DTMC’s and linear regression

    Get PDF
    In order to perform probabilistic program analysis we need to consider probabilistic languages or languages with a probabilistic semantics, as well as a corresponding framework for the analysis which is able to accommodate probabilistic properties and properties of probabilistic computations. To this purpose we investigate the relationship between three different types of probabilistic semantics for a core imperative language, namely Kozen’s Fixpoint Semantics, our Linear Operator Semantics and probabilistic versions of Maximal Trace Semantics. We also discuss the relationship between Probabilistic Abstract Interpretation (PAI) and statistical or linear regression analysis. While classical Abstract Interpretation, based on Galois connection, allows only for worst-case analyses, the use of the Moore-Penrose pseudo inverse in PAI opens the possibility of exploiting statistical and noisy observations in order to analyse and identify various system properties

    The second moment of the pion's distribution amplitude

    Full text link
    We present preliminary results for the second moment of the pion's distribution amplitude. The lattice formulation and the phenomenological implications are briefly reviewed, with special emphasis on some subtleties that arise when the Lorentz group is replaced by the hypercubic group. Having analysed more than half of the available configurations, the result obtained is \xi^2_L = 0.06 \pm 0.02.Comment: Lattice 99 (matrix elements), 3 page

    Information Security as Strategic (In)effectivity

    Full text link
    Security of information flow is commonly understood as preventing any information leakage, regardless of how grave or harmless consequences the leakage can have. In this work, we suggest that information security is not a goal in itself, but rather a means of preventing potential attackers from compromising the correct behavior of the system. To formalize this, we first show how two information flows can be compared by looking at the adversary's ability to harm the system. Then, we propose that the information flow in a system is effectively information-secure if it does not allow for more harm than its idealized variant based on the classical notion of noninterference

    Mode Confinement in Photonic Quasi-Crystal Point-Defect Cavities for Particle Accelerators

    Full text link
    In this Letter, we present a study of the confinement properties of point-defect resonators in finite-size photonic-bandgap structures composed of aperiodic arrangements of dielectric rods, with special emphasis on their use for the design of cavities for particle accelerators. Specifically, for representative geometries, we study the properties of the fundamental mode (as a function of the filling fraction, structure size, and losses) via 2-D and 3-D full-wave numerical simulations, as well as microwave measurements at room temperature. Results indicate that, for reduced-size structures, aperiodic geometries exhibit superior confinement properties by comparison with periodic ones.Comment: 4 pages, 4 figures, accepted for publication in Applied Physics Letter

    Linear Superiorization for Infeasible Linear Programming

    Full text link
    Linear superiorization (abbreviated: LinSup) considers linear programming (LP) problems wherein the constraints as well as the objective function are linear. It allows to steer the iterates of a feasibility-seeking iterative process toward feasible points that have lower (not necessarily minimal) values of the objective function than points that would have been reached by the same feasiblity-seeking iterative process without superiorization. Using a feasibility-seeking iterative process that converges even if the linear feasible set is empty, LinSup generates an iterative sequence that converges to a point that minimizes a proximity function which measures the linear constraints violation. In addition, due to LinSup's repeated objective function reduction steps such a point will most probably have a reduced objective function value. We present an exploratory experimental result that illustrates the behavior of LinSup on an infeasible LP problem.Comment: arXiv admin note: substantial text overlap with arXiv:1612.0653

    An Algorithmic Approach to Quantum Field Theory

    Full text link
    The lattice formulation provides a way to regularize, define and compute the Path Integral in a Quantum Field Theory. In this paper we review the theoretical foundations and the most basic algorithms required to implement a typical lattice computation, including the Metropolis, the Gibbs sampling, the Minimal Residual, and the Stabilized Biconjugate inverters. The main emphasis is on gauge theories with fermions such as QCD. We also provide examples of typical results from lattice QCD computations for quantities of phenomenological interest.Comment: 44 pages, to be published in IJMP

    One size doesn’t fit all: the influence of supervisors’ power tactics and subordinates’ need for cognitive closure on burnout and stress

    Get PDF
    The present research investigated the notion of fit between supervisors’ power tactics and subordinates’ need for cognitive closure (NFCC) on subordinates’ burnout and stress. Subordinates who tend to avoid ambiguity (high NFCC) were expected to experience relatively less burnout (Study 1) and stress (Study 2) if their supervisors utilize harsh (controlling and unequivocal) power tactics and more burnout and stress if their supervisors utilize soft (autonomy-supportive and equivocal) power tactics. In contrast, it was expected that subordinates who avoid firm and binding conclusions (low NFCC) would experience relatively less burnout and stress if their supervisors use soft power tactics and more burnout and stress if they use harsh power tactics. Two studies conducted in diverse organizational settings supported these hypotheses. Collectively, these results support the conclusion that soft (vs. harsh) power tactics are not always associated with better (vs. worse) organizational outcomes. Theoretical and practical implications for organizations are discussed
    corecore