934,444 research outputs found
Existence of APAV(q,k) with q a prime power ≡5(mod8) and k≡1(mod4)
AbstractStinson introduced authentication perpendicular arrays APAλ(t,k,v), as a special kind of perpendicular arrays, to construct authentication and secrecy codes. Ge and Zhu introduced APAV(q,k) to study APA1(2,k,v) for k=5, 7. Chen and Zhu determined the existence of APAV(q,k) with q a prime power ≡3(mod4) and odd k>1. In this article, we show that for any prime power q≡5(mod8) and any k≡1(mod4) there exists an APAV(q,k) whenever q>((E+E2+4F)/2)2, where E=[(7k−23)m+3]25m−3, F=m(2m+1)(k−3)25m and m=(k−1)/4
An AI for a Modification of Dou Di Zhu
We describe our implementation of AIs for the Chinese game Dou Di Zhu. Dou Di Zhu is a three-player game played with a standard 52 card deck together with two jokers. One player acts as a landlord and has the advantage of receiving three extra cards, the other two players play as peasants. We designed and implemented a Deep Q-learning Neural Network (DQN) agent to play the Dou Di Zhu. At the same time, we also designed and made a pure Q-learning based agent as well as a Zhou rule-based agent to compare with our main agent. We show the DQN model has a 10% higher win rate than the Q-learning model and Zhou rule-based model when playing as the landlord, and a 5% higher win rate than the other models when playing as a peasant
Game Theory Meets Network Security: A Tutorial at ACM CCS
The increasingly pervasive connectivity of today's information systems brings
up new challenges to security. Traditional security has accomplished a long way
toward protecting well-defined goals such as confidentiality, integrity,
availability, and authenticity. However, with the growing sophistication of the
attacks and the complexity of the system, the protection using traditional
methods could be cost-prohibitive. A new perspective and a new theoretical
foundation are needed to understand security from a strategic and
decision-making perspective. Game theory provides a natural framework to
capture the adversarial and defensive interactions between an attacker and a
defender. It provides a quantitative assessment of security, prediction of
security outcomes, and a mechanism design tool that can enable
security-by-design and reverse the attacker's advantage. This tutorial provides
an overview of diverse methodologies from game theory that includes games of
incomplete information, dynamic games, mechanism design theory to offer a
modern theoretic underpinning of a science of cybersecurity. The tutorial will
also discuss open problems and research challenges that the CCS community can
address and contribute with an objective to build a multidisciplinary bridge
between cybersecurity, economics, game and decision theory
Conformally flat manifolds with nonnegative Ricci curvature
revised version, added reference to previous paper by S. Zhu on the same subjectInternational audienceWe show that complete conformally flat manifolds of dimension n>2 with nonnegative Ricci curvature enjoy nice rigidity properties: they are either flat, or locally isometric to a product of a sphere and a line, or are globally conformally equivalent to flat space or to a spherical spaceform. This extends previous works by Q.-M. Cheng, M.H. Noronha, B.-L. Chen and X.-P. Zhu, and S. Zhu
Comment on "A special attack on the multiparty quantum secret sharing of secure direct communication using single photons"
In this comment, we show that the special attack [S.-J. Qin, F. Gao, Q.-Y.
Wen, F.-C. Zhu, Opt. Commun. 281 (2008) 5472.], which claims to be able to
obtain all the transmitted secret message bit values of the protocol of the
multiparty quantum secret sharing of secure direct communication using single
photons with random phase shift operations, fails. Furthermore, a class of
similar attacks are also shown to fail to extract the secrete message.Comment: 2 pages (two-column
Science Press, Beijing, China: Fauna Sinica Arachnida: Araneae [Rezension]
a) Song Daxiang & Zhu Mingsheng: Thomisidae, Philodromidae. 1997, 259 S., ISBN 7-03-005707-4/Q.684, Preis 44,- Yuan (ca. 9,68 DM)
b) Zhu Mingsheng: Theridiidae. 1998, 436 S., ISBN 7-03-006243-4/Q.748, Preis 69,- Yuan (ca. 15,18 DM)
c) Yin Changmin et al.: Araneidae. 1997, 460 S., ISBN 7-03-005705-8/Q.682, Preis 76,- Yuan (ca. 16,72 DM)
Alle drei Bücher wurden Überwiegend in chinesisch verfaßt. Es findet sich jedoch ein englischer Bestimmungsschlüssel am Ende jedes Werkes. Ihm angeschlossen ist ein Artregister in lateinischer Schrift. Die Zeichnungen der Genitalien und des Habitus sind sehr deutlich und lassen sich in ihrer Genauigkeit sicherlich mit den Zeichnungen M.J. Roberts vergleichen. Die Beschreibungen zur Biogeographie werden zwar im Einführungsteil (Karten) dargestellt, die zugehörigen Textpassagen sind aber in chinesisch geschrieben worden
KatharoSeq Enables High-Throughput Microbiome Analysis from Low-Biomass Samples
Minich JJ, Zhu Q, Janssen S, et al. KatharoSeq Enables High-Throughput Microbiome Analysis from Low-Biomass Samples. mSystems. 2018;3(3):e00218-17
- …