2,292 research outputs found
Tests for Establishing Security Properties
Ensuring strong security properties in some cases requires participants to carry out tests during the execution of a protocol. A classical example is electronic voting: participants are required to verify the presence of their ballots on a bulletin board, and to verify the computation of the election outcome. The notion of certificate transparency is another example, in which participants in the protocol are required to perform tests to verify the integrity of a certificate log.
We present a framework for modelling systems with such `testable properties', using the applied pi calculus. We model the tests that are made by participants in order to obtain the security properties. Underlying our work is an attacker model called ``malicious but cautious'', which lies in between the Dolev-Yao model and the ``honest but curious'' model. The malicious-but-cautious model is appropriate for cloud computing providers that are potentially malicious but are assumed to be cautious about launching attacks that might cause user tests to fail
On the Shapley-like Payoff Mechanisms in Peer-Assisted Services with Multiple Content Providers
This paper studies an incentive structure for cooperation and its stability
in peer-assisted services when there exist multiple content providers, using a
coalition game theoretic approach. We first consider a generalized coalition
structure consisting of multiple providers with many assisting peers, where
peers assist providers to reduce the operational cost in content distribution.
To distribute the profit from cost reduction to players (i.e., providers and
peers), we then establish a generalized formula for individual payoffs when a
"Shapley-like" payoff mechanism is adopted. We show that the grand coalition is
unstable, even when the operational cost functions are concave, which is in
sharp contrast to the recently studied case of a single provider where the
grand coalition is stable. We also show that irrespective of stability of the
grand coalition, there always exist coalition structures which are not
convergent to the grand coalition. Our results give us an important insight
that a provider does not tend to cooperate with other providers in
peer-assisted services, and be separated from them. To further study the case
of the separated providers, three examples are presented; (i) underpaid peers,
(ii) service monopoly, and (iii) oscillatory coalition structure. Our study
opens many new questions such as realistic and efficient incentive structures
and the tradeoffs between fairness and individual providers' competition in
peer-assisted services.Comment: 13 pages, 4 figures, an extended version of the paper to be presented
in ICST GameNets 2011, Shanghai, China, April 201
Structured Model Order Reduction for Vibro-Acoustic Problems using Interpolation and Balancing Methods
When Can Limited Randomness Be Used in Repeated Games?
The central result of classical game theory states that every finite normal
form game has a Nash equilibrium, provided that players are allowed to use
randomized (mixed) strategies. However, in practice, humans are known to be bad
at generating random-like sequences, and true random bits may be unavailable.
Even if the players have access to enough random bits for a single instance of
the game their randomness might be insufficient if the game is played many
times.
In this work, we ask whether randomness is necessary for equilibria to exist
in finitely repeated games. We show that for a large class of games containing
arbitrary two-player zero-sum games, approximate Nash equilibria of the
-stage repeated version of the game exist if and only if both players have
random bits. In contrast, we show that there exists a class of
games for which no equilibrium exists in pure strategies, yet the -stage
repeated version of the game has an exact Nash equilibrium in which each player
uses only a constant number of random bits.
When the players are assumed to be computationally bounded, if cryptographic
pseudorandom generators (or, equivalently, one-way functions) exist, then the
players can base their strategies on "random-like" sequences derived from only
a small number of truly random bits. We show that, in contrast, in repeated
two-player zero-sum games, if pseudorandom generators \emph{do not} exist, then
random bits remain necessary for equilibria to exist
Algorithmic Bayesian Persuasion
Persuasion, defined as the act of exploiting an informational advantage in
order to effect the decisions of others, is ubiquitous. Indeed, persuasive
communication has been estimated to account for almost a third of all economic
activity in the US. This paper examines persuasion through a computational
lens, focusing on what is perhaps the most basic and fundamental model in this
space: the celebrated Bayesian persuasion model of Kamenica and Gentzkow. Here
there are two players, a sender and a receiver. The receiver must take one of a
number of actions with a-priori unknown payoff, and the sender has access to
additional information regarding the payoffs. The sender can commit to
revealing a noisy signal regarding the realization of the payoffs of various
actions, and would like to do so as to maximize her own payoff assuming a
perfectly rational receiver.
We examine the sender's optimization task in three of the most natural input
models for this problem, and essentially pin down its computational complexity
in each. When the payoff distributions of the different actions are i.i.d. and
given explicitly, we exhibit a polynomial-time (exact) algorithm, and a
"simple" -approximation algorithm. Our optimal scheme for the i.i.d.
setting involves an analogy to auction theory, and makes use of Border's
characterization of the space of reduced-forms for single-item auctions. When
action payoffs are independent but non-identical with marginal distributions
given explicitly, we show that it is #P-hard to compute the optimal expected
sender utility. Finally, we consider a general (possibly correlated) joint
distribution of action payoffs presented by a black box sampling oracle, and
exhibit a fully polynomial-time approximation scheme (FPTAS) with a bi-criteria
guarantee. We show that this result is the best possible in the black-box model
for information-theoretic reasons
On the optimality of gluing over scales
We show that for every , there exist -point metric spaces
(X,d) where every "scale" admits a Euclidean embedding with distortion at most
, but the whole space requires distortion at least . This shows that the scale-gluing lemma [Lee, SODA 2005] is tight,
and disproves a conjecture stated there. This matching upper bound was known to
be tight at both endpoints, i.e. when and , but nowhere in between.
More specifically, we exhibit -point spaces with doubling constant
requiring Euclidean distortion ,
which also shows that the technique of "measured descent" [Krauthgamer, et.
al., Geometric and Functional Analysis] is optimal. We extend this to obtain a
similar tight result for spaces with .Comment: minor revision
Anharmonicities of giant dipole excitations
The role of anharmonic effects on the excitation of the double giant dipole
resonance is investigated in a simple macroscopic model.Perturbation theory is
used to find energies and wave functions of the anharmonic ascillator.The cross
sections for the electromagnetic excitation of the one- and two-phonon giant
dipole resonances in energetic heavy-ion collisions are then evaluated through
a semiclassical coupled-channel calculation.It is argued that the variations of
the strength of the anharmonic potential should be combined with appropriate
changes in the oscillator frequency,in order to keep the giant dipole resonance
energy consistent with the experimental value.When this is taken into
account,the effects of anharmonicities on the double giant dipole resonance
excitation probabilities are small and cannot account for the well-known
discrepancy between theory and experiment
Deep convective clouds at the tropopause
Data from the Atmospheric Infrared Sounder (AIRS) on the EOS Aqua spacecraft each day show tens of thousands of Cold Clouds (CC) in the tropical oceans with 10 μm window channel brightness temperatures colder than 225 K. These clouds represent a mix of cold anvil clouds and Deep Convective Clouds (DCC). This mix can be separated by computing the difference between two channels, a window channel and a channel with strong CO<sub>2</sub> absorption: for some cold clouds this difference is negative, i.e. the spectra for some cold clouds are inverted. We refer to cold clouds with spectra which are more than 2 K inverted as DCCi2. Associated with DCCi2 is a very high rain rate and a local upward displacement of the tropopause, a cold "bulge", which can be seen directly in the brightness temperatures of AIRS and Advanced Microwave Sounding Unit (AMSU) temperature sounding channels in the lower stratosphere. The very high rain rate and the local distortion of the tropopause indicate that DCCi2 objects are associated with severe storms. Significant long-term trends in the statistical properties of DCCi2 could be interesting indicators of climate change. While the analysis of the nature and physical conditions related to DCCi2 requires hyperspectral infrared and microwave data, the identification of DCCi2 requires only one good window channel and one strong CO<sub>2</sub> sounding channel. This suggests that improved identification of severe storms with future advanced geostationary satellites could be accomplished with the addition of one or two narrow band channels
Auralization of Amplitude Modulated Helicopter Flyover Noise
Rotorcraft noise is an active field of study as the sound produced by these vehicles is often found to be annoying. A means to auralize rotorcraft flyover noise is sought to help understand the factors leading to annoyance. Previous work by the authors auralized a complete flyover event in which the source noise synthesis traversed a range of emission angles. The source noise definition process for the synthesis used helicopter flyover recordings. Although this process yielded both periodic and aperiodic (modulation) components at a set of discrete emission angles, only the periodic components were used in the previous work to synthesize the sound of the flyover event. In the current work, aperiodic amplitude modulation is incorporated into the source noise synthesis to improve its fidelity toward assessing rotorcraft noise annoyance. The method is demonstrated using ground recordings from a flight test of the AS350 helicopter for the source noise definition
Human Powered Vehicle Frame Design
This report discusses the Human Powered Vehicle Frame Design senior project’s contributions to the design, manufacture, testing, and competition of the Cal Poly Human Powered Vehicle Club’s 2015 vehicle, Sweet Phoenix. The project’s guiding rules and timeline were dictated by the ASME Human Powered Vehicle Challenge (HPVC), held in April 2015. The Club sought to improve upon its previous vehicle, Aria, which suffered from a range of faults including a catastrophic structural failure at the 2014 HPVC. Largely in response to this failure, the Frame Design project’s major focus was Sweet Phoenix’s frame, from concept to manufacturing. During the design process in the Spring and Fall of 2014, several other issues were tackled in order to define the frame’s design parameters. These secondary efforts included the fairing shape, vehicle stability requirements, handling characteristics, and rider ergonomics. A handling prototype was constructed in late Fall 2014, which successfully validated the solutions to these secondary requirements before the final design was constructed. Ultimately, Sweet Phoenix’s frame is a hybrid design – a composite monocoque fairing to which several weldments are mechanically fastened. The team used extensive finite element analysis to evaluate structural properties for both of these frame subsystems during the final development stages. Sweet Phoenix was produced during the Winter quarter of 2015, with much physical help from the HPV Club members and financial support from several sponsors. The production effort was quite successful, in part thanks to two significant manufacturing improvements – sponsored out-of-house machining of the fairing tools, and a frame-to-fairing alignment jig. The vehicle’s construction quality was recognized at HPVC with a “Best Craftsmanship” award. Testing of the final vehicle revealed very low stiffness of the weldments’ fairing mounts, which was resolved by adding additional bracing locations to the fairing. In addition, the team discovered several drivetrain-related issues that were attacked with numerous attempted solutions, but were not solved prior to HPVC. The drivetrain also contributed to localized delamination of the fairing near a chain idler pulley mount. Unfortunately, these drivetrain issues resulted in several broken chains and poor performance in the acceleration-heavy Endurance Event at HPVC. On the other hand, Sweet Phoenix placed 1st in Design and Men’s Sprint, both satisfying results for the Club, and the Frame Design project was an overall success
- …