2,292 research outputs found

    Tests for Establishing Security Properties

    Get PDF
    Ensuring strong security properties in some cases requires participants to carry out tests during the execution of a protocol. A classical example is electronic voting: participants are required to verify the presence of their ballots on a bulletin board, and to verify the computation of the election outcome. The notion of certificate transparency is another example, in which participants in the protocol are required to perform tests to verify the integrity of a certificate log. We present a framework for modelling systems with such `testable properties', using the applied pi calculus. We model the tests that are made by participants in order to obtain the security properties. Underlying our work is an attacker model called ``malicious but cautious'', which lies in between the Dolev-Yao model and the ``honest but curious'' model. The malicious-but-cautious model is appropriate for cloud computing providers that are potentially malicious but are assumed to be cautious about launching attacks that might cause user tests to fail

    On the Shapley-like Payoff Mechanisms in Peer-Assisted Services with Multiple Content Providers

    Full text link
    This paper studies an incentive structure for cooperation and its stability in peer-assisted services when there exist multiple content providers, using a coalition game theoretic approach. We first consider a generalized coalition structure consisting of multiple providers with many assisting peers, where peers assist providers to reduce the operational cost in content distribution. To distribute the profit from cost reduction to players (i.e., providers and peers), we then establish a generalized formula for individual payoffs when a "Shapley-like" payoff mechanism is adopted. We show that the grand coalition is unstable, even when the operational cost functions are concave, which is in sharp contrast to the recently studied case of a single provider where the grand coalition is stable. We also show that irrespective of stability of the grand coalition, there always exist coalition structures which are not convergent to the grand coalition. Our results give us an important insight that a provider does not tend to cooperate with other providers in peer-assisted services, and be separated from them. To further study the case of the separated providers, three examples are presented; (i) underpaid peers, (ii) service monopoly, and (iii) oscillatory coalition structure. Our study opens many new questions such as realistic and efficient incentive structures and the tradeoffs between fairness and individual providers' competition in peer-assisted services.Comment: 13 pages, 4 figures, an extended version of the paper to be presented in ICST GameNets 2011, Shanghai, China, April 201

    When Can Limited Randomness Be Used in Repeated Games?

    Full text link
    The central result of classical game theory states that every finite normal form game has a Nash equilibrium, provided that players are allowed to use randomized (mixed) strategies. However, in practice, humans are known to be bad at generating random-like sequences, and true random bits may be unavailable. Even if the players have access to enough random bits for a single instance of the game their randomness might be insufficient if the game is played many times. In this work, we ask whether randomness is necessary for equilibria to exist in finitely repeated games. We show that for a large class of games containing arbitrary two-player zero-sum games, approximate Nash equilibria of the nn-stage repeated version of the game exist if and only if both players have Ω(n)\Omega(n) random bits. In contrast, we show that there exists a class of games for which no equilibrium exists in pure strategies, yet the nn-stage repeated version of the game has an exact Nash equilibrium in which each player uses only a constant number of random bits. When the players are assumed to be computationally bounded, if cryptographic pseudorandom generators (or, equivalently, one-way functions) exist, then the players can base their strategies on "random-like" sequences derived from only a small number of truly random bits. We show that, in contrast, in repeated two-player zero-sum games, if pseudorandom generators \emph{do not} exist, then Ω(n)\Omega(n) random bits remain necessary for equilibria to exist

    Algorithmic Bayesian Persuasion

    Full text link
    Persuasion, defined as the act of exploiting an informational advantage in order to effect the decisions of others, is ubiquitous. Indeed, persuasive communication has been estimated to account for almost a third of all economic activity in the US. This paper examines persuasion through a computational lens, focusing on what is perhaps the most basic and fundamental model in this space: the celebrated Bayesian persuasion model of Kamenica and Gentzkow. Here there are two players, a sender and a receiver. The receiver must take one of a number of actions with a-priori unknown payoff, and the sender has access to additional information regarding the payoffs. The sender can commit to revealing a noisy signal regarding the realization of the payoffs of various actions, and would like to do so as to maximize her own payoff assuming a perfectly rational receiver. We examine the sender's optimization task in three of the most natural input models for this problem, and essentially pin down its computational complexity in each. When the payoff distributions of the different actions are i.i.d. and given explicitly, we exhibit a polynomial-time (exact) algorithm, and a "simple" (11/e)(1-1/e)-approximation algorithm. Our optimal scheme for the i.i.d. setting involves an analogy to auction theory, and makes use of Border's characterization of the space of reduced-forms for single-item auctions. When action payoffs are independent but non-identical with marginal distributions given explicitly, we show that it is #P-hard to compute the optimal expected sender utility. Finally, we consider a general (possibly correlated) joint distribution of action payoffs presented by a black box sampling oracle, and exhibit a fully polynomial-time approximation scheme (FPTAS) with a bi-criteria guarantee. We show that this result is the best possible in the black-box model for information-theoretic reasons

    On the optimality of gluing over scales

    Full text link
    We show that for every α>0\alpha > 0, there exist nn-point metric spaces (X,d) where every "scale" admits a Euclidean embedding with distortion at most α\alpha, but the whole space requires distortion at least Ω(αlogn)\Omega(\sqrt{\alpha \log n}). This shows that the scale-gluing lemma [Lee, SODA 2005] is tight, and disproves a conjecture stated there. This matching upper bound was known to be tight at both endpoints, i.e. when α=Θ(1)\alpha = \Theta(1) and α=Θ(logn)\alpha = \Theta(\log n), but nowhere in between. More specifically, we exhibit nn-point spaces with doubling constant λ\lambda requiring Euclidean distortion Ω(logλlogn)\Omega(\sqrt{\log \lambda \log n}), which also shows that the technique of "measured descent" [Krauthgamer, et. al., Geometric and Functional Analysis] is optimal. We extend this to obtain a similar tight result for LpL_p spaces with p>1p > 1.Comment: minor revision

    Anharmonicities of giant dipole excitations

    Get PDF
    The role of anharmonic effects on the excitation of the double giant dipole resonance is investigated in a simple macroscopic model.Perturbation theory is used to find energies and wave functions of the anharmonic ascillator.The cross sections for the electromagnetic excitation of the one- and two-phonon giant dipole resonances in energetic heavy-ion collisions are then evaluated through a semiclassical coupled-channel calculation.It is argued that the variations of the strength of the anharmonic potential should be combined with appropriate changes in the oscillator frequency,in order to keep the giant dipole resonance energy consistent with the experimental value.When this is taken into account,the effects of anharmonicities on the double giant dipole resonance excitation probabilities are small and cannot account for the well-known discrepancy between theory and experiment

    Deep convective clouds at the tropopause

    Get PDF
    Data from the Atmospheric Infrared Sounder (AIRS) on the EOS Aqua spacecraft each day show tens of thousands of Cold Clouds (CC) in the tropical oceans with 10 μm window channel brightness temperatures colder than 225 K. These clouds represent a mix of cold anvil clouds and Deep Convective Clouds (DCC). This mix can be separated by computing the difference between two channels, a window channel and a channel with strong CO<sub>2</sub> absorption: for some cold clouds this difference is negative, i.e. the spectra for some cold clouds are inverted. We refer to cold clouds with spectra which are more than 2 K inverted as DCCi2. Associated with DCCi2 is a very high rain rate and a local upward displacement of the tropopause, a cold "bulge", which can be seen directly in the brightness temperatures of AIRS and Advanced Microwave Sounding Unit (AMSU) temperature sounding channels in the lower stratosphere. The very high rain rate and the local distortion of the tropopause indicate that DCCi2 objects are associated with severe storms. Significant long-term trends in the statistical properties of DCCi2 could be interesting indicators of climate change. While the analysis of the nature and physical conditions related to DCCi2 requires hyperspectral infrared and microwave data, the identification of DCCi2 requires only one good window channel and one strong CO<sub>2</sub> sounding channel. This suggests that improved identification of severe storms with future advanced geostationary satellites could be accomplished with the addition of one or two narrow band channels

    Auralization of Amplitude Modulated Helicopter Flyover Noise

    Get PDF
    Rotorcraft noise is an active field of study as the sound produced by these vehicles is often found to be annoying. A means to auralize rotorcraft flyover noise is sought to help understand the factors leading to annoyance. Previous work by the authors auralized a complete flyover event in which the source noise synthesis traversed a range of emission angles. The source noise definition process for the synthesis used helicopter flyover recordings. Although this process yielded both periodic and aperiodic (modulation) components at a set of discrete emission angles, only the periodic components were used in the previous work to synthesize the sound of the flyover event. In the current work, aperiodic amplitude modulation is incorporated into the source noise synthesis to improve its fidelity toward assessing rotorcraft noise annoyance. The method is demonstrated using ground recordings from a flight test of the AS350 helicopter for the source noise definition

    Human Powered Vehicle Frame Design

    Get PDF
    This report discusses the Human Powered Vehicle Frame Design senior project’s contributions to the design, manufacture, testing, and competition of the Cal Poly Human Powered Vehicle Club’s 2015 vehicle, Sweet Phoenix. The project’s guiding rules and timeline were dictated by the ASME Human Powered Vehicle Challenge (HPVC), held in April 2015. The Club sought to improve upon its previous vehicle, Aria, which suffered from a range of faults including a catastrophic structural failure at the 2014 HPVC. Largely in response to this failure, the Frame Design project’s major focus was Sweet Phoenix’s frame, from concept to manufacturing. During the design process in the Spring and Fall of 2014, several other issues were tackled in order to define the frame’s design parameters. These secondary efforts included the fairing shape, vehicle stability requirements, handling characteristics, and rider ergonomics. A handling prototype was constructed in late Fall 2014, which successfully validated the solutions to these secondary requirements before the final design was constructed. Ultimately, Sweet Phoenix’s frame is a hybrid design – a composite monocoque fairing to which several weldments are mechanically fastened. The team used extensive finite element analysis to evaluate structural properties for both of these frame subsystems during the final development stages. Sweet Phoenix was produced during the Winter quarter of 2015, with much physical help from the HPV Club members and financial support from several sponsors. The production effort was quite successful, in part thanks to two significant manufacturing improvements – sponsored out-of-house machining of the fairing tools, and a frame-to-fairing alignment jig. The vehicle’s construction quality was recognized at HPVC with a “Best Craftsmanship” award. Testing of the final vehicle revealed very low stiffness of the weldments’ fairing mounts, which was resolved by adding additional bracing locations to the fairing. In addition, the team discovered several drivetrain-related issues that were attacked with numerous attempted solutions, but were not solved prior to HPVC. The drivetrain also contributed to localized delamination of the fairing near a chain idler pulley mount. Unfortunately, these drivetrain issues resulted in several broken chains and poor performance in the acceleration-heavy Endurance Event at HPVC. On the other hand, Sweet Phoenix placed 1st in Design and Men’s Sprint, both satisfying results for the Club, and the Frame Design project was an overall success
    corecore