3,297 research outputs found
NASA/GE quiet engine C acoustic test results
The acoustic investigation and evaluation of the C propulsion turbofan engine are discussed. The engine was built as a part of the Quiet Engine Program. The objectives of the program are as follows: (1) to determine the noise levels produced turbofan bypass engines, (2) to demonstrate the technology and innovations which will reduce the production and radiation of noise in turbofan engines, and (3) to acquire experimental acoustic and aerodynamic data for high bypass turbofan engines to provide a better understanding of noise production mechanisms. The goals of the program called for a turbofan engine 15 to 20 PNdB quieter than currently available engines in the same thrust class
Socially Optimal Mining Pools
Mining for Bitcoins is a high-risk high-reward activity. Miners, seeking to
reduce their variance and earn steadier rewards, collaborate in pooling
strategies where they jointly mine for Bitcoins. Whenever some pool participant
is successful, the earned rewards are appropriately split among all pool
participants. Currently a dozen of different pooling strategies (i.e., methods
for distributing the rewards) are in use for Bitcoin mining.
We here propose a formal model of utility and social welfare for Bitcoin
mining (and analogous mining systems) based on the theory of discounted
expected utility, and next study pooling strategies that maximize the social
welfare of miners. Our main result shows that one of the pooling strategies
actually employed in practice--the so-called geometric pay pool--achieves the
optimal steady-state utility for miners when its parameters are set
appropriately.
Our results apply not only to Bitcoin mining pools, but any other form of
pooled mining or crowdsourcing computations where the participants engage in
repeated random trials towards a common goal, and where "partial" solutions can
be efficiently verified
Monotonic Prefix Consistency in Distributed Systems
We study the issue of data consistency in distributed systems. Specifically,
we consider a distributed system that replicates its data at multiple sites,
which is prone to partitions, and which is assumed to be available (in the
sense that queries are always eventually answered). In such a setting, strong
consistency, where all replicas of the system apply synchronously every
operation, is not possible to implement. However, many weaker consistency
criteria that allow a greater number of behaviors than strong consistency, are
implementable in available distributed systems. We focus on determining the
strongest consistency criterion that can be implemented in a convergent and
available distributed system that tolerates partitions. We focus on objects
where the set of operations can be split into updates and queries. We show that
no criterion stronger than Monotonic Prefix Consistency (MPC) can be
implemented.Comment: Submitted pape
Methodology Matters; Even More
This editorial essay reflects on the importance of a section like Methodology Matters and its first two years. It also introduces the six articles in this issue of the European Management Review (EMR) that follow this essay and have progressed successfully through the review process for publication and it suggests ways in which the debates that each of those articles have started may be extended. This introduction also justifies other additions to the agenda that appeared in the original call for papers for submissions to this section of EMR
Non-malleable encryption: simpler, shorter, stronger
In a seminal paper, Dolev et al. [15] introduced the notion of non-malleable encryption (NM-CPA). This notion is very intriguing since it suffices for many applications of chosen-ciphertext secure encryption (IND-CCA), and, yet, can be generically built from semantically secure (IND-CPA) encryption, as was shown in the seminal works by Pass et al. [29] and by Choi et al. [9], the latter of which provided a black-box construction. In this paper we investigate three questions related to NM-CPA security: 1. Can the rate of the construction by Choi et al. of NM-CPA from IND-CPA be improved? 2. Is it possible to achieve multi-bit NM-CPA security more efficiently from a single-bit NM-CPA scheme than from IND-CPA? 3. Is there a notion stronger than NM-CPA that has natural applications and can be achieved from IND-CPA security? We answer all three questions in the positive. First, we improve the rate in the scheme of Choi et al. by a factor O(λ), where λ is the security parameter. Still, encrypting a message of size O(λ) would require ciphertext and keys of size O(λ2) times that of the IND-CPA scheme, even in our improved scheme. Therefore, we show a more efficient domain extension technique for building a λ-bit NM-CPA scheme from a single-bit NM-CPA scheme with keys and ciphertext of size O(λ) times that of the NM-CPA one-bit scheme. To achieve our goal, we define and construct a novel type of continuous non-malleable code (NMC), called secret-state NMC, as we show that standard continuous NMCs are not enough for the natural “encode-then-encrypt-bit-by-bit” approach to work. Finally, we introduce a new security notion for public-key encryption that we dub non-malleability under (chosen-ciphertext) self-destruct attacks (NM-SDA). After showing that NM-SDA is a strict strengthening of NM-CPA and allows for more applications, we nevertheless show that both of our results—(faster) construction from IND-CPA and domain extension from one-bit scheme—also hold for our stronger NM-SDA security. In particular, the notions of IND-CPA, NM-CPA, and NM-SDA security are all equivalent, lying (plausibly, strictly?) below IND-CCA securit
Recommended from our members
The evolving relationship between line managers and the people profession
- …