1,929 research outputs found

    Using secret sharing for searching in encrypted data

    Get PDF
    When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server. We present a method, inspired by secure multi-party computation, to search efficiently in encrypted data. XML elements are translated to polynomials. A polynomial is split into two parts: a random polynomial for the client and the difference between the original polynomial and the client polynomial for the server. Since the client polynomials are generated by a random sequence generator only the seed has to be stored on the client. In a combined effort of both the server and the client a query can be evaluated without traversing the whole tree and without the server learning anything about the data or the query

    OT 060420: A Seemingly Optical Transient Recorded by All-Sky Cameras

    Get PDF
    We report on a ~5th magnitude flash detected for approximately 10 minutes by two CONCAM all-sky cameras located in Cerro Pachon - Chile and La Palma - Spain. A third all-sky camera, located in Cerro Paranal - Chile did not detect the flash, and therefore the authors of this paper suggest that the flash was a series of cosmic-ray hits, meteors, or satellite glints. Another proposed hypothesis is that the flash was an astronomical transient with variable luminosity. In this paper we discuss bright optical transient detection using fish-eye all-sky monitors, analyze the apparently false-positive optical transient, and propose possible causes to false optical transient detection in all-sky cameras.Comment: 7 figures, 3 tables, accepted PAS

    Learning with the Weighted Trace-norm under Arbitrary Sampling Distributions

    Full text link
    We provide rigorous guarantees on learning with the weighted trace-norm under arbitrary sampling distributions. We show that the standard weighted trace-norm might fail when the sampling distribution is not a product distribution (i.e. when row and column indexes are not selected independently), present a corrected variant for which we establish strong learning guarantees, and demonstrate that it works better in practice. We provide guarantees when weighting by either the true or empirical sampling distribution, and suggest that even if the true distribution is known (or is uniform), weighting by the empirical distribution may be beneficial

    Mobility edge in lattice QCD

    Full text link
    We determine the location λc\lambda_c of the mobility edge in the spectrum of the hermitian Wilson operator on quenched ensembles. We confirm a theoretical picture of localization proposed for the Aoki phase diagram. When λc>0\lambda_c>0 we also determine some key properties of the localized eigenmodes with eigenvalues λ<λc|\lambda|<\lambda_c. Our results lead to simple tests for the validity of simulations with overlap and domain-wall fermions.Comment: revtex, 4 pages, 1 figure, minor change

    On the induced gauge invariant mass

    Full text link
    We derive a general expression for the gauge invariant mass (m_G) for an Abelian gauge field, as induced by vacuum polarization, in 1+1 dimensions. From its relation to the chiral anomaly, we show that m_G has to satisfy a certain quantization condition. This quantization can be, on the other hand, explicitly verified by using the exact general expression for the gauge invariant mass in terms of the fermion propagator. This result is applied to some explicit examples, exploring the possibility of having interesting physical situations where the value of mGm_G departs from its canonical value. We also study the possibility of generalizing the results to the 2+1 dimensional case at finite temperature, showing that there are indeed situations where a finite and non-vanishing gauge invariant mass is induced.Comment: 18 pages, Latex, 3 figures (pstex

    Running coupling and mass anomalous dimension of SU(3) gauge theory with two flavors of symmetric-representation fermions

    Full text link
    We have measured the running coupling constant of SU(3) gauge theory coupled to Nf=2 flavors of symmetric representation fermions, using the Schrodinger functional scheme. Our lattice action is defined with hypercubic smeared links which, along with the larger lattice sizes, bring us closer to the continuum limit than in our previous study. We observe that the coupling runs more slowly than predicted by asymptotic freedom, but we are unable to observe fixed point behavior before encountering a first order transition to a strong coupling phase. This indicates that the infrared fixed point found with the thin-link action is a lattice artifact. The slow running of the gauge coupling permits an accurate determination of the mass anomalous dimension for this theory, which we observe to be small, gamma_m < 0.6, over the range of couplings we can reach. We also study the bulk and finite-temperature phase transitions in the strong coupling region.Comment: 17 pages, 16 figures. Substantial modifications to explain why the fat-link result for the beta function supersedes our thin-link result; also updated the phase diagram to reflect additional numerical work. Added references. Final versio

    Toward 'socially constructive' social constructions of leadership

    Get PDF
    In their introductory editorial essay for this special issue, David Grant and Gail Fairhurst have done us a great service by valiantly producing a "Sailing Guide" to the Social Construction of Leadership (Fairhurst & Grant, 2010). As with rounding the Capes, this is not a task for the faint of heart. A sailing guide is designed to provide vital knowledge about a particular sea or coast, providing us with charts, warnings about potential hazards and an indication where we might find safe havens in a storm. Their sailing guide does this to great effect as it skilfully "boxes the compass" by revealing all of the potential directions that one might set one‟s sail by if one was sufficiently foolhardy to embark on a cruise of the social construction of leadership
    corecore