50 research outputs found
Compositional closure for Bayes Risk in probabilistic noninterference
We give a sequential model for noninterference security including probability
(but not demonic choice), thus supporting reasoning about the likelihood that
high-security values might be revealed by observations of low-security
activity. Our novel methodological contribution is the definition of a
refinement order and its use to compare security measures between
specifications and (their supposed) implementations. This contrasts with the
more common practice of evaluating the security of individual programs in
isolation.
The appropriateness of our model and order is supported by our showing that
our refinement order is the greatest compositional relation --the compositional
closure-- with respect to our semantics and an "elementary" order based on
Bayes Risk --- a security measure already in widespread use. We also relate
refinement to other measures such as Shannon Entropy.
By applying the approach to a non-trivial example, the anonymous-majority
Three-Judges protocol, we demonstrate by example that correctness arguments can
be simplified by the sort of layered developments --through levels of
increasing detail-- that are allowed and encouraged by compositional semantics
The Value of Information for Populations in Varying Environments
The notion of information pervades informal descriptions of biological
systems, but formal treatments face the problem of defining a quantitative
measure of information rooted in a concept of fitness, which is itself an
elusive notion. Here, we present a model of population dynamics where this
problem is amenable to a mathematical analysis. In the limit where any
information about future environmental variations is common to the members of
the population, our model is equivalent to known models of financial
investment. In this case, the population can be interpreted as a portfolio of
financial assets and previous analyses have shown that a key quantity of
Shannon's communication theory, the mutual information, sets a fundamental
limit on the value of information. We show that this bound can be violated when
accounting for features that are irrelevant in finance but inherent to
biological systems, such as the stochasticity present at the individual level.
This leads us to generalize the measures of uncertainty and information usually
encountered in information theory
IBM-1 description of the fission products Ru
IBM-1} calculations for the fission products Ru have been
carried out. The even-even isotopes of Ru can be described as transitional
nuclei situated between the U(5) (spherical vibrator) and SO(6)
(-unstable rotor) symmetries of the Interacting Boson Model. At first,
a Hamiltonian with only one- and two-body terms has been used. Excitation
energies and (E2) ratios of gamma transitions have been calculated. A
satisfactory agreement has been obtained, with the exception of the odd-even
staggering in the quasi- bands of Ru. The observed pattern
is rather similar to the one for a rigid triaxial rotor. A calculation based on
a Hamiltonian with three-body terms was able to remove this discrepancy. The
relation between the IBM and the triaxial rotor model was also examined.Comment: 22 pages, 8 figure
How brains make decisions
This chapter, dedicated to the memory of Mino Freund, summarizes the Quantum
Decision Theory (QDT) that we have developed in a series of publications since
2008. We formulate a general mathematical scheme of how decisions are taken,
using the point of view of psychological and cognitive sciences, without
touching physiological aspects. The basic principles of how intelligence acts
are discussed. The human brain processes involved in decisions are argued to be
principally different from straightforward computer operations. The difference
lies in the conscious-subconscious duality of the decision making process and
the role of emotions that compete with utility optimization. The most general
approach for characterizing the process of decision making, taking into account
the conscious-subconscious duality, uses the framework of functional analysis
in Hilbert spaces, similarly to that used in the quantum theory of
measurements. This does not imply that the brain is a quantum system, but just
allows for the simplest and most general extension of classical decision
theory. The resulting theory of quantum decision making, based on the rules of
quantum measurements, solves all paradoxes of classical decision making,
allowing for quantitative predictions that are in excellent agreement with
experiments. Finally, we provide a novel application by comparing the
predictions of QDT with experiments on the prisoner dilemma game. The developed
theory can serve as a guide for creating artificial intelligence acting by
quantum rules.Comment: Latex file, 20 pages, 3 figure
Quantitative Information Flow and Applications to Differential Privacy
International audienceSecure information flow is the problem of ensuring that the information made publicly available by a computational system does not leak information that should be kept secret. Since it is practically impossible to avoid leakage entirely, in recent years there has been a growing interest in considering the quantitative aspects of information flow, in order to measure and compare the amount of leakage. Information theory is widely regarded as a natural framework to provide firm foundations to quantitative information flow. In this notes we review the two main information-theoretic approaches that have been investigated: the one based on Shannon entropy, and the one based on RĂ©nyi min-entropy. Furthermore, we discuss some applications in the area of privacy. In particular, we consider statistical databases and the recently-proposed notion of differential privacy. Using the information-theoretic view, we discuss the bound that differential privacy induces on leakage, and the trade-off between utility and privac
ModelPlex: Verified Runtime Validation of Verified Cyber-Physical System Models
Abstract. Formal verification and validation play a crucial role in making cyber-physical systems (CPS) safe. Formal methods make strong guarantees about the system behavior if accurate models of the system can be obtained, including mod-els of the controller and of the physical dynamics. In CPS, models are essential; but any model we could possibly build necessarily deviates from the real world. If the real system fits to the model, its behavior is guaranteed to satisfy the correct-ness properties verified w.r.t. the model. Otherwise, all bets are off. This paper introduces ModelPlex, a method ensuring that verification results about models apply to CPS implementations. ModelPlex provides correctness guarantees for CPS executions at runtime: it combines offline verification of CPS models with runtime validation of system executions for compliance with the model. Model-Plex ensures that the verification results obtained for the model apply to the ac-tual system runs by monitoring the behavior of the world for compliance with the model, assuming the system dynamics deviation is bounded. If, at some point, the observed behavior no longer complies with the model so that offline verifica-tion results no longer apply, ModelPlex initiates provably safe fallback actions. This paper, furthermore, develops a systematic technique to synthesize provably correct monitors automatically from CPS proofs in differential dynamic logic.
The evolving SARS-CoV-2 epidemic in Africa: Insights from rapidly expanding genomic surveillance
INTRODUCTION
Investment in Africa over the past year with regard to severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) sequencing has led to a massive increase in the number of sequences, which, to date, exceeds 100,000 sequences generated to track the pandemic on the continent. These sequences have profoundly affected how public health officials in Africa have navigated the COVID-19 pandemic.
RATIONALE
We demonstrate how the first 100,000 SARS-CoV-2 sequences from Africa have helped monitor the epidemic on the continent, how genomic surveillance expanded over the course of the pandemic, and how we adapted our sequencing methods to deal with an evolving virus. Finally, we also examine how viral lineages have spread across the continent in a phylogeographic framework to gain insights into the underlying temporal and spatial transmission dynamics for several variants of concern (VOCs).
RESULTS
Our results indicate that the number of countries in Africa that can sequence the virus within their own borders is growing and that this is coupled with a shorter turnaround time from the time of sampling to sequence submission. Ongoing evolution necessitated the continual updating of primer sets, and, as a result, eight primer sets were designed in tandem with viral evolution and used to ensure effective sequencing of the virus. The pandemic unfolded through multiple waves of infection that were each driven by distinct genetic lineages, with B.1-like ancestral strains associated with the first pandemic wave of infections in 2020. Successive waves on the continent were fueled by different VOCs, with Alpha and Beta cocirculating in distinct spatial patterns during the second wave and Delta and Omicron affecting the whole continent during the third and fourth waves, respectively. Phylogeographic reconstruction points toward distinct differences in viral importation and exportation patterns associated with the Alpha, Beta, Delta, and Omicron variants and subvariants, when considering both Africa versus the rest of the world and viral dissemination within the continent. Our epidemiological and phylogenetic inferences therefore underscore the heterogeneous nature of the pandemic on the continent and highlight key insights and challenges, for instance, recognizing the limitations of low testing proportions. We also highlight the early warning capacity that genomic surveillance in Africa has had for the rest of the world with the detection of new lineages and variants, the most recent being the characterization of various Omicron subvariants.
CONCLUSION
Sustained investment for diagnostics and genomic surveillance in Africa is needed as the virus continues to evolve. This is important not only to help combat SARS-CoV-2 on the continent but also because it can be used as a platform to help address the many emerging and reemerging infectious disease threats in Africa. In particular, capacity building for local sequencing within countries or within the continent should be prioritized because this is generally associated with shorter turnaround times, providing the most benefit to local public health authorities tasked with pandemic response and mitigation and allowing for the fastest reaction to localized outbreaks. These investments are crucial for pandemic preparedness and response and will serve the health of the continent well into the 21st century
Giant resonances and bound collective states observed in the scattering of 92.5-MeV electrons from the closed-neutron-shell nucleus Y89 between excitation energies from 2.0 to 55 MeV
92.5 MeV electrons were used to study in (89)Y the excitation range between 2 and 55 MeV. Above neutron threshold, broad electric resonances have been seen at 14.0 (63A(-1/3) MeV (E2, vT = 0) and 28 (125A-(1/3) MeV (E2, vT = 1). The total width of the isoscalar E2 resonance is (4.5 +/-0.4) MeV and its strength (56 =/- 6) % energy-weighted sum rule (E2, vT = 0). For the isovector E2 resonance only a minimal value of 7 MeV for the width can be given which is connected with (48 +/- 5)% of the isovector sum rule. The strength of the E1 resonance [T>7(104 =/- 10)% of the Thomas-Reiche-Kuhn sum rule] agrees well with (y,n) measurements, thus giving a check for the accuracy of the evaluating methods employed. A structure around 19-20 MeV, believed to be the T> part of the giant dipole resonance, carries (8 +/- 3)% of the E1 sum rule. In addition to these generally well known states, clustering of E3 strength, (13 +/- 2)% energy-weighted sum rule (E3, vT = 0), was found at 6.75 and 80.5 MeV; the enveloping line shape of these clusters was best described by a Breit-Wigner term. Other concentrations of strength include E3 at 2.6 MeV, (15 +/-3)% energy-weighted sum rule E3, (vT = 0), E2 at 4.0 MeV, (11 +/- 3)% energy-weighted sum rule (E2, vT = 0), and E3 strength at 13.5 MeV. No resonance other than the E1 was found around 17 MeV, thus ruling out in (89)Y the existence of a monopole state with 100% sum rule proposed for (90)Zr from (a,a') and (e,e') measurements. In contrast to heavy nuclei, no resonant 3hw E3 strength could be located
Polarity-dependent forming in ion bombarded amorphous silicon memory devices
Polarity-dependent forming in ion bombarded metal-semiconductor-metal (MSM) memory devices of hydrogenated amorphous silicon is reported. It is shown that prior to ion bombardment, current transport in the MSM devices is asymmetric and is controlled by the Schottky barriers at two MS junctions. Upon bombardment, however, there is a bulk component to the current and the I-V characteristics of the devices become symmetric at low bias voltages. The forming voltage in the bombarded devices shows polarity dependence. For positive bias applied on the top contact, we find that devices form at the same electric field independent of the thickness of the amorphous silicon while for negative voltage on the top contact, the electric field needed for forming increases with the thickness. A model involving the difference in energy deposition and heat sinking for the two polarities is proposed