50 research outputs found

    Compositional closure for Bayes Risk in probabilistic noninterference

    Full text link
    We give a sequential model for noninterference security including probability (but not demonic choice), thus supporting reasoning about the likelihood that high-security values might be revealed by observations of low-security activity. Our novel methodological contribution is the definition of a refinement order and its use to compare security measures between specifications and (their supposed) implementations. This contrasts with the more common practice of evaluating the security of individual programs in isolation. The appropriateness of our model and order is supported by our showing that our refinement order is the greatest compositional relation --the compositional closure-- with respect to our semantics and an "elementary" order based on Bayes Risk --- a security measure already in widespread use. We also relate refinement to other measures such as Shannon Entropy. By applying the approach to a non-trivial example, the anonymous-majority Three-Judges protocol, we demonstrate by example that correctness arguments can be simplified by the sort of layered developments --through levels of increasing detail-- that are allowed and encouraged by compositional semantics

    The Value of Information for Populations in Varying Environments

    Full text link
    The notion of information pervades informal descriptions of biological systems, but formal treatments face the problem of defining a quantitative measure of information rooted in a concept of fitness, which is itself an elusive notion. Here, we present a model of population dynamics where this problem is amenable to a mathematical analysis. In the limit where any information about future environmental variations is common to the members of the population, our model is equivalent to known models of financial investment. In this case, the population can be interpreted as a portfolio of financial assets and previous analyses have shown that a key quantity of Shannon's communication theory, the mutual information, sets a fundamental limit on the value of information. We show that this bound can be violated when accounting for features that are irrelevant in finance but inherent to biological systems, such as the stochasticity present at the individual level. This leads us to generalize the measures of uncertainty and information usually encountered in information theory

    IBM-1 description of the fission products 108,110,112^{108,110,112}Ru

    Get PDF
    IBM-1} calculations for the fission products 108,110,112^{108,110,112}Ru have been carried out. The even-even isotopes of Ru can be described as transitional nuclei situated between the U(5) (spherical vibrator) and SO(6) (Îł\gamma-unstable rotor) symmetries of the Interacting Boson Model. At first, a Hamiltonian with only one- and two-body terms has been used. Excitation energies and BB(E2) ratios of gamma transitions have been calculated. A satisfactory agreement has been obtained, with the exception of the odd-even staggering in the quasi-Îł\gamma bands of 110,112^{110,112}Ru. The observed pattern is rather similar to the one for a rigid triaxial rotor. A calculation based on a Hamiltonian with three-body terms was able to remove this discrepancy. The relation between the IBM and the triaxial rotor model was also examined.Comment: 22 pages, 8 figure

    How brains make decisions

    Full text link
    This chapter, dedicated to the memory of Mino Freund, summarizes the Quantum Decision Theory (QDT) that we have developed in a series of publications since 2008. We formulate a general mathematical scheme of how decisions are taken, using the point of view of psychological and cognitive sciences, without touching physiological aspects. The basic principles of how intelligence acts are discussed. The human brain processes involved in decisions are argued to be principally different from straightforward computer operations. The difference lies in the conscious-subconscious duality of the decision making process and the role of emotions that compete with utility optimization. The most general approach for characterizing the process of decision making, taking into account the conscious-subconscious duality, uses the framework of functional analysis in Hilbert spaces, similarly to that used in the quantum theory of measurements. This does not imply that the brain is a quantum system, but just allows for the simplest and most general extension of classical decision theory. The resulting theory of quantum decision making, based on the rules of quantum measurements, solves all paradoxes of classical decision making, allowing for quantitative predictions that are in excellent agreement with experiments. Finally, we provide a novel application by comparing the predictions of QDT with experiments on the prisoner dilemma game. The developed theory can serve as a guide for creating artificial intelligence acting by quantum rules.Comment: Latex file, 20 pages, 3 figure

    Quantitative Information Flow and Applications to Differential Privacy

    Get PDF
    International audienceSecure information flow is the problem of ensuring that the information made publicly available by a computational system does not leak information that should be kept secret. Since it is practically impossible to avoid leakage entirely, in recent years there has been a growing interest in considering the quantitative aspects of information flow, in order to measure and compare the amount of leakage. Information theory is widely regarded as a natural framework to provide firm foundations to quantitative information flow. In this notes we review the two main information-theoretic approaches that have been investigated: the one based on Shannon entropy, and the one based on RĂ©nyi min-entropy. Furthermore, we discuss some applications in the area of privacy. In particular, we consider statistical databases and the recently-proposed notion of differential privacy. Using the information-theoretic view, we discuss the bound that differential privacy induces on leakage, and the trade-off between utility and privac

    ModelPlex: Verified Runtime Validation of Verified Cyber-Physical System Models

    Full text link
    Abstract. Formal verification and validation play a crucial role in making cyber-physical systems (CPS) safe. Formal methods make strong guarantees about the system behavior if accurate models of the system can be obtained, including mod-els of the controller and of the physical dynamics. In CPS, models are essential; but any model we could possibly build necessarily deviates from the real world. If the real system fits to the model, its behavior is guaranteed to satisfy the correct-ness properties verified w.r.t. the model. Otherwise, all bets are off. This paper introduces ModelPlex, a method ensuring that verification results about models apply to CPS implementations. ModelPlex provides correctness guarantees for CPS executions at runtime: it combines offline verification of CPS models with runtime validation of system executions for compliance with the model. Model-Plex ensures that the verification results obtained for the model apply to the ac-tual system runs by monitoring the behavior of the world for compliance with the model, assuming the system dynamics deviation is bounded. If, at some point, the observed behavior no longer complies with the model so that offline verifica-tion results no longer apply, ModelPlex initiates provably safe fallback actions. This paper, furthermore, develops a systematic technique to synthesize provably correct monitors automatically from CPS proofs in differential dynamic logic.

    The evolving SARS-CoV-2 epidemic in Africa: Insights from rapidly expanding genomic surveillance

    Get PDF
    INTRODUCTION Investment in Africa over the past year with regard to severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) sequencing has led to a massive increase in the number of sequences, which, to date, exceeds 100,000 sequences generated to track the pandemic on the continent. These sequences have profoundly affected how public health officials in Africa have navigated the COVID-19 pandemic. RATIONALE We demonstrate how the first 100,000 SARS-CoV-2 sequences from Africa have helped monitor the epidemic on the continent, how genomic surveillance expanded over the course of the pandemic, and how we adapted our sequencing methods to deal with an evolving virus. Finally, we also examine how viral lineages have spread across the continent in a phylogeographic framework to gain insights into the underlying temporal and spatial transmission dynamics for several variants of concern (VOCs). RESULTS Our results indicate that the number of countries in Africa that can sequence the virus within their own borders is growing and that this is coupled with a shorter turnaround time from the time of sampling to sequence submission. Ongoing evolution necessitated the continual updating of primer sets, and, as a result, eight primer sets were designed in tandem with viral evolution and used to ensure effective sequencing of the virus. The pandemic unfolded through multiple waves of infection that were each driven by distinct genetic lineages, with B.1-like ancestral strains associated with the first pandemic wave of infections in 2020. Successive waves on the continent were fueled by different VOCs, with Alpha and Beta cocirculating in distinct spatial patterns during the second wave and Delta and Omicron affecting the whole continent during the third and fourth waves, respectively. Phylogeographic reconstruction points toward distinct differences in viral importation and exportation patterns associated with the Alpha, Beta, Delta, and Omicron variants and subvariants, when considering both Africa versus the rest of the world and viral dissemination within the continent. Our epidemiological and phylogenetic inferences therefore underscore the heterogeneous nature of the pandemic on the continent and highlight key insights and challenges, for instance, recognizing the limitations of low testing proportions. We also highlight the early warning capacity that genomic surveillance in Africa has had for the rest of the world with the detection of new lineages and variants, the most recent being the characterization of various Omicron subvariants. CONCLUSION Sustained investment for diagnostics and genomic surveillance in Africa is needed as the virus continues to evolve. This is important not only to help combat SARS-CoV-2 on the continent but also because it can be used as a platform to help address the many emerging and reemerging infectious disease threats in Africa. In particular, capacity building for local sequencing within countries or within the continent should be prioritized because this is generally associated with shorter turnaround times, providing the most benefit to local public health authorities tasked with pandemic response and mitigation and allowing for the fastest reaction to localized outbreaks. These investments are crucial for pandemic preparedness and response and will serve the health of the continent well into the 21st century

    Giant resonances and bound collective states observed in the scattering of 92.5-MeV electrons from the closed-neutron-shell nucleus Y89 between excitation energies from 2.0 to 55 MeV

    Get PDF
    92.5 MeV electrons were used to study in (89)Y the excitation range between 2 and 55 MeV. Above neutron threshold, broad electric resonances have been seen at 14.0 (63A(-1/3) MeV (E2, vT = 0) and 28 (125A-(1/3) MeV (E2, vT = 1). The total width of the isoscalar E2 resonance is (4.5 +/-0.4) MeV and its strength (56 =/- 6) % energy-weighted sum rule (E2, vT = 0). For the isovector E2 resonance only a minimal value of 7 MeV for the width can be given which is connected with (48 +/- 5)% of the isovector sum rule. The strength of the E1 resonance [T>7(104 =/- 10)% of the Thomas-Reiche-Kuhn sum rule] agrees well with (y,n) measurements, thus giving a check for the accuracy of the evaluating methods employed. A structure around 19-20 MeV, believed to be the T> part of the giant dipole resonance, carries (8 +/- 3)% of the E1 sum rule. In addition to these generally well known states, clustering of E3 strength, (13 +/- 2)% energy-weighted sum rule (E3, vT = 0), was found at 6.75 and 80.5 MeV; the enveloping line shape of these clusters was best described by a Breit-Wigner term. Other concentrations of strength include E3 at 2.6 MeV, (15 +/-3)% energy-weighted sum rule E3, (vT = 0), E2 at 4.0 MeV, (11 +/- 3)% energy-weighted sum rule (E2, vT = 0), and E3 strength at 13.5 MeV. No resonance other than the E1 was found around 17 MeV, thus ruling out in (89)Y the existence of a monopole state with 100% sum rule proposed for (90)Zr from (a,a') and (e,e') measurements. In contrast to heavy nuclei, no resonant 3hw E3 strength could be located

    Polarity-dependent forming in ion bombarded amorphous silicon memory devices

    Get PDF
    Polarity-dependent forming in ion bombarded metal-semiconductor-metal (MSM) memory devices of hydrogenated amorphous silicon is reported. It is shown that prior to ion bombardment, current transport in the MSM devices is asymmetric and is controlled by the Schottky barriers at two MS junctions. Upon bombardment, however, there is a bulk component to the current and the I-V characteristics of the devices become symmetric at low bias voltages. The forming voltage in the bombarded devices shows polarity dependence. For positive bias applied on the top contact, we find that devices form at the same electric field independent of the thickness of the amorphous silicon while for negative voltage on the top contact, the electric field needed for forming increases with the thickness. A model involving the difference in energy deposition and heat sinking for the two polarities is proposed
    corecore