2,902 research outputs found

    Optimal vaccination in a stochastic epidemic model of two non-interacting populations

    Get PDF
    Developing robust, quantitative methods to optimize resource allocations in response to epidemics has the potential to save lives and minimize health care costs. In this paper, we develop and apply a computationally efficient algorithm that enables us to calculate the complete probability distribution for the final epidemic size in a stochastic Susceptible-Infected-Recovered (SIR) model. Based on these results, we determine the optimal allocations of a limited quantity of vaccine between two non-interacting populations. We compare the stochastic solution to results obtained for the traditional, deterministic SIR model. For intermediate quantities of vaccine, the deterministic model is a poor estimate of the optimal strategy for the more realistic, stochastic case.Comment: 21 pages, 7 figure

    Temperature-Aware Leakage Minimization Techniques for Real-Time Systems

    Get PDF
    In this paper, we study the interdependencies between system's leakage and on-chip temperature. We show that the temperature variation caused by on-chip heat accumulation has a large impact in estimating the system's leakage energy. More importantly, we propose an online temperature-aware leakage minimization technique to demonstrate how to incorporate the temperature information to reduce energy consumption at real time. The basic idea is to run when the system is cool and the workload is high and to put the system to sleep when it is hot and the workload is light. The online algorithm has low run-time complexity and achieves significant leakage energy saving. In fact, we are able to get about 25% leakage reduction on both real life and artificial benchmarks. Comparing to our optimal offline algorithm, the above online algorithm provides similar energy savings with similar decisions on how to put the system to sleep and how to wake it up. Finally, our temperature-aware leakage minimization techniques can be combined with existing DVS methods to improve the total energy efficiency by further saving on leakage

    Web Spoofing Revisited: SSL and Beyond

    Get PDF
    Can users believe what their browsers tell them? Even sophisticated Web users decide whether or not to trust a server based on browser cues such as location bar information, SSL icons, SSL warnings, certificate information, and response time. In their seminal work on Web spoofing, Felten et al showed how, in 1996, a malicious server could forge some of these cues. However, this work used genuine SSL sessions, and Web technology has evolved much since 1996. The Web has since become the pre-eminent medium for electronic service delivery to remote users, and the security of many commerce, government, and academic network applications critically rests on the assumption that users can authenticate the servers with which they interact. This situation raises the question: is the browser-user communication model today secure enough to warrant this assumption? In this paper, we answer this question by systematically showing how a malicious server can forge every one of the above cues. Our work extends the prior results by examining contemporary browsers, and by forging all of the SSL information a client sees, including the very existence of an SSL session (thus providing a cautionary tale about the security of one of the most common applications of PKI). We have made these techniques available for public demonstration, because anything less than working code would not convincingly answer the question. We also discuss implications and potential countermeasures, both short-term and long-term

    Web Spoofing 2001

    Get PDF
    The Web is currently the pre-eminent medium for electronic service delivery to remote users. As a consequence, authentication of servers is more important than ever. Even sophisticated users base their decision whether or not to trust a site on browser cues---such as location bar information, SSL icons, SSL warnings, certificate information, response time, etc. In their seminal work on web spoofing, Felten et al showed how a malicious server could forge some of these cues---but using approaches that are no longer reproducible. However, subsequent evolution of Web tools has not only patched security holes---it has also added new technology to make pages more interactive and vivid. In this paper, we explore the feasibility of web spoofing using this new technology---and we show how, in many cases, every one of the above cues can be forged. In particular, we show how a malicious server can forge all the SSL information a client sees---thus providing a cautionary tale about the security of one of the most common applications of PKI. We stress that these techniques have been implemented, and are available for public demonstration

    The Aemulus Project III: Emulation of the Galaxy Correlation Function

    Get PDF
    Using the N-body simulations of the AEMULUS Project, we construct an emulator for the non-linear clustering of galaxies in real and redshift space. We construct our model of galaxy bias using the halo occupation framework, accounting for possible velocity bias. The model includes 15 parameters, including both cosmological and galaxy bias parameters. We demonstrate that our emulator achieves ~ 1% precision at the scales of interest, 0.1<r<10 h^{-1} Mpc, and recovers the true cosmology when tested against independent simulations. Our primary parameters of interest are related to the growth rate of structure, f, and its degenerate combination fsigma_8. Using this emulator, we show that the constraining power on these parameters monotonically increases as smaller scales are included in the analysis, all the way down to 0.1 h^{-1} Mpc. For a BOSS-like survey, the constraints on fsigma_8 from r<30 h^{-1} Mpc scales alone are more than a factor of two tighter than those from the fiducial BOSS analysis of redshift-space clustering using perturbation theory at larger scales. The combination of real- and redshift-space clustering allows us to break the degeneracy between f and sigma_8, yielding a 9% constraint on f alone for a BOSS-like analysis. The current AEMULUS simulations limit this model to surveys of massive galaxies. Future simulations will allow this framework to be extended to all galaxy target types, including emission-line galaxies.Comment: 14 pages, 8 figures, 1 table; submitted to ApJ; the project webpage is available at https://aemulusproject.github.io ; typo in Figure 7 and caption updated, results unchange

    The Aemulus Project I: Numerical Simulations for Precision Cosmology

    Get PDF
    The rapidly growing statistical precision of galaxy surveys has lead to a need for ever-more precise predictions of the observables used to constrain cosmological and galaxy formation models. The primary avenue through which such predictions will be obtained is suites of numerical simulations. These simulations must span the relevant model parameter spaces, be large enough to obtain the precision demanded by upcoming data, and be thoroughly validated in order to ensure accuracy. In this paper we present one such suite of simulations, forming the basis for the AEMULUS Project, a collaboration devoted to precision emulation of galaxy survey observables. We have run a set of 75 (1.05 h^-1 Gpc)^3 simulations with mass resolution and force softening of 3.51\times 10^10 (Omega_m / 0.3) ~ h^-1 M_sun and 20 ~ h^-1 kpc respectively in 47 different wCDM cosmologies spanning the range of parameter space allowed by the combination of recent Cosmic Microwave Background, Baryon Acoustic Oscillation and Type Ia Supernovae results. We present convergence tests of several observables including spherical overdensity halo mass functions, galaxy projected correlation functions, galaxy clustering in redshift space, and matter and halo correlation functions and power spectra. We show that these statistics are converged to 1% (2%) for halos with more than 500 (200) particles respectively and scales of r>200 ~ h^-1 kpc in real space or k ~ 3 h Mpc^-1 in harmonic space for z\le 1. We find that the dominant source of uncertainty comes from varying the particle loading of the simulations. This leads to large systematic errors for statistics using halos with fewer than 200 particles and scales smaller than k ~ 4 h^-1 Mpc. We provide the halo catalogs and snapshots detailed in this work to the community at https://AemulusProject.github.io.Comment: 16 pages, 12 figures, 3 Tables Project website: https://aemulusproject.github.io

    The Aemulus Project II: Emulating the Halo Mass Function

    Get PDF
    Existing models for the dependence of the halo mass function on cosmological parameters will become a limiting source of systematic uncertainty for cluster cosmology in the near future. We present a halo mass function emulator and demonstrate improved accuracy relative to state-of-the-art analytic models. In this work, mass is defined using an overdensity criteria of 200 relative to the mean background density. Our emulator is constructed from the AEMULUS simulations, a suite of 40 N-body simulations with snapshots from z=3 to z=0. These simulations cover the flat wCDM parameter space allowed by recent Cosmic Microwave Background, Baryon Acoustic Oscillation and Type Ia Supernovae results, varying the parameters w, Omega_m, Omega_b, sigma_8, N_{eff}, n_s, and H_0. We validate our emulator using five realizations of seven different cosmologies, for a total of 35 test simulations. These test simulations were not used in constructing the emulator, and were run with fully independent initial conditions. We use our test simulations to characterize the modeling uncertainty of the emulator, and introduce a novel way of marginalizing over the associated systematic uncertainty. We confirm non-universality in our halo mass function emulator as a function of both cosmological parameters and redshift. Our emulator achieves better than 1% precision over much of the relevant parameter space, and we demonstrate that the systematic uncertainty in our emulator will remain a negligible source of error for cluster abundance studies through at least the LSST Year 1 data set.Comment: https://aemulusproject.github.io
    • …
    corecore