73,380 research outputs found

    Game Theory Meets Network Security: A Tutorial at ACM CCS

    Full text link
    The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker's advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory

    Automatic Generation of Text Descriptive Comments for Code Blocks

    Full text link
    We propose a framework to automatically generate descriptive comments for source code blocks. While this problem has been studied by many researchers previously, their methods are mostly based on fixed template and achieves poor results. Our framework does not rely on any template, but makes use of a new recursive neural network called Code-RNN to extract features from the source code and embed them into one vector. When this vector representation is input to a new recurrent neural network (Code-GRU), the overall framework generates text descriptions of the code with accuracy (Rouge-2 value) significantly higher than other learning-based approaches such as sequence-to-sequence model. The Code-RNN model can also be used in other scenario where the representation of code is required.Comment: aaai 201

    Searching for Point Source Signals through Muons

    Get PDF

    Construction of a surface air temperature series for Qingdao in China for the period 1899 to 2014

    No full text
    Abstract. We present a homogenized surface air temperature (SAT) time series at 2 m height for the city of Qingdao in China from 1899 to 2014. This series is derived from three data sources: newly digitized and homogenized observations of the German National Meteorological Service from 1899 to 1913, homogenized observation data of the China Meteorological Administration (CMA) from 1961 to 2014 and a gridded dataset of Willmott and Matsuura (2012) in Delaware to fill the gap from 1914 to 1960. Based on this new series, long-term trends are described. The SAT in Qingdao has a significant warming trend of 0.11 ± 0.03 °C decade−1 during 1899–2014. The coldest period occurred during 1909–1918 and the warmest period occurred during 1999–2008. For the seasonal mean SAT, the most significant warming can be found in spring, followed by winter. The homogenized time series of Qingdao is provided and archived by the Deutscher Wetterdienst (DWD) web page under overseas stations of the Deutsche Seewarte (http://www.dwd.de/EN/ourservices/overseas_stations/ueberseedoku/doi_qingdao.html) in ASCII format. Users can also freely obtain a short description of the data at https://doi.org/https://dx.doi.org/10.5676/DWD/Qing_v1 And the data can be downloaded at http://dwd.de/EN/ourservices/overseas_stations/ueberseedoku/data_qingdao.txt

    Improved rotor position estimation in extended back-EMF based sensorless PM brushless AC drives with magnetic saliency

    Get PDF
    An improved extended back-EMF based sensorless control method is proposed for a brushless AC motor equipped with an interior permanent magnet rotor. It accounts for dq-axis cross-coupling magnetic saturation by introducing an apparent mutual winding inductance. The error which results in the estimated rotor position when the influence of cross-coupling magnetic saturation is neglected is analyzed analytically, predicted by finite element analysis, and confirmed experimentally, for various d- and q-axis currents. It is shown that a significant improvement in the accuracy of the rotor position estimation can be achieved by the proposed method, as confirmed by measurements

    Crumpled textile antennas

    Get PDF
    The performance of a dual-band textile antenna under two-dimensional crumpling conditions is described. Both input impedance and radiation patterns are investigated based on numerical and experimental methods at 2.45 and 5.8 GHz. The return loss for the coplanar antenna is affected by the most severe crumpling at the higher frequency band, while the radiation patterns remain acceptable at both bands

    Laser Mode Bifurcations Induced by PT\mathcal{PT}-Breaking Exceptional Points

    Full text link
    A laser consisting of two independently-pumped resonators can exhibit mode bifurcations that evolve out of the exceptional points (EPs) of the linear system at threshold. The EPs are non-Hermitian degeneracies occurring at the parity/time-reversal (PT\mathcal{PT}) symmetry breaking points of the threshold system. Above threshold, the EPs become bifurcations of the nonlinear zero-detuned laser modes, which can be most easily observed by making the gain saturation intensities in the two resonators substantially different. Small pump variations can then switch abruptly between different laser behaviors, e.g. between below-threshold and PT\mathcal{PT}-broken single-mode operation.Comment: 4 pages, 3 figure
    corecore