73,380 research outputs found
Game Theory Meets Network Security: A Tutorial at ACM CCS
The increasingly pervasive connectivity of today's information systems brings
up new challenges to security. Traditional security has accomplished a long way
toward protecting well-defined goals such as confidentiality, integrity,
availability, and authenticity. However, with the growing sophistication of the
attacks and the complexity of the system, the protection using traditional
methods could be cost-prohibitive. A new perspective and a new theoretical
foundation are needed to understand security from a strategic and
decision-making perspective. Game theory provides a natural framework to
capture the adversarial and defensive interactions between an attacker and a
defender. It provides a quantitative assessment of security, prediction of
security outcomes, and a mechanism design tool that can enable
security-by-design and reverse the attacker's advantage. This tutorial provides
an overview of diverse methodologies from game theory that includes games of
incomplete information, dynamic games, mechanism design theory to offer a
modern theoretic underpinning of a science of cybersecurity. The tutorial will
also discuss open problems and research challenges that the CCS community can
address and contribute with an objective to build a multidisciplinary bridge
between cybersecurity, economics, game and decision theory
Automatic Generation of Text Descriptive Comments for Code Blocks
We propose a framework to automatically generate descriptive comments for
source code blocks. While this problem has been studied by many researchers
previously, their methods are mostly based on fixed template and achieves poor
results. Our framework does not rely on any template, but makes use of a new
recursive neural network called Code-RNN to extract features from the source
code and embed them into one vector. When this vector representation is input
to a new recurrent neural network (Code-GRU), the overall framework generates
text descriptions of the code with accuracy (Rouge-2 value) significantly
higher than other learning-based approaches such as sequence-to-sequence model.
The Code-RNN model can also be used in other scenario where the representation
of code is required.Comment: aaai 201
Construction of a surface air temperature series for Qingdao in China for the period 1899 to 2014
Abstract. We present a homogenized surface air temperature (SAT) time series at 2 m height for the city of Qingdao in China from 1899 to 2014. This series is derived from three data sources: newly digitized and homogenized observations of the German National Meteorological Service from 1899 to 1913, homogenized observation data of the China Meteorological Administration (CMA) from 1961 to 2014 and a gridded dataset of Willmott and Matsuura (2012) in Delaware to fill the gap from 1914 to 1960. Based on this new series, long-term trends are described. The SAT in Qingdao has a significant warming trend of 0.11 ± 0.03 °C decade−1 during 1899–2014. The coldest period occurred during 1909–1918 and the warmest period occurred during 1999–2008. For the seasonal mean SAT, the most significant warming can be found in spring, followed by winter. The homogenized time series of Qingdao is provided and archived by the Deutscher Wetterdienst (DWD) web page under overseas stations of the Deutsche Seewarte (http://www.dwd.de/EN/ourservices/overseas_stations/ueberseedoku/doi_qingdao.html) in ASCII format. Users can also freely obtain a short description of the data at https://doi.org/https://dx.doi.org/10.5676/DWD/Qing_v1 And the data can be downloaded at http://dwd.de/EN/ourservices/overseas_stations/ueberseedoku/data_qingdao.txt
Improved rotor position estimation in extended back-EMF based sensorless PM brushless AC drives with magnetic saliency
An improved extended back-EMF based sensorless control method is proposed for a brushless AC motor equipped with an interior permanent magnet rotor. It accounts for dq-axis cross-coupling magnetic saturation by introducing an apparent mutual winding inductance. The error which results in the estimated rotor position when the influence of cross-coupling magnetic saturation is neglected is analyzed analytically, predicted by finite element analysis, and confirmed experimentally, for various d- and q-axis currents. It is shown that a significant improvement in the accuracy of the rotor position estimation can be achieved by the proposed method, as confirmed by measurements
Crumpled textile antennas
The performance of a dual-band textile antenna under two-dimensional crumpling conditions is described. Both input impedance and radiation patterns are investigated based on numerical and experimental methods at 2.45 and 5.8 GHz. The return loss for the coplanar antenna is affected by the most severe crumpling at the higher frequency band, while the radiation patterns remain acceptable at both bands
Laser Mode Bifurcations Induced by -Breaking Exceptional Points
A laser consisting of two independently-pumped resonators can exhibit mode
bifurcations that evolve out of the exceptional points (EPs) of the linear
system at threshold. The EPs are non-Hermitian degeneracies occurring at the
parity/time-reversal () symmetry breaking points of the threshold
system. Above threshold, the EPs become bifurcations of the nonlinear
zero-detuned laser modes, which can be most easily observed by making the gain
saturation intensities in the two resonators substantially different. Small
pump variations can then switch abruptly between different laser behaviors,
e.g. between below-threshold and -broken single-mode operation.Comment: 4 pages, 3 figure
- …
