1,909 research outputs found

    Centralized vs Decentralized Multi-Agent Guesswork

    Full text link
    We study a notion of guesswork, where multiple agents intend to launch a coordinated brute-force attack to find a single binary secret string, and each agent has access to side information generated through either a BEC or a BSC. The average number of trials required to find the secret string grows exponentially with the length of the string, and the rate of the growth is called the guesswork exponent. We compute the guesswork exponent for several multi-agent attacks. We show that a multi-agent attack reduces the guesswork exponent compared to a single agent, even when the agents do not exchange information to coordinate their attack, and try to individually guess the secret string using a predetermined scheme in a decentralized fashion. Further, we show that the guesswork exponent of two agents who do coordinate their attack is strictly smaller than that of any finite number of agents individually performing decentralized guesswork.Comment: Accepted at IEEE International Symposium on Information Theory (ISIT) 201

    Rough Maximal Oscillatory Singular Integral Operators

    Get PDF
    2000 Mathematics Subject Classification: Primary 42B20; Secondary 42B15, 42B25In this paper, we establish the L^p boundedness of certain maximal oscillatory singular integral operators with rough kernels belonging to certain block spaces. Our L^p boundedness result improves previously known results

    Constructing 3D faces from natural language interface

    Get PDF
    This thesis presents a system by which 3D images of human faces can be constructed using a natural language interface. The driving force behind the project was the need to create a system whereby a machine could produce artistic images from verbal or composed descriptions. This research is the first to look at constructing and modifying facial image artwork using a natural language interface. Specialised modules have been developed to control geometry of 3D polygonal head models in a commercial modeller from natural language descriptions. These modules were produced from research on human physiognomy, 3D modelling techniques and tools, facial modelling and natural language processing. [Continues.

    REPRESENTASI MITOS DALAM FILM HOROR PADA WAKTU MAGHRIB : ANALISIS NARATIF DAN VISUAL

    Get PDF
    This study aims to analyze the representation of myths in horror films at Maghrib time. Myths related to Maghrib Time are often an interesting element in horror films, because they contain elements of mystery, belief, and fear that are related to cultural and religious contexts. In this study, researchers conducted narrative and visual analysis to understand how this myth is represented in horror films at Maghrib Time. This study focuses on narrative elements and the use of visual techniques to create a frightening atmosphere. Research data was collected by collecting samples of horror films that are relevant to the theme of Maghrib Time. The results of the analysis show that the representation of myths in horror films at Maghrib Time involves the use of symbols, timing, lighting, and music that create a dark, gripping, and fear-inducing atmosphere in the audience. The implication of this research is to provide a deeper understanding of how myths and culture related to Maghrib Time can be utilized in the context of horror films, as well as providing insight to filmmakers in creating effective effects in presenting fear to the audience.Penelitian ini bertujuan untuk menganalisis representasi mitos dalam film horor pada Waktu Maghrib. Mitos yang terkait dengan Waktu Maghrib sering kali menjadi elemen yang menarik dalam film horor, karena mereka mengandung unsur misteri, kepercayaan, dan ketakutan yang berhubungan dengan konteks budaya dan agama. Dalam penelitian ini, peneliti melakukan analisis naratif dan visual untuk memahami bagaimana mitos tersebut direpresentasikan dalam film horor pada Waktu Maghrib. Penelitian ini berfokus pada elemen-elemen naratif dan penggunaan teknik visual yang digunakan untuk menciptakan atmosfer yang menakutkan. Data penelitian dikumpulkan melalui pengumpulan sampel film horor yang relevan dengan tema Waktu Maghrib. Hasil analisis menunjukkan bahwa representasi mitos dalam film horor pada Waktu Maghrib melibatkan penggunaan simbol, pengaturan waktu, pencahayaan, dan musik yang menciptakan suasana yang gelap, mencekam, dan membangkitkan rasa takut pada penonton. Implikasi penelitian ini memberikan pemahaman yang lebih dalam tentang bagaimana mitos dan budaya terkait Waktu Maghrib dapat dimanfaatkan dalam konteks film horor, serta memberikan wawasan kepada pembuat film dalam menciptakan efek yang efektif dalam menghadirkan ketakutan kepada penonton

    PENGGUNAAN MEDIA SOSIAL DALAM KAMPANYE POLITIK DAN DAMPAKNYA TERHADAP PARTISIPASI POLOTIK DAN PERSEPSI PUBLIK

    Get PDF
    In this increasingly advanced digital era, social media has become a powerful platform for sharing information, influencing opinion, and mobilizing the masses. Therefore, it is important to understand how the use of social media in political campaigns affects political participation and public perception. This study aims to investigate the effect of social media on political behavior, with a focus on the use of social media in political campaigns and its impact on political participation and public perception. This research will use a case study approach to analyze several political campaigns that involve social media as the main communication tool. Data will be collected through online surveys, interviews and analysis of social media content. Respondents who were sampled in this study were individuals involved in political campaigns using social media, as well as the general public who actively consume political content on social media. Based on this research, it can be concluded that the use of social media in political campaigns has a significant influence on political behavior, political participation and public perception

    Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization

    Full text link
    In September 2017, McAffee Labs quarterly report estimated that brute force attacks represent 20\% of total network attacks, making them the most prevalent type of attack ex-aequo with browser based vulnerabilities. These attacks have sometimes catastrophic consequences, and understanding their fundamental limits may play an important role in the risk assessment of password-secured systems, and in the design of better security protocols. While some solutions exist to prevent online brute-force attacks that arise from one single IP address, attacks performed by botnets are more challenging. In this paper, we analyze these distributed attacks by using a simplified model. Our aim is to understand the impact of distribution and asynchronization on the overall computational effort necessary to breach a system. Our result is based on Guesswork, a measure of the number of queries (guesses) required of an adversary before a correct sequence, such as a password, is found in an optimal attack. Guesswork is a direct surrogate for time and computational effort of guessing a sequence from a set of sequences with associated likelihoods. We model the lack of synchronization by a worst-case optimization in which the queries made by multiple adversarial agents are received in the worst possible order for the adversary, resulting in a min-max formulation. We show that, even without synchronization, and for sequences of growing length, the asymptotic optimal performance is achievable by using randomized guesses drawn from an appropriate distribution. Therefore, randomization is key for distributed asynchronous attacks. In other words, asynchronous guessers can asymptotically perform brute-force attacks as efficiently as synchronized guessers.Comment: Accepted to IEEE Transactions on Information Forensics and Securit

    Determining Factors of Private Investment: Empirical Study of Pakistan

    Get PDF
    There is an ample amount of work on private investment for the cases of both developed and developing economies. Blejer and Khan (1984) study the investment function for developing countries using pooled data of 24 countries for the period 1971-1979. They find credit availability and infrastructural public investments are positively related to private investment. They observe that crowding-out phenomena works in case of non-infrastructural investment. As quoted by Saker (1993), behavior of private investment is quite different in developed and developing economies. Credit availability and government investment appear to be strong boosters of private investment in case of developing economies. Utilizing the Pakistani data set from FY 1974 to FY 1992, Saker (1993) concludes that private investment is positively correlated with output growth, private sector credit availability and government infrastructural investment. Oshikoya (1994) models private investment function for various middle-income and low-income African countries for the period 1971-1988. He finds that real output growth, real exchange rate, credit availability and government infrastructural investment are positively related to domestic private investment in studied African countries. Inflation and external debt servicing add to macroeconomic uncertainty and are, therefore negatively related to private investment
    • …
    corecore