4,022 research outputs found

    Beyond pairwise strategy updating in the prisoner's dilemma game

    Get PDF
    In spatial games players typically alter their strategy by imitating the most successful or one randomly selected neighbor. Since a single neighbor is taken as reference, the information stemming from other neighbors is neglected, which begets the consideration of alternative, possibly more realistic approaches. Here we show that strategy changes inspired not only by the performance of individual neighbors but rather by entire neighborhoods introduce a qualitatively different evolutionary dynamics that is able to support the stable existence of very small cooperative clusters. This leads to phase diagrams that differ significantly from those obtained by means of pairwise strategy updating. In particular, the survivability of cooperators is possible even by high temptations to defect and over a much wider uncertainty range. We support the simulation results by means of pair approximations and analysis of spatial patterns, which jointly highlight the importance of local information for the resolution of social dilemmas.Comment: 9 two-column pages, 5 figures; accepted for publication in Scientific Report

    Charge Density Wave Instability and Soft Phonon in AAPt3_3P (AA=Ca, Sr, and La)

    Full text link
    The electronic and phonon properties of the platinum pnictide superconductors AAPt3_3P (AA=Ca, Sr, and La) were studied using first-principles calculations. The spin-orbit coupling effect is significant in LaPt3_3P but negligible in CaPt3_3P and SrPt3_3P, although they all share the same anti-pevroskite structure. Moreover, SrPt3_3P has been demonstrated to exhibit an unexpected weak charge-density-wave(CDW) instability which is neither simply related to the Fermi-surface nesting nor to the momentum-dependent electron-phonon coupling alone. The instability is absent in CaPt3_3P and can be quickly suppressed by the external pressure, accompanied with gradual decreases in the phonon softening and BCS TcT_c. Our results suggest SrPt3_3P as a rare example where superconductivity is enhanced by the CDW fluctuations

    Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing

    Get PDF
    As cloud computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. In this paper, we propose a new method to enable effective fuzzy keyword search in a multi-user system over encrypted cloud data while maintaining keyword privacy. In this new system, differential searching privileges are supported, which is achieved with the technique of attribute-based encryption. Edit distance is utilized to quantify keywords similarity and develop fuzzy keyword search technique, which achieve optimized storage and representation overheads. We further propose a symbol-based trie-traverse searching scheme to improve the search efficiency. Through rigorous security analysis, we show that our proposed solution is secure and privacy-preserving, while correctly realizing the goal of fuzzy keyword search with multiple users

    Effect of Business Intelligence and IT Infrastructure Flexibility on Organizational Agility

    Get PDF
    There is a growing use of business intelligence (BI) for better management decisions in different industries. However, empirical studies on BI are still scarce in academic research. This research investigates BI from an organizational agility perspective. Organizational agility is the ability to sense and respond to market opportunities and threats with speed. Drawing on systems theory and literature on organizational agility, business intelligence, and IT infrastructure flexibility, we hypothesize that BI use and IT infrastructure flexibility are two major antecedents to organizational agility. We developed a research model to examine the effect of BI use and IT infrastructure flexibility on organizational agility. Survey data were collected and used to assess the model. The results support the hypothesis that BI and IT infrastructure flexibility are two significant antecedents of organizational agility. This research is a pioneering work that empirically investigates the significance of BI in business context

    Impact of Business Intelligence and IT Infrastructure flexibility on Competitive Performance: An Organizational Agility Perspective

    Get PDF
    There is a growing usage of business intelligence (BI) for better management decisions in different industries. However, empirical studies on BI are still scarce. In this research we study BI from an organizational agility perspective. Organizational agility is the ability to sense and respond to market opportunities and threats with speed and BI can help the sensing part of organizational agility. Drawing on systems theory, dynamic capabilities framework, and literature on competitive performance, organizational agility, business intelligence, and IT infrastructure flexibility, we hypothesize that BI usage and IT infrastructure flexibility are two important sources for an organization’s agility. We developed a research model to examine the effects of BI and IT infrastructure flexibility on organizational agility, which in turn affects an organization’s competitive performance. IS managers will be the main pool of subjects for this research. We will use PLS to analyze the data

    CDEdit: A Highly Applicable Redactable Blockchain with Controllable Editing Privilege and Diversified Editing Types

    Full text link
    Redactable blockchains allow modifiers or voting committees with modification privileges to edit the data on the chain. Trapdoor holders in chameleon-based hash redactable blockchains can quickly compute hash collisions for arbitrary data, and without breaking the link of the hash-chain. However, chameleon-based hash redactable blockchain schemes have difficulty solving the problem of multi-level editing requests and competing for modification privileges. In this paper, we propose CDEdit, a highly applicable redactable blockchain with controllable editing privilege and diversified editing types. The proposed scheme increases the cost of invalid or malicious requests by paying the deposit on each edit request. At the same time, the editing privilege is subdivided into request, modification, and verification privileges, and the modification privilege token is distributed efficiently to prevent the abuse of the modification privilege and collusion attacks. We use chameleon hashes with ephemeral trapdoor (CHET) and ciphertext policy attribute-based encryption (CP-ABE) to implement two editing types of transaction-level and block-level, and present a practical instantiation and security analysis. Finally, the implementation and evaluation show that our scheme only costs low-performance overhead and is suitable for multi-level editing requests and modification privilege competition scenarios.Comment: 11 pages, 6 figure
    corecore