59,564 research outputs found

    Bootstrap consistency for general semiparametric MM-estimation

    Get PDF
    Consider MM-estimation in a semiparametric model that is characterized by a Euclidean parameter of interest and an infinite-dimensional nuisance parameter. As a general purpose approach to statistical inferences, the bootstrap has found wide applications in semiparametric MM-estimation and, because of its simplicity, provides an attractive alternative to the inference approach based on the asymptotic distribution theory. The purpose of this paper is to provide theoretical justifications for the use of bootstrap as a semiparametric inferential tool. We show that, under general conditions, the bootstrap is asymptotically consistent in estimating the distribution of the MM-estimate of Euclidean parameter; that is, the bootstrap distribution asymptotically imitates the distribution of the MM-estimate. We also show that the bootstrap confidence set has the asymptotically correct coverage probability. These general conclusions hold, in particular, when the nuisance parameter is not estimable at root-nn rate, and apply to a broad class of bootstrap methods with exchangeable bootstrap weights. This paper provides a first general theoretical study of the bootstrap in semiparametric models.Comment: Published in at http://dx.doi.org/10.1214/10-AOS809 the Annals of Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical Statistics (http://www.imstat.org

    Gravitational Waves from Phase Transition of Accreting Neutron Stars

    Get PDF
    We propose that when neutron stars in low-mass X-ray binaries accrete sufficient mass and become millisecond pulsars, the interiors of these stars may undergo phase transitions, which excite stellar radial oscillations. We show that the radial oscillations will be mainly damped by gravitational-wave radiation instead of internal viscosity. The gravitational waves can be detected by the advanced Laser Interferometer Gravitational-Wave Observatory at a rate of about three events per year.Comment: Latex, article style, approximately 10 page

    Pairing-based cryptosystems and key agreement protocols.

    Get PDF
    For a long time, pairings on elliptic curves have been considered to be destructive in elliptic curve cryptography. Only recently after some pioneering works, particularly the well-known Boneh-Franklin identity-based encryption (IBE), pairings have quickly become an important tool to construct novel cryptographic schemes. In this thesis, several new cryptographic schemes with pairings are proposed, which are both efficient and secure with respect to a properly defined security model, and some relevant previous schemes are revisited. IBE provides a public key encryption mechanism where a public key can be an arbitrary string such as an entity identifier and unwieldy certificates are unnecessary. Based on the Sakai-Kasahara key construction, an IBE scheme which is secure in the Boneh-Franklin IBE model is constructed, and two identity-based key encapsulation mechanisms are proposed. These schemes achieve the best efficiency among the existing schemes to date. Recently Al-Riyami and Paterson introduced the certificateless public key encryption (CL-PKE) paradigm, which eliminates the need of certificates and at the same time retains the desirable properties of IBE without the key escrow problem. The security formulation of CL-PKE is revisited and a strong security model for this type of mechanism is defined. Following a heuristic approach, three efficient CL-PKE schemes which are secure in the defined strong security model are proposed. Identity-based two-party key agreement protocols from pairings are also investigated. The Bellare-Rogaway key agreement model is enhanced and within the model several previously unproven protocols in the literature are formally analysed. In considering that the user identity may be sensitive information in many environments, an identity-based key agreement protocol with unilateral identity privacy is proposed

    Spatiotemporal Patterns and Predictability of Cyberattacks

    Get PDF
    Y.C.L. was supported by Air Force Office of Scientific Research (AFOSR) under grant no. FA9550-10-1-0083 and Army Research Office (ARO) under grant no. W911NF-14-1-0504. S.X. was supported by Army Research Office (ARO) under grant no. W911NF-13-1-0141. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.Peer reviewedPublisher PD

    An experimental study on a motion sensing system for sports training

    Get PDF
    In sports science, motion data collected from athletes is used to derive key performance characteristics, such as stride length and stride frequency, that are vital coaching support information. The sensors for use must be more accurate, must capture more vigorous events, and have strict weight and size requirements, since they must not themselves affect performance. These requirements mean each wireless sensor device is necessarily resource poor and yet must be capable of communicating a considerable amount of data, contending for the bandwidth with other sensors on the body. This paper analyses the results of a set of network traffic experiments that were designed to investigate the suitability of conventional wireless motion sensing system design � which generally assumes in-network processing - as an efficient and scalable design for use in sports training
    corecore