5,839 research outputs found

    Spectral Solution with a Subtraction Method to Improve Accuracy

    Get PDF
    This work addresses the solution to a Dirichlet boundary value problem for the Poisson equation in 1-D, d2u/dx2 = f using a numerical Fourier collocation approach. The order of accuracy of this approach can be increased by modifying f so the periodic extension of the right hand side is suffciently smooth. A proof for the order is given by Skƶllermo. This work introduces a subtraction technique to modify the function\u27s right hand side to reduce the discontinuities or improve the smoothness of its periodic extension. This subtraction technique consists of cosine polynomials found by using boundary derivatives. We subtract cosine polynomials to match boundary values and derivatives of f. The derivatives need only be calculated numerically and approximately represent derivatives at the boundaries. Increasing the number of cosine polynomials in the subtraction technique increases the order of accuracy of the solution. The use of cosine polynomials matches well with the Fourier transform approach and is computationally efficient. Implementation of this technique results in a solution with variable accuracy depending on the number of collocation points and approximated boundary derivatives. Results show that the technique can be up to 14th order accurate

    Vagueness as Cost Reduction : An Empirical Test

    Get PDF
    This work was funded in part by an EPSRC Platform Grant awarded to the NLG group at Aberdeen.Publisher PD

    KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures

    Full text link
    Email breaches are commonplace, and they expose a wealth of personal, business, and political data that may have devastating consequences. The current email system allows any attacker who gains access to your email to prove the authenticity of the stolen messages to third parties -- a property arising from a necessary anti-spam / anti-spoofing protocol called DKIM. This exacerbates the problem of email breaches by greatly increasing the potential for attackers to damage the users' reputation, blackmail them, or sell the stolen information to third parties. In this paper, we introduce "non-attributable email", which guarantees that a wide class of adversaries are unable to convince any third party of the authenticity of stolen emails. We formally define non-attributability, and present two practical system proposals -- KeyForge and TimeForge -- that provably achieve non-attributability while maintaining the important protection against spam and spoofing that is currently provided by DKIM. Moreover, we implement KeyForge and demonstrate that that scheme is practical, achieving competitive verification and signing speed while also requiring 42% less bandwidth per email than RSA2048

    Augmented Biracks and their Homology

    Full text link
    We introduce augmented biracks and define a (co)homology theory associated to augmented biracks. The new homology theory extends the previously studied Yang-Baxter homology with a combinatorial formulation for the boundary map and specializes to NN-reduced rack homology when the birack is a rack. We introduce augmented birack 2-cocycle invariants of classical and virtual knots and links and provide examples.Comment: 16 page

    John Boehner is not the first Speaker to be forced from his post unwillingly, and likely will not be the last.

    Get PDF
    On Friday last week, the Republican House Speaker, John Boehner, announced that he would resign at the end of October. Matthew Green writes that Boehnerā€™s forthcoming departure is symptomatic of larger forces that have made the job of Speaker extremely challenging
    • ā€¦
    corecore