17,109 research outputs found
Sealed containers in Z
Physical means of securing information, such as sealed envelopes and scratch cards, can be used to achieve cryptographic objectives. Reasoning about this has so far been informal.
We give a model of distinguishable sealed envelopes in Z, exploring design decisions and further analysis and development of such models
Evolutionary dynamics on degree-heterogeneous graphs
The evolution of two species with different fitness is investigated on
degree-heterogeneous graphs. The population evolves either by one individual
dying and being replaced by the offspring of a random neighbor (voter model
(VM) dynamics) or by an individual giving birth to an offspring that takes over
a random neighbor node (invasion process (IP) dynamics). The fixation
probability for one species to take over a population of N individuals depends
crucially on the dynamics and on the local environment. Starting with a single
fitter mutant at a node of degree k, the fixation probability is proportional
to k for VM dynamics and to 1/k for IP dynamics.Comment: 4 pages, 4 figures, 2 column revtex4 format. Revisions in response to
referee comments for publication in PRL. The version on arxiv.org has one
more figure than the published PR
The Submillimeter Array
The Submillimeter Array (SMA), a collaborative project of the Smithsonian
Astrophysical Observatory (SAO) and the Academia Sinica Institute of Astronomy
and Astrophysics (ASIAA), has begun operation on Mauna Kea in Hawaii. A total
of eight 6-m telescopes comprise the array, which will cover the frequency
range of 180-900 GHz. All eight telescopes have been deployed and are
operational. First scientific results utilizing the three receiver bands at
230, 345, and 690 GHz have been obtained and are presented in the accompanying
papers.Comment: 10 pages, 4 figure
Public Evidence from Secret Ballots
Elections seem simple---aren't they just counting? But they have a unique,
challenging combination of security and privacy requirements. The stakes are
high; the context is adversarial; the electorate needs to be convinced that the
results are correct; and the secrecy of the ballot must be ensured. And they
have practical constraints: time is of the essence, and voting systems need to
be affordable and maintainable, and usable by voters, election officials, and
pollworkers. It is thus not surprising that voting is a rich research area
spanning theory, applied cryptography, practical systems analysis, usable
security, and statistics. Election integrity involves two key concepts:
convincing evidence that outcomes are correct and privacy, which amounts to
convincing assurance that there is no evidence about how any given person
voted. These are obviously in tension. We examine how current systems walk this
tightrope.Comment: To appear in E-Vote-Id '1
Statistical analysis of general aviation VG-VGH data
To represent the loads spectra of general aviation aircraft operating in the Continental United States, VG and VGH data collected since 1963 in eight operational categories were processed and analyzed. Adequacy of data sample and current operational categories, and parameter distributions required for valid data extrapolation were studied along with envelopes of equal probability of exceeding the normal load factor (n sub z) versus airspeed for gust and maneuver loads and the probability of exceeding current design maneuver, gust, and landing impact n sub z limits. The significant findings are included
Contextual perception under active inference
Human social interactions depend on the ability to resolve uncertainty about the mental states of others. The context in which social interactions take place is crucial for mental state attribution as sensory inputs may be perceived differently depending on the context. In this paper, we introduce a mental state attribution task where a target-face with either an ambiguous or an unambiguous emotion is embedded in different social contexts. The social context is determined by the emotions conveyed by other faces in the scene. This task involves mental state attribution to a target-face (either happy or sad) depending on the social context. Using active inference models, we provide a proof of concept that an agent’s perception of sensory stimuli may be altered by social context. We show with simulations that context congruency and facial expression coherency improve behavioural performance in terms of decision times. Furthermore, we show through simulations that the abnormal viewing strategies employed by patients with schizophrenia may be due to (i) an imbalance between the precisions of local and global features in the scene and (ii) a failure to modulate the sensory precision to contextualise emotions
Overcoming Language Dichotomies: Toward Effective Program Comprehension for Mobile App Development
Mobile devices and platforms have become an established target for modern
software developers due to performant hardware and a large and growing user
base numbering in the billions. Despite their popularity, the software
development process for mobile apps comes with a set of unique, domain-specific
challenges rooted in program comprehension. Many of these challenges stem from
developer difficulties in reasoning about different representations of a
program, a phenomenon we define as a "language dichotomy". In this paper, we
reflect upon the various language dichotomies that contribute to open problems
in program comprehension and development for mobile apps. Furthermore, to help
guide the research community towards effective solutions for these problems, we
provide a roadmap of directions for future work.Comment: Invited Keynote Paper for the 26th IEEE/ACM International Conference
on Program Comprehension (ICPC'18
- …