4,022 research outputs found
Beyond pairwise strategy updating in the prisoner's dilemma game
In spatial games players typically alter their strategy by imitating the most
successful or one randomly selected neighbor. Since a single neighbor is taken
as reference, the information stemming from other neighbors is neglected, which
begets the consideration of alternative, possibly more realistic approaches.
Here we show that strategy changes inspired not only by the performance of
individual neighbors but rather by entire neighborhoods introduce a
qualitatively different evolutionary dynamics that is able to support the
stable existence of very small cooperative clusters. This leads to phase
diagrams that differ significantly from those obtained by means of pairwise
strategy updating. In particular, the survivability of cooperators is possible
even by high temptations to defect and over a much wider uncertainty range. We
support the simulation results by means of pair approximations and analysis of
spatial patterns, which jointly highlight the importance of local information
for the resolution of social dilemmas.Comment: 9 two-column pages, 5 figures; accepted for publication in Scientific
Report
Charge Density Wave Instability and Soft Phonon in PtP (=Ca, Sr, and La)
The electronic and phonon properties of the platinum pnictide superconductors
PtP (=Ca, Sr, and La) were studied using first-principles
calculations. The spin-orbit coupling effect is significant in LaPtP but
negligible in CaPtP and SrPtP, although they all share the same
anti-pevroskite structure. Moreover, SrPtP has been demonstrated to exhibit
an unexpected weak charge-density-wave(CDW) instability which is neither simply
related to the Fermi-surface nesting nor to the momentum-dependent
electron-phonon coupling alone. The instability is absent in CaPtP and can
be quickly suppressed by the external pressure, accompanied with gradual
decreases in the phonon softening and BCS . Our results suggest SrPtP
as a rare example where superconductivity is enhanced by the CDW fluctuations
Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing
As cloud computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. In this paper, we propose a new method to enable effective fuzzy keyword search in a multi-user system over encrypted cloud data while maintaining keyword privacy. In this new system, differential searching privileges are supported, which is achieved with the technique of attribute-based encryption. Edit distance is utilized to quantify keywords similarity and develop fuzzy keyword search technique, which achieve optimized storage and representation overheads. We further propose a symbol-based trie-traverse searching scheme to improve the search efficiency. Through rigorous security analysis, we show that our proposed solution is secure and privacy-preserving, while correctly realizing the goal of fuzzy keyword search with multiple users
Effect of Business Intelligence and IT Infrastructure Flexibility on Organizational Agility
There is a growing use of business intelligence (BI) for better management decisions in different industries. However, empirical studies on BI are still scarce in academic research. This research investigates BI from an organizational agility perspective. Organizational agility is the ability to sense and respond to market opportunities and threats with speed. Drawing on systems theory and literature on organizational agility, business intelligence, and IT infrastructure flexibility, we hypothesize that BI use and IT infrastructure flexibility are two major antecedents to organizational agility. We developed a research model to examine the effect of BI use and IT infrastructure flexibility on organizational agility. Survey data were collected and used to assess the model. The results support the hypothesis that BI and IT infrastructure flexibility are two significant antecedents of organizational agility. This research is a pioneering work that empirically investigates the significance of BI in business context
Impact of Business Intelligence and IT Infrastructure flexibility on Competitive Performance: An Organizational Agility Perspective
There is a growing usage of business intelligence (BI) for better management decisions in different industries. However, empirical studies on BI are still scarce. In this research we study BI from an organizational agility perspective. Organizational agility is the ability to sense and respond to market opportunities and threats with speed and BI can help the sensing part of organizational agility. Drawing on systems theory, dynamic capabilities framework, and literature on competitive performance, organizational agility, business intelligence, and IT infrastructure flexibility, we hypothesize that BI usage and IT infrastructure flexibility are two important sources for an organization’s agility. We developed a research model to examine the effects of BI and IT infrastructure flexibility on organizational agility, which in turn affects an organization’s competitive performance. IS managers will be the main pool of subjects for this research. We will use PLS to analyze the data
CDEdit: A Highly Applicable Redactable Blockchain with Controllable Editing Privilege and Diversified Editing Types
Redactable blockchains allow modifiers or voting committees with modification
privileges to edit the data on the chain. Trapdoor holders in chameleon-based
hash redactable blockchains can quickly compute hash collisions for arbitrary
data, and without breaking the link of the hash-chain. However, chameleon-based
hash redactable blockchain schemes have difficulty solving the problem of
multi-level editing requests and competing for modification privileges. In this
paper, we propose CDEdit, a highly applicable redactable blockchain with
controllable editing privilege and diversified editing types. The proposed
scheme increases the cost of invalid or malicious requests by paying the
deposit on each edit request. At the same time, the editing privilege is
subdivided into request, modification, and verification privileges, and the
modification privilege token is distributed efficiently to prevent the abuse of
the modification privilege and collusion attacks. We use chameleon hashes with
ephemeral trapdoor (CHET) and ciphertext policy attribute-based encryption
(CP-ABE) to implement two editing types of transaction-level and block-level,
and present a practical instantiation and security analysis. Finally, the
implementation and evaluation show that our scheme only costs low-performance
overhead and is suitable for multi-level editing requests and modification
privilege competition scenarios.Comment: 11 pages, 6 figure
- …