360 research outputs found

    The Cinderella Complex: Word Embeddings Reveal Gender Stereotypes in Movies and Books

    Full text link
    Our analysis of thousands of movies and books reveals how these cultural products weave stereotypical gender roles into morality tales and perpetuate gender inequality through storytelling. Using the word embedding techniques, we reveal the constructed emotional dependency of female characters on male characters in stories

    The Metabolism and Growth of Web Forums

    Full text link
    We view web forums as virtual living organisms feeding on user's attention and investigate how these organisms grow at the expense of collective attention. We find that the "body mass" (PVPV) and "energy consumption" (UVUV) of the studied forums exhibits the allometric growth property, i.e., PVt∼UVtθPV_t \sim UV_t ^ \theta. This implies that within a forum, the network transporting attention flow between threads has a structure invariant of time, despite of the continuously changing of the nodes (threads) and edges (clickstreams). The observed time-invariant topology allows us to explain the dynamics of networks by the behavior of threads. In particular, we describe the clickstream dissipation on threads using the function Di∼TiγD_i \sim T_i ^ \gamma, in which TiT_i is the clickstreams to node ii and DiD_i is the clickstream dissipated from ii. It turns out that γ\gamma, an indicator for dissipation efficiency, is negatively correlated with θ\theta and 1/γ1/\gamma sets the lower boundary for θ\theta. Our findings have practical consequences. For example, θ\theta can be used as a measure of the "stickiness" of forums, because it quantifies the stable ability of forums to convert UVUV into PVPV, i.e., to remain users "lock-in" the forum. Meanwhile, the correlation between γ\gamma and θ\theta provides a convenient method to evaluate the `stickiness" of forums. Finally, we discuss an optimized "body mass" of forums at around 10510^5 that minimizes γ\gamma and maximizes θ\theta.Comment: 6 figure

    Study of imperfect keys to characterise the security of optical encryption

    Get PDF
    In conventional symmetric encryption, it is common for the encryption/decryption key to be reused for multiple plaintexts. This gives rise to the concept of a known-plaintext attack. In optical image encryption systems, such as double random phase encoding (DRPE), this is also the case; if one knows a plaintext-ciphertext pair, one can carry out a known-plaintext attack more efficiently than a brute-force attack, using heuristics based on phase retrieval or simulated annealing. However, we demonstrate that it is likely that an attacker will find an imperfect decryption key using such heuristics. Such an imperfect key will work for the known plaintext-ciphertext pair, but not an arbitrary unseen plaintext-ciphertext pair encrypted using the original key. In this paper, we illustrate the problem and attempt to characterise the increase in security it affords optical encryption

    Study of imperfect keys to characterise the security of optical encryption

    Get PDF
    In conventional symmetric encryption, it is common for the encryption/decryption key to be reused for multiple plaintexts. This gives rise to the concept of a known-plaintext attack. In optical image encryption systems, such as double random phase encoding (DRPE), this is also the case; if one knows a plaintext-ciphertext pair, one can carry out a known-plaintext attack more efficiently than a brute-force attack, using heuristics based on phase retrieval or simulated annealing. However, we demonstrate that it is likely that an attacker will find an imperfect decryption key using such heuristics. Such an imperfect key will work for the known plaintext-ciphertext pair, but not an arbitrary unseen plaintext-ciphertext pair encrypted using the original key. In this paper, we illustrate the problem and attempt to characterise the increase in security it affords optical encryption
    • …
    corecore