360 research outputs found
The Cinderella Complex: Word Embeddings Reveal Gender Stereotypes in Movies and Books
Our analysis of thousands of movies and books reveals how these cultural
products weave stereotypical gender roles into morality tales and perpetuate
gender inequality through storytelling. Using the word embedding techniques, we
reveal the constructed emotional dependency of female characters on male
characters in stories
The Metabolism and Growth of Web Forums
We view web forums as virtual living organisms feeding on user's attention
and investigate how these organisms grow at the expense of collective
attention. We find that the "body mass" () and "energy consumption" ()
of the studied forums exhibits the allometric growth property, i.e., . This implies that within a forum, the network transporting
attention flow between threads has a structure invariant of time, despite of
the continuously changing of the nodes (threads) and edges (clickstreams). The
observed time-invariant topology allows us to explain the dynamics of networks
by the behavior of threads. In particular, we describe the clickstream
dissipation on threads using the function , in which
is the clickstreams to node and is the clickstream dissipated
from . It turns out that , an indicator for dissipation efficiency,
is negatively correlated with and sets the lower boundary
for . Our findings have practical consequences. For example,
can be used as a measure of the "stickiness" of forums, because it quantifies
the stable ability of forums to convert into , i.e., to remain users
"lock-in" the forum. Meanwhile, the correlation between and
provides a convenient method to evaluate the `stickiness" of forums. Finally,
we discuss an optimized "body mass" of forums at around that minimizes
and maximizes .Comment: 6 figure
Study of imperfect keys to characterise the security of optical encryption
In conventional symmetric encryption, it is common for the encryption/decryption key to be reused for multiple plaintexts. This gives rise to the concept of a known-plaintext attack. In optical image encryption systems, such as double random phase encoding (DRPE), this is also the case; if one knows a plaintext-ciphertext pair, one can carry out a known-plaintext attack more efficiently than a brute-force attack, using heuristics based on phase retrieval or simulated annealing. However, we demonstrate that it is likely that an attacker will find an imperfect decryption key using such heuristics. Such an imperfect key will work for the known plaintext-ciphertext pair, but not an arbitrary unseen plaintext-ciphertext pair encrypted using the original key. In this paper, we illustrate the problem and attempt to characterise the increase in security it affords optical encryption
Study of imperfect keys to characterise the security of optical encryption
In conventional symmetric encryption, it is common for the encryption/decryption key to be reused for multiple plaintexts. This gives rise to the concept of a known-plaintext attack. In optical image encryption systems, such as double random phase encoding (DRPE), this is also the case; if one knows a plaintext-ciphertext pair, one can carry out a known-plaintext attack more efficiently than a brute-force attack, using heuristics based on phase retrieval or simulated annealing. However, we demonstrate that it is likely that an attacker will find an imperfect decryption key using such heuristics. Such an imperfect key will work for the known plaintext-ciphertext pair, but not an arbitrary unseen plaintext-ciphertext pair encrypted using the original key. In this paper, we illustrate the problem and attempt to characterise the increase in security it affords optical encryption
- …