4,363 research outputs found

    Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name

    Get PDF
    An `obfuscation' for encrypted computing is quantified exactly here, leading to an argument that security against polynomial-time attacks has been achieved for user data via the deliberately `chaotic' compilation required for security properties in that environment. Encrypted computing is the emerging science and technology of processors that take encrypted inputs to encrypted outputs via encrypted intermediate values (at nearly conventional speeds). The aim is to make user data in general-purpose computing secure against the operator and operating system as potential adversaries. A stumbling block has always been that memory addresses are data and good encryption means the encrypted value varies randomly, and that makes hitting any target in memory problematic without address decryption, yet decryption anywhere on the memory path would open up many easily exploitable vulnerabilities. This paper `solves (chaotic) compilation' for processors without address decryption, covering all of ANSI C while satisfying the required security properties and opening up the field for the standard software tool-chain and infrastructure. That produces the argument referred to above, which may also hold without encryption.Comment: 31 pages. Version update adds "Chaotic" in title and throughout paper, and recasts abstract and Intro and other sections of the text for better access by cryptologists. To the same end it introduces the polynomial time defense argument explicitly in the final section, having now set that denouement out in the abstract and intr

    Empirical Patterns in Google Scholar Citation Counts

    Full text link
    Scholarly impact may be metricized using an author's total number of citations as a stand-in for real worth, but this measure varies in applicability between disciplines. The detail of the number of citations per publication is nowadays mapped in much more detail on the Web, exposing certain empirical patterns. This paper explores those patterns, using the citation data from Google Scholar for a number of authors.Comment: 6 pages, 8 figures, submitted to Cyberpatterns 201

    New applications for phosphoric acid fuel cells

    Get PDF
    New applications for phosphoric acid fuel cells were identified and evaluated. Candidates considered included all possibilities except grid connected electric utility applications, on site total energy systems, industrial cogeneration, opportunistic use of waste hydrogen, space and military applications, and applications smaller than 10 kW. Applications identified were screened, with the most promising subjected to technical and economic evaluation using a fuel cell and conventional power system data base developed in the study. The most promising applications appear to be the underground mine locomotive and the railroad locomotive. Also interesting are power for robotic submersibles and Arctic villages. The mine locomotive is particularly attractive since it is expected that the fuel cell could command a very high price and still be competitive with the conventionally used battery system. The railroad locomotive's attractiveness results from the (smaller) premium price which the fuel cell could command over the conventional diesel electric system based on its superior fuel efficiency, and on the large size of this market and the accompanying opportunities for manufacturing economy

    Open XXZ spin chain: Nonequilibrium steady state and strict bound on ballistic transport

    Full text link
    Explicit matrix product ansatz is presented, in first two orders in the (weak) coupling parameter, for the non-equilibrium steady state of the homogeneous, nearest neighbor Heisenberg XXZ spin-1/2 chain driven by Lindblad operators which act only at the edges of the chain. The first order of the density operator becomes in thermodynamic limit an exact pseudo-local conservation law and yields -- via Mazur inequality -- a rigorous lower bound on the high temperature spin Drude weight. Such Mazur bound is a non-vanishing fractal function of the anisotropy parameter Delta for |Delta|<1.Comment: Slightly longer but essentially equivalent to a published versio

    PT-symmetric quantum Liouvillian dynamics

    Full text link
    We discuss a combination of unitary and anti-unitary symmetry of quantum Liouvillian dynamics, in the context of open quantum systems, which implies a D2 symmetry of the complex Liovillean spectrum. For sufficiently weak system-bath coupling it implies a uniform decay rate for all coherences, i.e. off-diagonal elements of the system's density matrix taken in the eigenbasis of the Hamiltonian. As an example we discuss symmetrically boundary driven open XXZ spin 1/2 chains.Comment: Note [18] added with respect to a published version, explaining the symmetry of the matrix V [eq. (14)

    Hierarchical social modularity in gorillas

    No full text
    Modern human societies show hierarchical social modularity (HSM) in which lower-order social units like nuclear families are nested inside increasingly larger units. It has been argued that this HSM evolved independently and after the chimpanzee–human split due to greater recognition of, and bonding between, dispersed kin. We used network modularity analysis and hierarchical clustering to quantify community structure within two western lowland gorilla populations. In both communities, we detected two hierarchically nested tiers of social structure which have not been previously quantified. Both tiers map closely to human social tiers. Genetic data from one population suggested that, as in humans, social unit membership was kin structured. The sizes of gorilla social units also showed the kind of consistent scaling ratio between social tiers observed in humans, baboons, toothed whales, and elephants. These results indicate that the hierarchical social organization observed in humans may have evolved far earlier than previously asserted and may not be a product of the social brain evolution unique to the hominin lineage

    The simulation of coherent structures in a laminar boundary layer

    Get PDF
    Coherent structures in turbulent shear flows were studied extensively by several techniques, including the VITA technique which selects rapidly accelerating or decelerating regions in the flow. The evolution of a localized disturbance in a laminar boundary layer shows strong similarity to the evolution of coherent structures in a turbulent-wall bounded flow. Starting from a liftup-sweep motion, a strong shear layer develops which shares many of the features seen in conditionally-sampled turbulent velocity fields. The structure of the shear layer, Reynolds stress distribution, and wall pressure footprint are qualitatively the same, indicating that the dynamics responsible for the structure's evolution are simple mechanisms dependent only on the presence of a high mean shear and a wall and independent of the effects of local random fluctuations and outer flow effects. As the disturbance progressed, the development of streak-like-high- and low-speed regions associated with the three-dimensionality
    • …
    corecore