476,181 research outputs found

    Game Theory Meets Network Security: A Tutorial at ACM CCS

    Full text link
    The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker's advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory

    Strange attractors in periodically-kicked degenerate Hopf bifurcations

    Full text link
    We prove that spiral sinks (stable foci of vector fields) can be transformed into strange attractors exhibiting sustained, observable chaos if subjected to periodic pulsatile forcing. We show that this phenomenon occurs in the context of periodically-kicked degenerate supercritical Hopf bifurcations. The results and their proofs make use of a new multi-parameter version of the theory of rank one maps developed by Wang and Young.Comment: 16 page

    Determination of anisotropic dipole moments in self-assembled quantum dots using Rabi oscillations

    Full text link
    By investigating the polarization-dependent Rabi oscillations using photoluminescence spectroscopy, we determined the respective transition dipole moments of the two excited excitonic states |Ex> and |Ey> of a single self-assembled quantum dot that are nondegenerate due to shape anisotropy. We find that the ratio of the two dipole moments is close to the physical elongation ratio of the quantum dot.Comment: 11 pages, 2 figures, MS Word generated PDF fil

    Gamma-Ray Burst Jet Profiles And Their Signatures

    Full text link
    HETE-II and BeppoSAX have produced a sample of GRBs and XRFs with known redshifts and EpkE_{pk}. This sample provides four important empirical constraints on the nature of the source jets: Log EisoE_{iso} is approximately uniformly distributed over several orders of magnitude; the inferred prompt energy Log EγE_{\gamma} is narrowly distributed; the Amati relation holds between EisoE_{iso} and EpkE_{pk}; and the Ghirlanda relation holds between EγE_{\gamma} and EpkE_{pk}. We explore the implications of these constraints for GRB jet structure during the prompt emission phase. We infer the underlying angular profiles from the first two of the above constraints assuming all jets have the same profile and total energy, and show that such ``universal jet'' models cannot satisfy both constraints. We introduce a general and efficient method for calculating relativistic emission distributions and EpkE_{pk} distributions from jets with arbitrary (smooth) angular jet profiles. We also exhibit explicit analytical formulas for emission from top-hat jets (which are not smooth). We use these methods to exhibit EpkE_{pk} and EisoE_{iso} as a function of viewing angle, for several interesting families of GRB jet profiles. We use the same methods to calculate expected frequency distributions of EisoE_{iso} and EγE_{\gamma} for the same families of models. We then proceed to explore the behavior of universal jet models under a range of profile shapes and parameters, to map the extent to which these models can conform to the above four empirical constraints.Comment: 71 page, 33 figures. Submitted to Ap

    Likelihood Analysis of GRB Evolution with Redshift

    Get PDF
    We present a likelihood approach to modeling multi-dimensional GRB Epeak--fluence--redshift data that naturally incorporates instrument detection thresholds. The treatment of instrument thresholds is essential for analyzing evidence for GRB evolution. The method described here compares the data to a uniform jet model, in which the jet parameters are allowed to vary with redshift. Data from different experiments may be modeled jointly. In addition, BATSE data (for which no redshift information is available) may be incorporated by ascribing to each event a likelihood derived from the full model by integrating the probability density over the unknown redshift. The loss of redshift information is mitigated by the large number of available bursts. We discuss the implementation of the method, and validation of it using simulated data.Comment: 4 pages, 1 figure. Poster presented at the 4th Workshop Gamma-Ray Bursts in the Afterglow Era, Rome,18-22 October 2004. Editors: L. Piro, L. Amati, S. Covino, and B. Gendre. Il Nuovo Cimento, in pres
    • …
    corecore