974 resultados para math computation


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we describe a decentralized privacy-preserving protocol for securely casting trust ratings in distributed reputation systems. Our protocol allows n participants to cast their votes in a way that preserves the privacy of individual values against both internal and external attacks. The protocol is coupled with an extensive theoretical analysis in which we formally prove that our protocol is resistant to collusion against as many as n-1 corrupted nodes in the semi-honest model. The behavior of our protocol is tested in a real P2P network by measuring its communication delay and processing overhead. The experimental results uncover the advantages of our protocol over previous works in the area; without sacrificing security, our decentralized protocol is shown to be almost one order of magnitude faster than the previous best protocol for providing anonymous feedback.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Collecting data via a questionnaire and analyzing them while preserving respondents’ privacy may increase the number of respondents and the truthfulness of their responses. It may also reduce the systematic differences between respondents and non-respondents. In this paper, we propose a privacy-preserving method for collecting and analyzing survey responses using secure multi-party computation (SMC). The method is secure under the semi-honest adversarial model. The proposed method computes a wide variety of statistics. Total and stratified statistical counts are computed using the secure protocols developed in this paper. Then, additional statistics, such as a contingency table, a chi-square test, an odds ratio, and logistic regression, are computed within the R statistical environment using the statistical counts as building blocks. The method was evaluated on a questionnaire dataset of 3,158 respondents sampled for a medical study and simulated questionnaire datasets of up to 50,000 respondents. The computation time for the statistical analyses linearly scales as the number of respondents increases. The results show that the method is efficient and scalable for practical use. It can also be used for other applications in which categorical data are collected.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main goal of this thesis is to discuss the determination of homological invariants of polynomial ideals. Thereby we consider different coordinate systems and analyze their meaning for the computation of certain invariants. In particular, we provide an algorithm that transforms any ideal into strongly stable position if char k = 0. With a slight modification, this algorithm can also be used to achieve a stable or quasi-stable position. If our field has positive characteristic, the Borel-fixed position is the maximum we can obtain with our method. Further, we present some applications of Pommaret bases, where we focus on how to directly read off invariants from this basis. In the second half of this dissertation we take a closer look at another homological invariant, namely the (absolute) reduction number. It is a known fact that one immediately receives the reduction number from the basis of the generic initial ideal. However, we show that it is not possible to formulate an algorithm – based on analyzing only the leading ideal – that transforms an ideal into a position, which allows us to directly receive this invariant from the leading ideal. So in general we can not read off the reduction number of a Pommaret basis. This result motivates a deeper investigation of which properties a coordinate system must possess so that we can determine the reduction number easily, i.e. by analyzing the leading ideal. This approach leads to the introduction of some generalized versions of the mentioned stable positions, such as the weakly D-stable or weakly D-minimal stable position. The latter represents a coordinate system that allows to determine the reduction number without any further computations. Finally, we introduce the notion of β-maximal position, which provides lots of interesting algebraic properties. In particular, this position is in combination with weakly D-stable sufficient for the weakly D-minimal stable position and so possesses a connection to the reduction number.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work reports an alternative method for single non-relativistic charged particle trajectory computation in 2D electrostatic or magnetostatic fields. This task is approached by analytical computation of particle trajectory, by parts, considering the constant fields within each finite element. This method has some advantages over numerical integration ones: numerical miscomputation of trajectories, and stability problems can be avoided. Among the examples presented in this paper, an interesting alternative approach for positive ion extraction from cyclotrons is shown, using strip-foils. Other particle optics devices can benefit of a method such the one proposed in this paper, as beam bending devices, spectrometers, among others. This method can be extended for particle trajectory computation in 3D domains.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present Dithen, a novel computation-as-a-service (CaaS) cloud platform specifically tailored to the parallel ex-ecution of large-scale multimedia tasks. Dithen handles the upload/download of both multimedia data and executable items, the assignment of compute units to multimedia workloads, and the reactive control of the available compute units to minimize the cloud infrastructure cost under deadline-abiding execution. Dithen combines three key properties: (i) the reactive assignment of individual multimedia tasks to available computing units according to availability and predetermined time-to-completion constraints; (ii) optimal resource estimation based on Kalman-filter estimates; (iii) the use of additive increase multiplicative decrease (AIMD) algorithms (famous for being the resource management in the transport control protocol) for the control of the number of units servicing workloads. The deployment of Dithen over Amazon EC2 spot instances is shown to be capable of processing more than 80,000 video transcoding, face detection and image processing tasks (equivalent to the processing of more than 116 GB of compressed data) for less than $1 in billing cost from EC2. Moreover, the proposed AIMD-based control mechanism, in conjunction with the Kalman estimates, is shown to provide for more than 27% reduction in EC2 spot instance cost against methods based on reactive resource estimation. Finally, Dithen is shown to offer a 38% to 500% reduction of the billing cost against the current state-of-the-art in CaaS platforms on Amazon EC2 (Amazon Lambda and Amazon Autoscale). A baseline version of Dithen is currently available at dithen.com.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose three research problems to explore the relations between trust and security in the setting of distributed computation. In the first problem, we study trust-based adversary detection in distributed consensus computation. The adversaries we consider behave arbitrarily disobeying the consensus protocol. We propose a trust-based consensus algorithm with local and global trust evaluations. The algorithm can be abstracted using a two-layer structure with the top layer running a trust-based consensus algorithm and the bottom layer as a subroutine executing a global trust update scheme. We utilize a set of pre-trusted nodes, headers, to propagate local trust opinions throughout the network. This two-layer framework is flexible in that it can be easily extensible to contain more complicated decision rules, and global trust schemes. The first problem assumes that normal nodes are homogeneous, i.e. it is guaranteed that a normal node always behaves as it is programmed. In the second and third problems however, we assume that nodes are heterogeneous, i.e, given a task, the probability that a node generates a correct answer varies from node to node. The adversaries considered in these two problems are workers from the open crowd who are either investing little efforts in the tasks assigned to them or intentionally give wrong answers to questions. In the second part of the thesis, we consider a typical crowdsourcing task that aggregates input from multiple workers as a problem in information fusion. To cope with the issue of noisy and sometimes malicious input from workers, trust is used to model workers' expertise. In a multi-domain knowledge learning task, however, using scalar-valued trust to model a worker's performance is not sufficient to reflect the worker's trustworthiness in each of the domains. To address this issue, we propose a probabilistic model to jointly infer multi-dimensional trust of workers, multi-domain properties of questions, and true labels of questions. Our model is very flexible and extensible to incorporate metadata associated with questions. To show that, we further propose two extended models, one of which handles input tasks with real-valued features and the other handles tasks with text features by incorporating topic models. Our models can effectively recover trust vectors of workers, which can be very useful in task assignment adaptive to workers' trust in the future. These results can be applied for fusion of information from multiple data sources like sensors, human input, machine learning results, or a hybrid of them. In the second subproblem, we address crowdsourcing with adversaries under logical constraints. We observe that questions are often not independent in real life applications. Instead, there are logical relations between them. Similarly, workers that provide answers are not independent of each other either. Answers given by workers with similar attributes tend to be correlated. Therefore, we propose a novel unified graphical model consisting of two layers. The top layer encodes domain knowledge which allows users to express logical relations using first-order logic rules and the bottom layer encodes a traditional crowdsourcing graphical model. Our model can be seen as a generalized probabilistic soft logic framework that encodes both logical relations and probabilistic dependencies. To solve the collective inference problem efficiently, we have devised a scalable joint inference algorithm based on the alternating direction method of multipliers. The third part of the thesis considers the problem of optimal assignment under budget constraints when workers are unreliable and sometimes malicious. In a real crowdsourcing market, each answer obtained from a worker incurs cost. The cost is associated with both the level of trustworthiness of workers and the difficulty of tasks. Typically, access to expert-level (more trustworthy) workers is more expensive than to average crowd and completion of a challenging task is more costly than a click-away question. In this problem, we address the problem of optimal assignment of heterogeneous tasks to workers of varying trust levels with budget constraints. Specifically, we design a trust-aware task allocation algorithm that takes as inputs the estimated trust of workers and pre-set budget, and outputs the optimal assignment of tasks to workers. We derive the bound of total error probability that relates to budget, trustworthiness of crowds, and costs of obtaining labels from crowds naturally. Higher budget, more trustworthy crowds, and less costly jobs result in a lower theoretical bound. Our allocation scheme does not depend on the specific design of the trust evaluation component. Therefore, it can be combined with generic trust evaluation algorithms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper is concerned with the discontinuous Galerkin approximation of the Maxwell eigenproblem. After reviewing the theory developed in [5], we present a set of numerical experiments which both validate the theory, and provide further insight regarding the practical performance of discontinuous Galerkin methods, particularly in the case when non-conforming meshes, characterized by the presence of hanging nodes, are employed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computers employing some degree of data flow organisation are now well established as providing a possible vehicle for concurrent computation. Although data-driven computation frees the architecture from the constraints of the single program counter, processor and global memory, inherent in the classic von Neumann computer, there can still be problems with the unconstrained generation of fresh result tokens if a pure data flow approach is adopted. The advantages of allowing serial processing for those parts of a program which are inherently serial, and of permitting a demand-driven, as well as data-driven, mode of operation are identified and described. The MUSE machine described here is a structured architecture supporting both serial and parallel processing which allows the abstract structure of a program to be mapped onto the machine in a logical way.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is a fact, and far from being a new one, that students have been entering Higher Education courses with many different backgrounds in terms of secondary school programs they attended. The impact of these basic skills is a general and worldwide challenge, fundamentally when facing some specific “constructive” subjects like foreign languages and Mathematics. Working with students with an extensive variety of Math qualifications is an outrageous challenge when they enter an advanced Math course, leading to an almost generalized expectations’ failure - from students enrolled in course and from their teachers, who feel powerless in trying to monitor knowledge construction from completely different “starting points”. If teachers’ "haste" is average, more than half of the students do not “go along” and give up, even before experiencing any kind of evaluation procedure. On the contrary, if the “speed” is too low, others are discouraged (feeling not progressing at all) and the teacher runs the risk of not meeting the minimum objectives (general and specific) of its course, which may have a negative impact on students’ future training development. Failure in Mathematics, despite being a recurrent and global issue, does not have any “magical solution”, however, in general, teachers in this area seem untiring, searching, investigating, trying and implementing new and old “recipes” to tackle and demystify this subject. In this article we describe a project developed in a Math course, with the first year students from an Accounting and Management bachelor degree, and its outcomes since it was brought to practice, revealing its impact in students’ success, from approval to dropout rates, in this course. We will shortly describe students’ differentiated Math backgrounds, their results in a pre-assessment analysis and how we try to deal with these differences and level them up, having in mind the same “finish line”. One should never forget that all these students where officially accepted in higher education institutions, so they are ones’ reality, the reality of institutions whose name one should value and strive to defend.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure computation involves multiple parties computing a common function while keeping their inputs private, and is a growing field of cryptography due to its potential for maintaining privacy guarantees in real-world applications. However, current secure computation protocols are not yet efficient enough to be used in practice. We argue that this is due to much of the research effort being focused on generality rather than specificity. Namely, current research tends to focus on constructing and improving protocols for the strongest notions of security or for an arbitrary number of parties. However, in real-world deployments, these security notions are often too strong, or the number of parties running a protocol would be smaller. In this thesis we make several steps towards bridging the efficiency gap of secure computation by focusing on constructing efficient protocols for specific real-world settings and security models. In particular, we make the following four contributions: - We show an efficient (when amortized over multiple runs) maliciously secure two-party secure computation (2PC) protocol in the multiple-execution setting, where the same function is computed multiple times by the same pair of parties. - We improve the efficiency of 2PC protocols in the publicly verifiable covert security model, where a party can cheat with some probability but if it gets caught then the honest party obtains a certificate proving that the given party cheated. - We show how to optimize existing 2PC protocols when the function to be computed includes predicate checks on its inputs. - We demonstrate an efficient maliciously secure protocol in the three-party setting.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this study, relations among students’ perceptions of instrumental help/support from their teachers and their reading and math ability beliefs, subjective task values, and academic grades, were explored from elementary through high school. These relations were examined in an overall sample of 1,062 students from the Childhood and Beyond (CAB) study dataset, a cohort-sequential study that followed students from elementary to high school and beyond. Multi-group structural equation model (SEM) analyses were used to explore these relations in adjacent grade pairs (e.g., second grade to third grade) in elementary school and from middle school through high school separately for males and females. In addition, multi-group latent growth curve (LGC) analyses were used to explore the associations among change in the variables of interest from middle school through high school separately for males and females. The results showed that students’ perceptions of instrumental help from teachers significantly positively predicted: (a) students’ math ability beliefs and reading and math task values in elementary school within the same grade for both girls and boys, and (b) students’ reading and math ability beliefs, reading and math task values, and GPA in middle and high school within the same grade for both girls and boys. Overall, students’ perceptions of instrumental help from teachers more consistently predicted ability beliefs and task values in the academic domain of math than in the academic domain of reading. Although there were some statistically significant differences in the models for girls and boys, the direction and strength of the relations in the models were generally similar for both girls and boys. The implications for these findings and suggestions for future research are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The current study examined the frequency and quality of how 3- to 4-year-old children and their parents explore the relations between symbolic and non-symbolic quantities in the context of a playful math experience, as well as the role of both parent and child factors in this exploration. Preschool children’s numerical knowledge was assessed while parents completed a survey about the number-related experiences they share with their children at home, and their math-related beliefs. Parent-child dyads were then videotaped playing a modified version of the card game War. Results suggest that parents and children explored quantity explicitly on only half of the cards and card pairs played, and dyads of young children and those with lower number knowledge tended to be most explicit in their quantity exploration. Dyads with older children, on the other hand, often completed their turns without discussing the numbers at all, likely because they were knowledgeable enough about numbers that they could move through the game with ease. However, when dyads did explore the quantities explicitly, they focused on identifying numbers symbolically, used non-symbolic card information interchangeably with symbolic information to make the quantity comparison judgments, and in some instances, emphasized the connection between the symbolic and non-symbolic number representations on the cards. Parents reported that math experiences such as card game play and quantity comparison occurred relatively infrequently at home compared to activities geared towards more foundational practice of number, such as counting out loud and naming numbers. However, parental beliefs were important in predicting both the frequency of at-home math engagement as well as the quality of these experiences. In particular, parents’ specific beliefs about their children’s abilities and interests were associated with the frequency of home math activities, while parents’ math-related ability beliefs and values along with children’s engagement in the card game were associated with the quality of dyads’ number exploration during the card game. Taken together, these findings suggest that card games can be an engaging context for parent-preschooler exploration of numbers in multiple representations, and suggests that parents’ beliefs and children’s level of engagement are important predictors of this exploration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report here about a series of international workshops on e-learning of mathematics at university level, which have been jointly organized by the three publicly funded open universities in the Iberian Peninsula and which have taken place annually since 2009. The history, achievements and prospects for the future of this initiative will be addressed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this study was to determine the cognitive effects of applying physical recreational activities to two groups of pre-school students, related to mathematics to one of the groups and recreational games to the other.  A total of 27 subjects (13 girls and 14 boys) of 5 and a half and 6 and half years of age participated in the study.  The instrument used was a questionnaire including basic math concepts such as geometry, basic operations with concrete elements, and how to read the clock, based on the topics established by the Costa Rican Ministry of Public Education.  Once the instrument was developed, a plan of physical recreational activities related to math was prepared and applied to the experimental group (pre-school B) for one and a half months, while the other group played recreational games.  Data was analyzed using descriptive and inferential statistics.  Positive and significant effects were found in the physical recreational activity program regarding student performance in 10 of the 12 items that were applied to assess mastery of basic math concepts.  In conclusion, using physical education as another instrument to teach other disciplines represents an excellent alternative for pre-school teachers that try to satisfy the learning needs of children that will soon be attending school.  Using movement as part of guided and planned activities plays an indispensable role in children’s lives; therefore, learning academic subjects should be adapted to their needs to explore and know their environment.