Nico Abene
Recensione di Daniele Maria Pegorari, La conoscenza amministrata. Mimesis, 2025.
Menampilkan 20 dari ~865 hasil · dari DOAJ, arXiv
Nico Abene
Recensione di Daniele Maria Pegorari, La conoscenza amministrata. Mimesis, 2025.
Xiaogang Cheng, Ren Guo
In classical cryptography, certified deletion is simply impossible. Since classical information can be copied any number of times easily. In quantum cryptography, certified deletion is possible because of theorems of quantum mechanics such as the quantum no-clone theorem, quantum superposition etc. In this paper, we show the PKE-CD (Public Key Encryption with Certified Deletion) scheme constructed in by Bartusek and Khurana in CRYPTO 2023 lack an important security property, which is important in practical applications. Then we show how to enhance this property, and construct a concrete scheme with this property. And we also discuss the relations between PKE-CD and other quantum cryptographic schemes such as quantum seal, quantum bit commitment etc.
Tianshi Xu, Meng Li, Runsheng Wang
Secure two-party computation with homomorphic encryption (HE) protects data privacy with a formal security guarantee but suffers from high communication overhead. While previous works, e.g., Cheetah, Iron, etc, have proposed efficient HE-based protocols for different neural network (NN) operations, they still assume high precision, e.g., fixed point 37 bit, for the NN operations and ignore NNs' native robustness against quantization error. In this paper, we propose HEQuant, which features low-precision-quantization-aware optimization for the HE-based protocols. We observe the benefit of a naive combination of quantization and HE quickly saturates as bit precision goes down. Hence, to further improve communication efficiency, we propose a series of optimizations, including an intra-coefficient packing algorithm and a quantization-aware tiling algorithm, to simultaneously reduce the number and precision of the transferred data. Compared with prior-art HE-based protocols, e.g., CrypTFlow2, Cheetah, Iron, etc, HEQuant achieves $3.5\sim 23.4\times$ communication reduction and $3.0\sim 9.3\times$ latency reduction. Meanwhile, when compared with prior-art network optimization frameworks, e.g., SENet, SNL, etc, HEQuant also achieves $3.1\sim 3.6\times$ communication reduction.
Bhathiya Rathnayake, Mamadou Diagne, Jorge Cortes et al.
We employ the recent performance-barrier event-triggered control (P-ETC) for achieving global exponential convergence of a class of reaction-diffusion PDEs via PDE backstepping control. Rather than insisting on a strictly monotonic decrease of the Lyapunov function for the closed-loop system, P-ETC allows the Lyapunov function to increase as long as it remains below an acceptable performance-barrier. This approach integrates a performance residual, the difference between the value of the performance-barrier and the Lyapunov function, into the triggering mechanism. The integration adds flexibility and results in fewer control updates than with regular ETC (R-ETC) that demands a monotonic decrease of the Lyapunov function. Our P-ETC PDE backstepping design ensures global exponential convergence of the closed-loop system in the spatial L^2 norm, without encountering Zeno phenomenon. To avoid continuous monitoring of the triggering function that generates events, we develop periodic event-triggered and self-triggered variants (P-PETC and P-STC, respectively) of the P-ETC. The P-PETC only requires periodic evaluation of the triggering function whereas the P-STC preemptively computes the time of the next event at the current event time using the system model and continuously available system states. The P-PETC and P-STC also ensure a Zeno-free behavior and deliver performance equivalent to that of the continuous-time P-ETC which requires continuous evaluation of the triggering function, in addition to the continuous sensing of the state. We provide numerical simulations to illustrate the proposed technique and to compare it with R-ETC associated with strictly decreasing Lyapunov functions.
Michele Maiolani
This article investigates Primo Levi’s representations of the origin of life, particularly considering his essays and science-fiction short stories. After introducing the two main sources of inspiration that Levi refers to when writing narratives on this subject, classical and biblical mythologies and Darwinian evolutionary theory, the article offers a close reading of two short stories, “I sintetici” and “Disfilassi”, that depict a moment of ‘second genesis’ set in the near future. This process is seen by Levi from an ecological perspective in relation to the environmental risks that human technology and overpopulation pose to our planet. Following the analysis of the writer’s essays about recent chemical and biological theories on how life originated on Earth, the last paragraph focuses on the tangencies between Levi’s investigation of the origin of life and his reflections on the source of literary creativity, summed up by the short story “Carbonio”.
Xinghan Li, Haodong Jiang, Xingyu Chen et al.
Pose estimation is important for robotic perception, path planning, etc. Robot poses can be modeled on matrix Lie groups and are usually estimated via filter-based methods. In this paper, we establish the closed-form formula for the error propagation for the Invariant extended Kalman filter (IEKF) in the presence of random noises and apply it to vision-aided inertial navigation. We evaluate our algorithm via numerical simulations and experiments on the OPENVINS platform. Both simulations and the experiments performed on the public EuRoC MAV datasets demonstrate that our algorithm outperforms some state-of-art filter-based methods such as the quaternion-based EKF, first estimates Jacobian EKF, etc.
Kshitij Gupta
Automated essay scoring is one of the most important problem in Natural Language Processing. It has been explored for a number of years, and it remains partially solved. In addition to its economic and educational usefulness, it presents research problems. Transfer learning has proved to be beneficial in NLP. Data augmentation techniques have also helped build state-of-the-art models for automated essay scoring. Many works in the past have attempted to solve this problem by using RNNs, LSTMs, etc. This work examines the transformer models like BERT, RoBERTa, etc. We empirically demonstrate the effectiveness of transformer models and data augmentation for automated essay grading across many topics using a single model.
AprilPyone MaungMaung, Hitoshi Kiya
In this paper, we propose a privacy-preserving image classification method that uses encrypted images and an isotropic network such as the vision transformer. The proposed method allows us not only to apply images without visual information to deep neural networks (DNNs) for both training and testing but also to maintain a high classification accuracy. In addition, compressible encrypted images, called encryption-then-compression (EtC) images, can be used for both training and testing without any adaptation network. Previously, to classify EtC images, an adaptation network was required before a classification network, so methods with an adaptation network have been only tested on small images. To the best of our knowledge, previous privacy-preserving image classification methods have never considered image compressibility and patch embedding-based isotropic networks. In an experiment, the proposed privacy-preserving image classification was demonstrated to outperform state-of-the-art methods even when EtC images were used in terms of classification accuracy and robustness against various attacks under the use of two isotropic networks: vision transformer and ConvMixer.
Angsuman Das, Manideepa Saha, Saba Al-Kaseasbeh
The co-maximal subgroup graph $Γ(G)$ of a group $G$ is a graph whose vertices are non-trivial proper subgroups of $G$ and two vertices $H$ and $K$ are adjacent if $HK=G$. In this paper, we continue the study of $Γ(G)$, especially when $Γ(G)$ has isolated vertices. We define a new graph $Γ^*(G)$, which is obtained by removing isolated vertices from $Γ(G)$. We characterize when $Γ^*(G)$ is connected, a complete graph, star graph, has an universal vertex etc. We also find various graph parameters like diameter, girth, bipartiteness etc. in terms of properties of $G$.
Sachin Shivakumar, Declan Jagt, Danilo Braghini et al.
PIETOOLS 2022 manual is a document that describes all the features of the MATLAB toolbox for the analysis and control of Partial Integral Equations (PIEs). The manual is aimed to guide, with examples, the first time users to three fundamental features of PIETOOLS: converting coupled ODE-PDEs, DDEs, DDFs, etc., to PIE representation; analysis of stability and input-output properties of PIEs; design of optimal observers and controllers for PIEs. The use of PIETOOLS is not limited to the features described above. However, the manual focuses on these features to provide a holistic understanding of the workflow of PIETOOLS, which will serve as a foundation to develop more complicated programs, for example, the design of boundary feedback controllers, robust observers, robust controllers, etc.
Marianna Marrucci
abstract
Davide Savio
Il contributo intende analizzare Se una notte d’inverno un viaggiatore come prodotto della stagione senile di Calvino, cominciata programmaticamente con il trasferimento a Parigi del 1967. In particolare, nel romanzo si può riconoscere la divaricazione tra convenzioni artistiche e soggettività dell’autore, innescata dall’approssimarsi della morte, su cui Adorno fondava il concetto di stile tardo. Si cercherà di mostrare come lo spreco formale del romanzo senza self, virtuosistico e barocco, rispecchi in realtà l’etica del difficile del suo autore, per il quale ogni cosa, uomini e libri, va giustificata all’interno di un progetto fatto di «scelte volontarie» e di «rinunce attive».
Lucia Floridi, Laura Neri, Chiara Torre
Introduzione al volume. Introduction to the volume.
Fabio A. Camilletti
The import of British Gothic novels in post-revolutionary France, from 1797 onwards, triggered French publisher to capitalize on the vogue of supernatural narratives. One of the results was the publication of a number of anthologies, hastily composed by cutting and pasting Old Regime collections, whose first example was the anonymous Le Livre des prodiges (1802). This essay reinstates the supernatural anthologies of 1802-1822 as a powerful link between the British Gothic and later French fantastic literature (particularly Alexandre Dumas), at the same time analysing how the very operation of cutting and pasting pre-revolutionary texts resonates with distinctly post-revolutionary anxieties.
Alessandra Elisa Visinoni
Dal 23 al 26 ottobre dello scorso anno eminenti studiosi, specialisti di Dostoevskij, si sono riuniti a Sofia per il «Simposio internazionale: L’antropologia di Dostoevskij. L'uomo come problema e oggetto di rappresentazione nel mondo di Dostoevskij», convegno organizzato dalla Associazione bulgara di studi dostoevskiani e dall’Istituto di studi letterari dell’Accademia bulgara delle Scienze presso l’Università “S. Clemente d’Ocrida”.
Masaki Kitayama, Hitoshi Kiya
In this paper, we propose an extraction method of HOG (histograms-of-oriented-gradients) features from encryption-then-compression (EtC) images for privacy-preserving machine learning, where EtC images are images encrypted by a block-based encryption method proposed for EtC systems with JPEG compression, and HOG is a feature descriptor used in computer vision for the purpose of object detection and image classification. Recently, cloud computing and machine learning have been spreading in many fields. However, the cloud computing has serious privacy issues for end users, due to unreliability of providers and some accidents. Accordingly, we propose a novel block-based extraction method of HOG features, and the proposed method enables us to carry out any machine learning algorithms without any influence, under some conditions. In an experiment, the proposed method is applied to a face image recognition problem under the use of two kinds of classifiers: linear support vector machine (SVM), gaussian SVM, to demonstrate the effectiveness.
Michael W. Mahoney
The National Science Foundation's Transdisciplinary Research in Principles of Data Science (TRIPODS) program aims to integrate three areas central to the foundations of data by uniting the statistics, mathematics, and theoretical computer science research communities. The program aims to provide a model for funding cross-cutting research and facilitating interactions among the three disciplines. Challenges associated with orchestrating fruitful interactions are described.
Karl Schlechta
We discuss the problem of defining a logic for analogical reasoning, and sketch a solution in the style of the semantics for Counterfactual Conditionals, Preferential Structures, etc.
Paolo Desogus
Attraverso l'indagine del meccanismo testuale e della ricostruzione del contesto di produzione, il saggio propone uno studio su Empirismo eretico e sullo stretto rapporto tra teoria semiotica, critica letteraria e impegno politico che ha contrassegnato il lavoro pasoliniano degli anni Sessanta. Lo scopo è quello di mostrare come Empirismo eretico, nonostante la sua asistematicità, la sua frammentarietà analitica e il taglio polemico delle sue argomentazioni, abbia rappresentato per Pasolini il laboratorio in cui portare avanti la propria indagine teorica intorno a tutte quelle questioni emerse nel corso della sua attività di scrittore, regista e intellettuale impegnato.
Guido Gallerani
Tra gli studi condotti sul paratesto, le micro-scritture che compongono la nota biografica di un autore non sono state messe dovutamente in rilievo. Scopo dell’articolo è studiare queste forme brevi entro un macro-genere in cui esse assumono uno statuto paratestuale autonomo. Nelle antologie letterarie (poetiche e narrative, non scolastiche) le note biografiche occupano spesso un capitolo a parte o sono presenti in successione. Dapprima se ne definiscono le caratteristiche formali e la funzione paratestuale specifica. Poi se ne ricavano modelli ricorrenti, che possono corrispondere ad altrettante posture con cui l’autore negozia la propria posizione nel campo letterario. Infine, si cercano di individuare le relazioni che intercorrono tra certe tipologie di note e alcuni tipi di antologia, per comprendere come anche un paratesto marginale contribuisca ai meccanismi di legittimazione cui ricorre il genere dell’antologia nell’approntamento di un canone.
Halaman 13 dari 44